If you can feel a very small tinge of existential horror when you read the words “try to”, congratulations, you’re a true *nix devotee.

If legislators get grumpy about this, just gently thwap them with your handy copy of The Unix Haters Handbook and tell them you’re working as hard as you can under the circumstances.

  • PointyFluff@lemmy.ml
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    1 hour ago

    You don’t Linux isn’t an operating system. It’s a kernel. There is no LinuxOS

  • ColeSloth@discuss.tchncs.de
    link
    fedilink
    arrow-up
    6
    ·
    5 hours ago

    Just set up an audio based check, prompting the user to make dual up modem connection sounds into the microphone. If you do it well enough, you’re good and old.

    • Pup Biru@aussie.zone
      link
      fedilink
      English
      arrow-up
      5
      ·
      edit-2
      2 hours ago

      sure, but if an application “requires” age verification for whatever reason, would you prefer the functional equivalent to clicking “i’m over 18 pinky promise” as a standard, or they use biometric data that they all implement differently and then there’s like 33.7 leaks in the next 6 months?

      like the whole thing is bullshit, but a file on disk is a wink wink nudge nudge sure we are compliant bud

      the true unix way: if you text editor you own the world

        • Pup Biru@aussie.zone
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          20 minutes ago

          if only it were that simple in a social and professional context

          i’ll choose linux + a user age metadata standard that’s technically compliant + shit professional application that i have no choice but to use - over windows + exactly that same application any day of the week

        • Shanmugha@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          1 hour ago

          This. And since we are already in the land of geeks, I’ll find a way to write one if none acceptable exists

  • brokenwing@discuss.tchncs.de
    link
    fedilink
    arrow-up
    73
    ·
    14 hours ago

    I recently read an article from the creaters of PopOS. In that they raise a vaild point. If a child installs a virtualization software (say with the concent of an adult for educational purposes), then they can but browse internet through the VM, with them being the root user, pretending to be adults. It defeats the whole purpose of such verification methods. So their plan would to stick with ID based ones.

    I think this was never about age verification, but to uniquely fingerprint every person using internet and to keep accountability.

    Lets face it, the internet you knew is dead.

    • Fizz@lemmy.nz
      link
      fedilink
      arrow-up
      3
      ·
      6 hours ago

      Can you install a VM without root? I assume the kids account isnt being out into a group with virtualization by default.

      • LiveLM@lemmy.zip
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        2 hours ago

        You can. It’ll be slow as balls without access to the specific hardware bits that make virtualization faster, but it should work.
        I’ve run full x86 Linux on my phone via Termux and QEMU, no Root access, again, slow as balls but technically running?
        I see people doing it on iOS too with UTM SE (SE standing for “Slow Edition” since Apple is anal about JIT on their platform)

        On a computer it’ll be even easier, and given the extra grunt, maybe slightly less painful

    • DreamButt@lemmy.world
      link
      fedilink
      English
      arrow-up
      39
      ·
      12 hours ago

      I’ll just do what I’m always done since I was 10

      “How old are you?”

      “115 years young of course”

    • CosmicTurtle0 [he/him]@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      20
      ·
      12 hours ago

      These laws are not written by the technically literate. They are written by attorneys based on the whims of old legislators who think that Siri is a real woman that they are talking to.

      While the people who write the laws are competent, the legislators are not.

      At the state level, it’s even worse because they are often given legislation carefully written by lobbyists and special interest groups.

      If you have any inkling to run for office, please consider doing so because we need smarter people in every branch of government.

  • raicon@lemmy.world
    link
    fedilink
    arrow-up
    152
    ·
    17 hours ago

    Age verification is just paving way for things a lot worse: globally unique identification.

    They ( politicians ) will weaponize the inefficiencies in this implementation to push for an online verification later on.

    And of course Peter Thiel will be somewhere in the middle

    • RealBot@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      1 hour ago

      How is it uniquely identifying users if all that OS shares with programs is the age group? (that btw user chooses, can lie without problem)

    • definitely_AI@feddit.online
      link
      fedilink
      English
      arrow-up
      36
      ·
      edit-2
      16 hours ago

      But think of all the pedophiles it will stop! Surely you don’t want pedophiles to get away with their crimes*? What are you, a pedophile?

      (* T&C apply, if you are a +1B shareholder, please disregard)

      • lemonaz@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        2 hours ago

        +1B shareholder

        Yep, because we all know the last people who would be pedophiles are billionaires.

        (/s obviously)

  • DaddleDew@lemmy.world
    link
    fedilink
    arrow-up
    31
    arrow-down
    1
    ·
    edit-2
    17 hours ago

    The problem with that whole situation is the way the law is written the developer is the one held responsible if a child circumvents the check to access adult content. Therefore, developers will have to pay hefty fines unless they:

    -1: Have a way to positively make sure the person enters their age is telling the truth; and

    -2: Lock this value from being changed by the user afterwards.

    Or: Region lock the OS.

    One can see how incredibly problematic this is for both privacy and true ownership and control over your own machine. There is also a lot that needs to be figured out in the law such as what will happen when someone inevitably finds a way to hack the system to circumvent it, especially the region lock. Ultimately, big tech has deep pockets and can shrug off the fines but small nonprofit open source projects will be killed by them.

    This law is specifically designed to kill nonprofit-run and private software like Linux.

    • Yardy Sardley@lemmy.ca
      link
      fedilink
      arrow-up
      15
      ·
      15 hours ago

      All of this seems impossible to enforce in the FOSS ecosystem. People can just fork the software and remove any restriction they don’t like. That’s kind of the whole point of free software. Users are free to use their devices however they like, including in ways that are not intended by the devloper.

      • Bilb!@lemmy.ml
        link
        fedilink
        English
        arrow-up
        6
        ·
        12 hours ago

        You’re right. Computing devices need to be locked down in such a way that prevents consumers running software that isn’t signed by an approved/licensed software vendor owned and/or favored by an oligarch and existing general purpose computers need to be made illegal. We don’t need “hobbyist programmers” anymore, humans have no place writing code.

    • Krafty Kactus@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      17
      ·
      15 hours ago

      Making the vendor culpable for a user bypassing a software lock is absurd but then again so is this entire bill.

    • foodandart@lemmy.zip
      link
      fedilink
      arrow-up
      10
      ·
      15 hours ago

      This law is specifically designed to kill nonprofit-run and private software like Linux.

      I do not know if that is true. Most of the political hacks writing these bills have zero understanding of computers and do not even consider Linux in the equation. They see Windows, iOS, Android and macOS.

      This is more aimed at mom and dad with three children who have tablets for all the shits and take no responsibility for what the kids do with the devices.

      Linux devs will just step back from releasing code packaged with installers and users will have to compile and set any given program up themselves.

      I use MacPorts and Homebrew for what I need.

      • DaddleDew@lemmy.world
        link
        fedilink
        arrow-up
        11
        ·
        14 hours ago

        You are correct that they have zero understanding of computers. But what you are missing is that they are consulting “experts” who are essentially just big tech lobbyists.

        • bobo@lemmy.ml
          link
          fedilink
          arrow-up
          6
          ·
          14 hours ago

          And when you say consulting, you mean that they’ve been legally bribed with a few mils.

      • bobo@lemmy.ml
        link
        fedilink
        arrow-up
        4
        ·
        14 hours ago

        Most of the political hacks writing these bills have zero understanding of computers and do not even consider Linux in the equation.

        Meta literally broke the record for the most legal bribery in a year over shifting the liability from platform to app store (as they’re facing tens of billions in fines). Apple and Google have been pumping tens of millions to counter it.

        The political hacks are just reading what the corpos wrote for them…

      • definitely_AI@feddit.online
        link
        fedilink
        English
        arrow-up
        8
        ·
        edit-2
        16 hours ago

        The funny thing is, mergers basically aim to create monopolies, where on a long enough timeline a few handful of people have control over the whole financial system and the capacity for production. Kind of like under communism, except instead of elected leaders it’s held by a totalitarian elite of private citizens. So, also kind of like communism.

  • sonofearth@lemmy.world
    link
    fedilink
    arrow-up
    9
    arrow-down
    1
    ·
    14 hours ago

    If I have to age verify to my OS, then I will just want the human race to nuke the entire planet out of existence. It’s better to be dead than succumbing to pedophile lawmakers.

  • Tealk@rollenspiel.forum
    link
    fedilink
    arrow-up
    4
    ·
    14 hours ago

    I utilize the GECOS field within my Ansible scripts to facilitate the identification of these entities as being managed by Ansible.