Hacker Newsnew | past | comments | ask | show | jobs | submit | wiml's commentslogin

It does talk about Starlink

I wouldn't think so. Regulatory capture is a pretty typical activity for a dominant company.

Why is this down voted? Happens all the time, the large corporations always try to block using regulatory capture.

People not liking the concept, but shooting the messenger? (But seems not downvoted anymore.)

"Regime" is mostly derogatory among the terminally online. It's an accurate description of any government, regulatory system, zone of applicability of a natural law, etc etc.

Lots of ferns where I live, and I've put fiddleheads in a few stirfries for the novelty of it. But some (bracken especially) are somewhat toxic or carcinogenic. Probably fine if you prepare them properly and don't eat them too often, but be aware.

This exact method was implemented back around the turn of the century by RSAC/ICRA. I think only MSIE ever looked at those tags. But it seems like they met the stated goal of today's age-verification proposals.

That's why I have a hard time crediting the theory that today's proposals are just harmlessly clueless and well intentioned (as dynm suggests). There are many possible ways to make a child-safe internet and it's been a concern for a long time. But, just in the last year there are simultaneous pushes in many regions to enact one specific technique which just happens to pipe a ton of money to a few shady companies, eliminate general purpose computing, be tailor made for social control and political oppression, and on top of that, it isn't even any better at keeping porn away from kids! I think Hanlon's razor has to give way to Occam's here; malice is the simpler explanation.


Even better, the site could just tell the browser that there's age-sensitive content and the browser could check it. There are already standards for this!

The problem is, it doesn't give a legally-enforced monopoly to any rent seeking data brokers, and it doesn't act as a foot in the door for requiring government-ID attribution of all internet activity everywhere.


Don't think he knows about second sourcing, Pip.


You still need to have privileges to become the userid of the user logging in. Openssh does do privsep, but you still need a privileged daemon.


I think you need something like it in order to have a print representation of a cons cell whose cdr is not a cons-or-nil. And it's nice if your print representations are readable.


PPC32/64 of course, and for a long time Darwin still contained remnants of its predecessor's support for SPARC, PA-RISC, and m68k.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: