A possible ban on social media for under-16s in the UK is "on the table", the technology secretary Peter Kyle has told the BBC.
The likes of lemmy instances may be either small enough to fly under the radar, or handwaved away by legislators with "don't worry it's not the target of this legislation", or even be given easy access to ministerial exemption ...for now (maybe).
The kicker comes in 10-15 years' time when, say, a government's donor inconvenienced by protests organised using a self-hosted forum then asks the government to crack down on the age verification requirements of that forum, effectively silencing it due to the requirements being too onerous for a small forum, or the userbase being unwilling to submit their IDs/faceprints/whatever.
Faaark, I'm agreeing with Malcolm Roberts!
LoL, they misconfigured their test rig and it turns out they were measuring loopback's bandwidth.
Reader mode exposes a much better headline:
Scientists testing deadly heat limits on humans show thresholds may be much lower than first thought
"Current AI models cannot forget data they were trained on, even if the data was later removed from the training data set," Han's report said.
Bullshit. You delete the entire model and start again.
Huh. Even Boeing doesn't want to be associated with Boeing:
Boeing executives have repeatedly sought to make clear that the Starliner program operates independently from the company’s other units — including the commercial aircraft division that has been at the center of scandals for years.
"South Africa, which is functioning as the legal arm of the Hamas terrorist organization [...]"
-- https://twitter.com/LiorHaiat/status/1745427037039280207 (https://archive.md/L7AwX)
Even though the company didn’t really do anything truly wrong in this case, as it’s simply users reusing passwords, they still should have been better/more proactive especially with such sensitive information
There's nothing special or new or unique or unforseen about the security requirements of 23andMe.
They absolutely failed to implement an appropriate level of security measures for their service.
Mandatory 2FA could've prevented this.
Here are the github repository, issues and comments immortalised for posterity in IPFS:
- ipfs://QmeeRa15gofL1UGxMGgb9vnv6VjA8MmNBNxPeAxB36KsNT/
- https://ipfs.io/ipfs/QmeeRa15gofL1UGxMGgb9vnv6VjA8MmNBNxPeAxB36KsNT/
- https://bafybeihsjcljogr7k25knn6nsivwegas53ouko6pzmqtnzgqncrwwexeiq.ipfs.dweb.link/
The issues and comments are in github json format -- if anyone wants to collate them into a human-readable text or html file, please do so.
Edit: Its immortality of course depends on you to access and pin the content.
The article does not explain the primary design purpose of a VPN -- providing an encrypted tunnel into or between two private subnets.
For example, your home subnet is typically all 192.168.nnn.nnn addresses -- a class of addresses which the wider internet does not route, and which your router/modem does not allow the wider internet to access unless explicitly permitted.
Say you have a NAS on your home network, and you want to access it from your laptop while at a cafe; you could set up a VPN between your laptop and your home router, and it can make your home network appear as your local network to your laptop, giving you access to your NAS.
Or between two office locations of a business -- their database servers, accounting systems, printers, etc can all be freely accessible between offices without being exposed to the wider internet.