70

If you can feel a very small tinge of existential horror when you read the words "try to", congratulations, you're a true *nix devotee.

If legislators get grumpy about this, just gently thwap them with your handy copy of The Unix Haters Handbook and tell them you're working as hard as you can under the circumstances.

top 50 comments
sorted by: hot top controversial new old
[-] raicon@lemmy.world 14 points 2 weeks ago

Age verification is just paving way for things a lot worse: globally unique identification.

They ( politicians ) will weaponize the inefficiencies in this implementation to push for an online verification later on.

And of course Peter Thiel will be somewhere in the middle

[-] db2@lemmy.world 11 points 2 weeks ago

Your dissent has been noted for later enforcement action, Citizen 1d887190-bfe4-4a22-ae6d-4b519a9c5483.

[-] definitely_AI@feddit.online 10 points 2 weeks ago

This makes me nauseous because of the reality.

[-] db2@lemmy.world 4 points 2 weeks ago

Yeah, it felt a little ominous posting it the way things are going.

[-] definitely_AI@feddit.online 3 points 2 weeks ago

I'd rather be depressed and know what is coming than stick my head in the sand and blame immigrants/trans/Iran/whatever.

Lol that's a valid UID too.

load more comments (1 replies)
load more comments (7 replies)
[-] Zephorah@discuss.online 11 points 2 weeks ago

It’s not about age. It’s about uniquely identifying everyone who uses a computer.

[-] definitely_AI@feddit.online 6 points 2 weeks ago* (last edited 2 weeks ago)

But think of all the pedophiles it will stop! Surely you don't want pedophiles to get away with their crimes*? What are you, a pedophile?

(* T&C apply, if you are a +1B shareholder, please disregard)

[-] gabbath@lemmy.world 3 points 2 weeks ago

+1B shareholder

Yep, because we all know the last people who would be pedophiles are billionaires.

(/s obviously)

load more comments (3 replies)
[-] brokenwing@discuss.tchncs.de 8 points 2 weeks ago

I recently read an article from the creaters of PopOS. In that they raise a vaild point. If a child installs a virtualization software (say with the concent of an adult for educational purposes), then they can but browse internet through the VM, with them being the root user, pretending to be adults. It defeats the whole purpose of such verification methods. So their plan would to stick with ID based ones.

I think this was never about age verification, but to uniquely fingerprint every person using internet and to keep accountability.

Lets face it, the internet you knew is dead.

[-] tdawg@lemmy.world 12 points 2 weeks ago

I'll just do what I'm always done since I was 10

"How old are you?"

"115 years young of course"

[-] BlindFrog@lemmy.world 6 points 2 weeks ago

1/1/1900, just celebrated my 126th

[-] CosmicTurtle0@lemmy.dbzer0.com 4 points 2 weeks ago

These laws are not written by the technically literate. They are written by attorneys based on the whims of old legislators who think that Siri is a real woman that they are talking to.

While the people who write the laws are competent, the legislators are not.

At the state level, it's even worse because they are often given legislation carefully written by lobbyists and special interest groups.

If you have any inkling to run for office, please consider doing so because we need smarter people in every branch of government.

[-] Fizz@lemmy.nz 2 points 2 weeks ago

Can you install a VM without root? I assume the kids account isnt being out into a group with virtualization by default.

[-] LiveLM@lemmy.zip 5 points 2 weeks ago* (last edited 2 weeks ago)

You can. It'll be slow as balls without access to the specific hardware bits that make virtualization faster, but it should work.
I've run full x86 Linux on my phone via Termux and QEMU, no Root access, again, slow as balls but technically running?
I see people doing it on iOS too with UTM SE (SE standing for "Slow Edition" since Apple is anal about JIT on their platform)

On a computer it'll be even easier, and given the extra grunt, maybe slightly less painful

[-] far_university1990@reddthat.com 2 points 2 weeks ago

Lets face it, the internet you knew is dead.

Friendship ended with IP. Now I2P is friend.

[-] Lydia_K@lemmy.world 2 points 2 weeks ago

Check out reticulum as well.

[-] SlurpingPus@lemmy.world 1 points 2 weeks ago

Also, unless the verification thing provided by the OS is signed by TPM, it can probably just be emulated in userspace software.

[-] neclimdul@lemmy.world 7 points 2 weeks ago

Pass.

Its my computer, I own it, gtfo and let me use it how ever I want.

[-] pupbiru@aussie.zone 8 points 2 weeks ago* (last edited 2 weeks ago)

sure, but if an application “requires” age verification for whatever reason, would you prefer the functional equivalent to clicking “i’m over 18 pinky promise” as a standard, or they use biometric data that they all implement differently and then there’s like 33.7 leaks in the next 6 months?

like the whole thing is bullshit, but a file on disk is a wink wink nudge nudge sure we are compliant bud

the true unix way: if you text editor you own the world

[-] neclimdul@lemmy.world 2 points 2 weeks ago

I'll find a different application

[-] Shanmugha@lemmy.world 2 points 2 weeks ago

This. And since we are already in the land of geeks, I'll find a way to write one if none acceptable exists

[-] treadful@lemmy.zip 2 points 2 weeks ago
load more comments (2 replies)
[-] baner@lemmy.zip 5 points 2 weeks ago

Using linux is not proof enough?

load more comments (6 replies)
[-] ColeSloth@discuss.tchncs.de 5 points 2 weeks ago* (last edited 2 weeks ago)

Just set up an audio based check, prompting the user to make dial up modem connection sounds into the microphone. If you do it well enough, you're good and old.

export AGE=OLDENOUGH
[-] thethunderwolf@lemmy.dbzer0.com 4 points 2 weeks ago

"Must be outside of California, Colorado, and Brazil to download or use this install ISO"

load more comments (10 replies)
[-] DaddleDew@lemmy.world 3 points 2 weeks ago* (last edited 2 weeks ago)

The problem with that whole situation is the way the law is written the developer is the one held responsible if a child circumvents the check to access adult content. Therefore, developers will have to pay hefty fines unless they:

-1: Have a way to positively make sure the person enters their age is telling the truth; and

-2: Lock this value from being changed by the user afterwards.

Or: Region lock the OS.

One can see how incredibly problematic this is for both privacy and true ownership and control over your own machine. There is also a lot that needs to be figured out in the law such as what will happen when someone inevitably finds a way to hack the system to circumvent it, especially the region lock. Ultimately, big tech has deep pockets and can shrug off the fines but small nonprofit open source projects will be killed by them.

This law is specifically designed to kill nonprofit-run and private software like Linux.

[-] yardy_sardley@lemmy.ca 2 points 2 weeks ago

All of this seems impossible to enforce in the FOSS ecosystem. People can just fork the software and remove any restriction they don't like. That's kind of the whole point of free software. Users are free to use their devices however they like, including in ways that are not intended by the devloper.

[-] bilb@lemmy.ml 2 points 2 weeks ago

You're right. Computing devices need to be locked down in such a way that prevents consumers running software that isn't signed by an approved/licensed software vendor owned and/or favored by an oligarch and existing general purpose computers need to be made illegal. We don't need "hobbyist programmers" anymore, humans have no place writing code.

load more comments (1 replies)
[-] foodandart@lemmy.zip 2 points 2 weeks ago

This law is specifically designed to kill nonprofit-run and private software like Linux.

I do not know if that is true. Most of the political hacks writing these bills have zero understanding of computers and do not even consider Linux in the equation. They see Windows, iOS, Android and macOS.

This is more aimed at mom and dad with three children who have tablets for all the shits and take no responsibility for what the kids do with the devices.

Linux devs will just step back from releasing code packaged with installers and users will have to compile and set any given program up themselves.

I use MacPorts and Homebrew for what I need.

[-] DaddleDew@lemmy.world 2 points 2 weeks ago

You are correct that they have zero understanding of computers. But what you are missing is that they are consulting "experts" who are essentially just big tech lobbyists.

load more comments (2 replies)
load more comments (2 replies)
load more comments (1 replies)
[-] dasrael@lemmy.zip 3 points 2 weeks ago

We don't comply, is what we do. We ignore stupid fuckin' laws made by idiots who clearly have no idea what consultation is. It's time open source tech starts to diversify where it keeps its HQ and base of operations.

[-] observantTrapezium@lemmy.ca 2 points 2 weeks ago

Akahually at my work we used a third party authentication PAM module that uses the gecos field for username mapping.

[-] bacon_pdp@lemmy.world 2 points 2 weeks ago

Looks like your company shall be sacrificed for standards compliance reasons.

load more comments (1 replies)
[-] possiblylinux127@lemmy.zip 2 points 2 weeks ago

Or maybe we shouldn't do age verification

[-] Tealk@rollenspiel.forum 2 points 2 weeks ago

I utilize the GECOS field within my Ansible scripts to facilitate the identification of these entities as being managed by Ansible.

[-] Widdershins@lemmy.world 2 points 2 weeks ago

If they made TempleOS the default operating system age verification would be irrelevant because it takes 20 years of experience to use.

[-] Vocalize8711@lemmy.world 2 points 2 weeks ago

By definition of this new law, is Linux an OS? It is technically just the kernel. At what layer of the software stack does the responsibility of age verification lie at?

load more comments (1 replies)
[-] highball@lemmy.world 1 points 2 weeks ago

Get fucked, that's my age.

[-] jdr@lemmy.ml 1 points 2 weeks ago
[-] far_university1990@reddthat.com 1 points 2 weeks ago

Your real name bobby?

[-] bhamlin@lemmy.world 1 points 2 weeks ago

The best part is that this can be POSIX compliant too!

load more comments
view more: next ›
this post was submitted on 08 Mar 2026
70 points (98.6% liked)

linuxmemes

30780 readers
403 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn, no politics, no trolling or ragebaiting.
  • Don't come looking for advice, this is not the right community.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. 🇬🇧 Language/язык/Sprache
  • This is primarily an English-speaking community. 🇬🇧🇦🇺🇺🇸
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • 6. (NEW!) Regarding public figuresWe all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.
  • Keep discussions polite and free of disparagement.
  • We are never in possession of all of the facts. Defamatory comments will not be tolerated.
  • Discussions that get too heated will be locked and offending comments removed.
  •  

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS