

“This distribution of Linux is not intended to be used by any citizen on any country on Earth.”


“This distribution of Linux is not intended to be used by any citizen on any country on Earth.”


Or we could just like…not do the terrible thing that is bad in everyway.


Distributed Non Consensual Backup


Laws are vibe based too, open to interpretation by design. Look at the Supreme court as an example.


It’s actually possible to make something without the primary motivation to be profit.


It would have been meant to make money and influence consumption.


Pedophiles In charge


I don’t know man, I see this, which is a simple thing a parent can set on an account: are they a child or not. Or, the alternative, which is everyone has to upload their government ID to some third party site, have it stored for all of eternity, and collated and collected, just so they can access discord, or social media, or whatever.
We will never agree on this since your whole premise is built on a lie.
You are claiming that it’s inevitable for the state to govern how we use our devices. When the realty is, that the state does not need to be involved at the operating system level.
If this was actually about protecting kids, then maybe the state should go after tech companies like xAI which hosts a child pornography generator known as Grok.
This is not about that, this is actually a law that will protect xAI, and allow them to continue to generate non consensual pornography including those of children.
If a child sees harmful material like child pornography that xAI generates, somehow that is now the operating system developer’s fault. And it’s not impossible to imagine in a few years the parents would also be legally liable.


Hard disagree, If it doesn’t matter how one uses a computer, then why would one have to comply with the state’s requirement to specify who is using a computer? In this case, the state is regulating the way a minor uses a computer and plans to enforce it with legal action including severe monetary fines.
Do you know how digital fingerprinting with metadata works? This information, even just Age brackets will be very helpful to accomplish this.
In respect to everything else, which I appreciate you taking the time to type, it’s important to remember how legal precedent works, how laws are interpreted, and how legal overreach happens.
These two statements are in conflict and cannot both be true.
This is the same cat and mouse game that has always existed in prohibited material. There will always be loopholes and sometimes those loopholes will expose users to increased risk.
Note, I haven’t even gotten to the fact that not only computers use Linux. Some refrigerators might use it to run it’s “smart” features. And refrigerators might store alcohol.
Put the onus on the parents.
This is not doing that. It is poorly protecting the distubitors of “harmful content”. Likely, this will only benefit large companies like Meta. If your goal as a parent is to restrict porn websites, some firewall rules would do a better job, and even that is doomed to failure as you won’t be able to add all porn websites. A combination of education, an honest talk with your child, and the realization that abstinence/prohibition does not work would be a better approach than any technical one.
Like as an app developer I can say If !os.isChild showPorn
And what if a website or app doesn’t check this or add a nudity flag for the device/browser to check? Do you think porn sites in other countries will care?


sudo?The community’s reaction is not “blown out of proportion”. I’d say the reaction is actually not proportional enough.


An operating system is not a tool for accessing porn.
To state that this is required for protecting children from porn or harmful content means there is an essential misunderstanding of what an operating system is.
When you say privacy, I say surveillance.
I will not be proving my identity in anyway to my computer. It’s never happening whether you like it or not. I will fork an old Linux distro before I submit to that.
Your argument – that this type of privacy intrusion is inevitable – is also a full of various logical fallacies which i am not going to take the time to list.


Random RAM!


There is a difference between a theoretical slippery slope and a logical path to an obvious goal.


It’s not a slippery slope, it’s a drop into a pit fall.


Privacy Surveillance Policy

I mean…bombs go boom too
New Xbox controller just leaked