Age Verification Is Coming for the Whole Internet
-
Is it filled with the type of people that one might wish major governments could stop, though?
Not much more than the www.
-
Google already changed logged out YouTube to a single row of recommendations and a button to login on roku and Android shield when it used to look like the logged in version just a couple weeks ago. Probably the kick I needed to get off, mostly just using it for a couple smaller call-in/debate streamers I can switch to a podcast or other version.
logged out YouTube to a single row of recommendations and a button to login
I got this update on my smart TV, and I don't think Google realizes how much of an improvement it is. It's unintentionally the best thing the app has ever done.
Finally, no more fucking clickbait clutter all over the screen. I already just search for the channels I want to watch anyway. I love it.
-
This post did not contain any content.
If this happens they should check ID at church too seeing as how children are much more likely to be abused or groomed by someone there.
-
For my account sure. I use the same username most places. But it’s also reasonable to have a fairly decent Lemmy account that’s decoupled from all your other online accounts. Use a temp email provider, VPN, and proper browser and you’re most of the way there.
There is a lot of information in the way you type and the topics you choose to discuss. More than we suspect.
-
Also apps that don't need servers. Switched to this for staying in touch with family p2p, works surprisingly well https://keet.io/
-
Tor, and mesh networks. Every article brings me closer to going hard just for the lulz.
I have personally never found tech articles arousing in that way
-
Please explain how you can bypass carrier enforced traffic shaping policy.
From geti2p.net:
I2P's protocols are efficient on most platforms, including cell phones, and secure for most threat models. However, there are several areas which require further improvement to meet the needs of those facing powerful state-sponsored adversaries, and to meet the threats of continued cryptographic advances and ever-increasing computing power.
The people involved in the project you're referring to acknowledge that governments can, by influencing carrier policy, disrupt and subvert the project's intended function. Why then are you implying they are incorrect?
You are arguing a different point here than you were above and I’m not going to entertain the misdirect.
-
We already have gemini. A text based internet protocol like gopher.
Whats up with gemini lately? Havent seen anything about it since before covid
-
This post did not contain any content.
the simulatenous legislaiton from all countries seems very suspicious of a certain foreign adversary backing such motives. this isnt the first things like this happened. just a hunch.
-
the simulatenous legislaiton from all countries seems very suspicious of a certain foreign adversary backing such motives. this isnt the first things like this happened. just a hunch.
wrote last edited by [email protected]"The horrible things being done to me by my own government must be the fault of evil foreigners."
-
This post did not contain any content.
If it comes to Lemmy, I quit. I'll go touch grass all day, I don't mind.
-
Sure but it would be trivial for a company to build profiles on people using public apps like Lemmy.
If it was so trivial why would they even bother making everyone show their IDs?
-
the fuck happened to you at the end there
Ha ha ha,
-
This post did not contain any content.
Whever this happens, fuck this shit im out...
-
"The horrible things being done to me by my own government must be the fault of evil foreigners."
"We need to flood the zone, to overwhelm and burn out the activists!" - Steve Bannon
-
If it comes to Lemmy, I quit. I'll go touch grass all day, I don't mind.
I will move to freenet, i2p and tor
-
This post did not contain any content.
i2p lemmy is going to be great!
-
So do a million different forms of encryption. That doesn't make the infrastructure any less centralized. If the people who own the fiber decide to only allow pre-approved types of traffic to cross their networks then it doesn't make any difference what sort of protocols exist. Building free cross-country or subsea fiber routes is not economically viable and the internet doesn't exist without them.
That's a very different story than requiring I'd for some websites
-
There are already far more people in raw numbers on various federated/non-commercial/self-hosted/indie web stuff than there ever were on the early web- it just takes a little effort to find it.
Yeah I find that so annoying.
-
This post did not contain any content.
Suppose true, then we'll reduce the use of "the whole Internet".
OK, we won't, no tools yet.
I really love Briar, except it's functionally not quite there yet, and the desktop kind of such application synchronized with neighboring ships, so to say, with a delay-tolerant Web alternative, would be good. Over various links and media.
Anyway, it's not a technical problem, it's a social problem. Not really different from ID checks on the streets and everywhere you go in the city, except much of the city got virtualized. And ID checks on the streets are automated by cameras everywhere and face recognition.
Social problems are resolved in the legal, social, protest, civil war fields.