Linux drive synch is really late to the party here, glad its not dead though.
- 0 Posts
- 7 Comments
GMac@feddit.orgto
Privacy@lemmy.ml•Federal Surveillance Tech Becomes Mandatory in New Cars by 2027English
34·5 days ago“If the AI determines you’re impaired (blood alcohol ≥0.08% or showing fatigue), it can prevent ignition startup or limit vehicle speed”
So if I the driver is injured, or distraught over an injured passenger, the car will limit how fast they can get to a hospital?
Reckon this needs a little more time in the thinking through phase of the process.
GMac@feddit.orgto
News@lemmy.world•Proton CEO warns global age verification push will mean "the death of anonymity online"English
21·5 days agoAgreed. The eu model is a good start, but the security of it’s implementation woefully inadequate… And I agree this MUST use post quantum cryptography.
Dox-gating (yes I just made that up lol) operating systems will result in people not updating security patches.
GMac@feddit.orgto
News@lemmy.world•Proton CEO warns global age verification push will mean "the death of anonymity online"English
30·6 days agoWhat is being pushed for implementation is better described as identity verification, not age verification.
I would have little issue with a solution that purely gated services on age in a secure and privacy respecting manner. This OS level garbage is not that, its creating an oligarchy run identity gate to control access to personal computing.
GMac@feddit.orgto
Games@lemmy.world•Gaming market melts down after Google reveals new AI game design tool — Project Genie crashes stocks. (A.K.A . Investors panic because they don't understand what "real" videogames are)English
6·3 months agoWish I could upvote your comment more than once. Thank you for the injection of clarity.
GMac@feddit.orgto
politics @lemmy.world•Yes, It’s Fascism | Until recently, I thought it a term best avoided. But now, the resemblances are too many and too strong to deny.English
5·3 months agoThis is the best response.
Sorry but I fundamentally disagree. Privacy respecting solutions do not collect unnecessary information.
The packaging of identity validation in the OS breaches this principle by collecting more information than necessary and by collecting that information prior to the existence of a necessitating use case.
It is not necessary to prove my age to do things not restricted by age, nor is it necessary to know who I am, or to prove my exact age, to prove I am older than a certain age.
Even in the efforts I have seen to verify threshold rather than current age instead of identity, I’m not aware of any attempts or solutions that protect against timing attacks or inference attacks as users transition from failing the threshold verification process to passing it.
Most OS code is proprietary and not auditable so any baked in solution cannot possibly pass a zero trust requirement. Access gates should only be applied at the point of need, as such things have always been done in all other scenarios and environments.