Hacker Newsnew | past | comments | ask | show | jobs | submit | duskwuff's commentslogin

Other advantages include:

- It's much easier for web sites to implement, potentially even on a page-by-page basis (e.g. using <meta> tags).

- It doesn't disclose whether the user is underage to service providers.

- As mentioned, it allows user agents to filter content "on their own terms" without the server's involvement, e.g. by voluntarily displaying a content warning and allowing the user to click through it.


This exact method was implemented back around the turn of the century by RSAC/ICRA. I think only MSIE ever looked at those tags. But it seems like they met the stated goal of today's age-verification proposals.

That's why I have a hard time crediting the theory that today's proposals are just harmlessly clueless and well intentioned (as dynm suggests). There are many possible ways to make a child-safe internet and it's been a concern for a long time. But, just in the last year there are simultaneous pushes in many regions to enact one specific technique which just happens to pipe a ton of money to a few shady companies, eliminate general purpose computing, be tailor made for social control and political oppression, and on top of that, it isn't even any better at keeping porn away from kids! I think Hanlon's razor has to give way to Occam's here; malice is the simpler explanation.


How would flying drones be useful to a drug runner? Their priorities are to transport a large amount of material over a long distance and to avoid detection. Drones have a relatively low payload capacity, have limited range, and are easily detected - they're not practical.

(A very different kind of "drone" has seen quite a bit of use in drug running - remote-controlled submarines! They've proven able to carry a large load over a long distance while remaining hard to detect.)


There are commercially available drones that can carry a payload of high-single-digit to low-double-digit kilograms for at least 10km.[1] They fly low enough and are small enough to avoid most radar.

Their use in cross border smuggling of weapons and drugs is well documented[2]; interception rate is low enough that they can make multiple runs before being downed, and they can pay back their purchase cost with only a few successful runs. Typical concept of operations is similar to manned ground crossings, but with drones covering the most dangerous 5-10km of actually crossing the border: a team on one side loads them up and sends them to a team on the other side, with both having a LOT of real estate to hide in because of the drone's range.

(I work on counter drone EW, and border-control customers are under intense pressure to get this under control.)

[1] Just from DJI, see e.g. the Matrice 400 [https://enterprise.dji.com/mobile/matrice-400/specs], with 6kg payload and approximately zero purchase controls; or the T25 [https://ag.dji.com/mobile/t25p/specs], with >20kg of payload capacity, and even in restrictive regulatory regimes only requiring a shell crop spraying company to buy.

[2] https://www.maariv.co.il/news/military/article-1183896


Which is generally believed to have been a radiosonde launched by hobbyists in the US:

https://www.npr.org/2023/02/18/1158048921/pico-balloon-k9yo


> Things like [...] are now considered table stakes.

One other feature that's absolutely considered table stakes now is persistent server-side history, with the ability to edit and delete messages. Modern chat services are less like IRC, and more like a web forum with live updates.

(Yes, you can poorly emulate server-side history on IRC with a bouncer. That's not enough, and it's a pain for users to set up.)


There's also quassel which solves the problem a bit like a bouncer but it's way more integrated, it just loads the scrollback on demand instead of just banging the latest 200 lines into my buffer when I connect. Solves the problem perfectly IMO and there's a really excellent android client.

It's still not server-side history, though - you can't join a channel and see what happened before you joined, or edit a message you've already sent. It's just a slightly cleaner implementation of an IRC bouncer.

Hmm no but that's usually a good thing. I've had some late night chats where I knew all the other people around and it would not be so cool if anyone else could just join and scroll back to it.

In fact this is the reason some irc networks blocked matrix bridges at first (they now have settings to disable this)

I'm not saying mainstream people should use IRC though. Matrix is better for that.


It's situational. In a lot of contexts, especially in large public chats, being able to see history when you join is perfectly fine and good.

Telegram lets group admins choose whether members can see history from before they join, which is the perfect solution (IMO).


>One other feature that's absolutely considered table stakes now is persistent server-side history, with the ability to edit and delete messages.

Indeed.

Ergo offers server-side history but I'm not sure it supports edit/delete yet.


> Ergo offers server-side history but I'm not sure it supports edit/delete yet.

I don't think it does, no. I've only just started using it, though.


Even wilder - they're claiming to look at a user's activity on the platform - like what servers they're on, what games they play, and what hours they're active - and infer adulthood from that. No way that'd pass legal muster.

Account age and credit card history can tell a lot. If Discord can assume you were at least 7 when you first signed up for Nitro and you've been a Nitro member off and on since Discord started 11 years ago, you are at least 18.

It seems like these systems would be very easy to reverse engineer. Pretend to be an old person on Discord (whatever that entails) long enough to get them off the case.

I'm curious just how wrong they're going to be about the ages of people who work from home or use a mobile device at work.

> It's such a successful strategy, even Bitcoin scammers use it:

For years, email spammers have claimed to have tracked victims' porn habits to try to extort them. That's a far cry from actually doing so. (And no, they aren't actually doing it.)


Right? I have a spam folder full of automated "we saw what you did and recorded it and we're gonna send it to everyone unless you give us bitcoin".

Not to mention "seriously", "really", "truly", "very", "verily", etc. There's a long history of using words related to truth as intensifiers in English.

America's war on balloons has been ongoing for some time:

https://www.npr.org/2023/02/18/1158048921/pico-balloon-k9yo


It's still pretty common in the demoscene.

What's less common, but still seen occasionally, is their opposite: "fuckings".


There's an easier and more effective way of doing that - instead of trying to give the model an extrinsic prompt which makes it respond with your text, you use the text as input and, for each token, encode the rank of the actual token within the set of tokens that the model could have produced at that point. (Or an escape code for tokens which were completely unexpected.) If you're feeling really crafty, you can even use arithmetic coding based on the probabilities of each token, so that encoding high-probability tokens uses fewer bits.

From what I understand, this is essentially how ts_zip (linked elsewhere) works.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: