• 0 Posts
  • 15 Comments
Joined 2 years ago
cake
Cake day: December 25th, 2023

help-circle


  • I see your point but there is one major difference between adults and children: adults are by default fully responsible for themselves z children are not.

    As for your question: I won’t blame the parents here in the slightest because they will likely put more than enough blame on themselves. Instead I’ll try to keep it general:

    Independent of technology, what a parent can do is learn behavior and communication patterns that can be signs of mental illness.

    That’s independent of the technology.

    This is a big task because the border between normal puberty and behavior that warrants action is slim to non-existent.

    Overall I wish for way better education for parents both in terms of age appropriate patterns as well as what kind of help is available to them depending on their country and culture.


  • The first part is a technical question and the second part a definition one.

    For the how to: the most common approach is to simply blacklist their IPs on a provider basis. This leads to no provider that obeys your blacklists to allow their users traffic to that target. Usually all providers in a nation obey that nations law (I assume, I only know that for my own :D)

    For the censorship: I don’t like that word because it’s implications fan be used against any and all laws. A shitload of content is made inaccessible because it breaks laws from active coordination of attacks to human trafficking. All of this can be described as censorship.

    Forthe UK law it’s… I’m not British and to me it appears to be a vague tool to silence and control all types of content under the guise of protecting children. Not with the intention to protect or prevent something but with the intent to control. I would fully understand and emphasize with using the word censorship in this context.



  • Scipitie@lemmy.dbzer0.comtoTechnology@lemmy.worldSHUT THE FUCK UP!
    link
    fedilink
    English
    arrow-up
    58
    arrow-down
    1
    ·
    2 months ago

    I really don’t enjoy Linus’ content without context I have to admit.

    He was an absolute dipshit back then and he’s one of the few people I’ve read about who not only acknowledged that but also put effort into changing it - and succeeded.

    Yeah the newer mails are not as funny to third parties anymore but I’m really happy for him and especially the kernel devs around him.



  • Because a security engineer focused on cloud would rightfully say “pod security is not my issue, I’m focused on protecting the rest of our world from each pod itself.”. With AWS as example: If they then analyze the IAM role structures and to deep into where the pod runs (e.g. shared ec2 vs eks) etc. then it would just be a matter of different focus.

    Cloud security is focused on the infrastructure - looks like you’re looking for a security engineer focused on the dev side.

    If they bring neither to the table then I’m with you - but I don’t see how “the cloud” is at fault here… especially for security the world as full of “following the script” people long before cloud was a thing.




  • I assume we’re in a similar boat so let me assure you: no, you won’t - because we wouldn’t even realize it happened.

    Only after s few months one of us will recall this thread and be like “oh, yeah. Twitter. Seems really dead finally. Good.”

    And to be clear I expect they person to be you because my memory is awful.





  • You have several long and comprehensive answers so please allow me to add an emotional one:

    Fucking compile error in hour six of what you estimated to be a four hour compile job because of a mistake you made that you found within 5 seconds after the error!!

    Fucking why doesn’t this compilation start I can’t find my mistake for hours?!

    Where does this module come from?! What do you mean “root kit”? Learning was fun!

    It all was fun! :)