CubitOom
- 591 Posts
- 1.67K Comments
CubitOom@infosec.pubOPto
Fuck AI@lemmy.world•How AI Hacks Your Brain's Attachment System (with Zak Stein)English
1·6 hours agoThey aren’t about to squander having insights into the deepest recesses of their most loyal users.
It’s an advertising wet dream.
CubitOom@infosec.pubOPto
THE POLICE PROBLEM@lemmy.world•20+ Fascist Paramilitary Invaders Abduct Ailing 50-Year-Old Veteran at Gunpoint in St Louis Park (Minneapolis, Minnesota - 03/05/26)English
11·9 hours agoI’m describing your comment.
CubitOom@infosec.pubOPto
THE POLICE PROBLEM@lemmy.world•20+ Fascist Paramilitary Invaders Abduct Ailing 50-Year-Old Veteran at Gunpoint in St Louis Park (Minneapolis, Minnesota - 03/05/26)English
21·8 hours agoLet’s form into a coherent unified force by agitating people against eachother.
Edit: Everyone should recognize agitatiors and call them out.
Lateral violence or horizontal hostility is a form of intra-group conflict where members of an oppressed group displace their aggression towards their own community rather than towards the oppressors of the community.[1] Work environments with strong vertical hierarchies and where horizontal hostility is common are associated with poor outcomes for patients and clients.[2] Horizontal hostility benefits oppressing groups and impedes movements that promote social justice.[2]
CubitOom@infosec.pubOPto
Fuck AI@lemmy.world•How AI Hacks Your Brain's Attachment System (with Zak Stein)English
2·12 hours agoExtreme targeted Advertising is coming
CubitOom@infosec.pubto
Technology@lemmy.world•Claude Code deletes developers' production setup, including its database and snapshots — 2.5 years of records were nuked in an instantEnglish
72·13 hours agoDistributed Non Consensual Backup
CubitOom@infosec.pubto
Linux@lemmy.world•Ubuntu, Fedora, Linux Mint Eye Age Verification Amid California Law BacklashEnglish
11·13 hours agoLaws are vibe based too, open to interpretation by design. Look at the Supreme court as an example.
CubitOom@infosec.pubOPto
Fuck AI@lemmy.world•How AI Hacks Your Brain's Attachment System (with Zak Stein)English
14·22 hours ago- Gen AI should be proven safe before deployment
- Gen AI needs to be opt in by default
- Model/agent must transparently show what they are doing
- Gen AI should not be anthropomorphized sycophants designed to make the users stay in the chat and be isolated from other humans
- Gen AI profiteers should be held accountable
CubitOom@infosec.pubOPto
Fuck AI@lemmy.world•BBC News report comparing fake footage with the real counterparts in IranEnglish
2·1 day agoTap for spoiler
🎇❔🎇
CubitOom@infosec.pubto
Political Memes@lemmy.world•Can we talk about the Pedos now Pam?English
3·1 day agoJust seal the cat in a box with a flask of poison, and a radioactive source connected to a Geiger counter and never look in the box.
CubitOom@infosec.pubto
Linux@lemmy.world•Ubuntu, Fedora, Linux Mint Eye Age Verification Amid California Law BacklashEnglish
3·1 day agoI don’t know man, I see this, which is a simple thing a parent can set on an account: are they a child or not. Or, the alternative, which is everyone has to upload their government ID to some third party site, have it stored for all of eternity, and collated and collected, just so they can access discord, or social media, or whatever.
We will never agree on this since your whole premise is built on a lie.
You are claiming that it’s inevitable for the state to govern how we use our devices. When the realty is, that the state does not need to be involved at the operating system level.
If this was actually about protecting kids, then maybe the state should go after tech companies like xAI which hosts a child pornography generator known as Grok.
This is not about that, this is actually a law that will protect xAI, and allow them to continue to generate non consensual pornography including those of children.
If a child sees harmful material like child pornography that xAI generates, somehow that is now the operating system developer’s fault. And it’s not impossible to imagine in a few years the parents would also be legally liable.
CubitOom@infosec.pubto
Linux@lemmy.world•Ubuntu, Fedora, Linux Mint Eye Age Verification Amid California Law BacklashEnglish
3·1 day ago-
Hard disagree, If it doesn’t matter how one uses a computer, then why would one have to comply with the state’s requirement to specify who is using a computer? In this case, the state is regulating the way a minor uses a computer and plans to enforce it with legal action including severe monetary fines.
-
Do you know how digital fingerprinting with metadata works? This information, even just Age brackets will be very helpful to accomplish this.
In respect to everything else, which I appreciate you taking the time to type, it’s important to remember how legal precedent works, how laws are interpreted, and how legal overreach happens.
These two statements are in conflict and cannot both be true.
- “There is no section mentioning penalties for individuals entering false age information. You are completely free to submit whatever age you wish.”
- “It’s literally just closing the giant loophole of “I’m totally over 21” that we all made fun of for years.”
This is the same cat and mouse game that has always existed in prohibited material. There will always be loopholes and sometimes those loopholes will expose users to increased risk.
Note, I haven’t even gotten to the fact that not only computers use Linux. Some refrigerators might use it to run it’s “smart” features. And refrigerators might store alcohol.
Put the onus on the parents.
This is not doing that. It is poorly protecting the distubitors of “harmful content”. Likely, this will only benefit large companies like Meta. If your goal as a parent is to restrict porn websites, some firewall rules would do a better job, and even that is doomed to failure as you won’t be able to add all porn websites. A combination of education, an honest talk with your child, and the realization that abstinence/prohibition does not work would be a better approach than any technical one.
Like as an app developer I can say If !os.isChild showPorn
And what if a website or app doesn’t check this or add a nudity flag for the device/browser to check? Do you think porn sites in other countries will care?
-
CubitOom@infosec.pubto
Linux@lemmy.world•Ubuntu, Fedora, Linux Mint Eye Age Verification Amid California Law BacklashEnglish
31·1 day ago- You are ignoring the premise that an operating system is not a tool for accessing porn.
- Details such as one’s birthdate are absolutely part of your identity.
- There is no such thing as a “child” account in Linux.
- Who pays the open source developers to add this feature?
- Would it be against the law if a child uses
sudo?
- What possible legal consequences might there be?
- How would the state know that a user in compliance with the law?
- what are the consequences if a user or operating system is not in compliance?
- Is this data being recorded in a database?
- If they suspect you have a child using an “adult” account, does the state have the right to seize your computer?
- if a child uses an “adult” account to access “harmful” content and that somehow leads to damages, is there no ability to sue for those damages since the child was committing “fraud”?
- What if an adult is logged into an account and a child uses the computer while the adult is logged in?
The community’s reaction is not “blown out of proportion”. I’d say the reaction is actually not proportional enough.
CubitOom@infosec.pubto
Linux@lemmy.world•Ubuntu, Fedora, Linux Mint Eye Age Verification Amid California Law BacklashEnglish
6·1 day agoAn operating system is not a tool for accessing porn.
To state that this is required for protecting children from porn or harmful content means there is an essential misunderstanding of what an operating system is.
When you say privacy, I say surveillance.
I will not be proving my identity in anyway to my computer. It’s never happening whether you like it or not. I will fork an old Linux distro before I submit to that.
Your argument – that this type of privacy intrusion is inevitable – is also a full of various logical fallacies which i am not going to take the time to list.
CubitOom@infosec.pubto
Political Memes@lemmy.world•Can we talk about the Pedos now Pam?English
12·2 days agoIs this what’s called a dead cat bounce?
CubitOom@infosec.pubto
Lemmy Shitpost@lemmy.world•These RAM prices are out of handEnglish
6·2 days agoRandom RAM!
CubitOom@infosec.pubto
Linux@lemmy.world•Ubuntu, Fedora, Linux Mint Eye Age Verification Amid California Law BacklashEnglish
20·2 days agoThere is a difference between a theoretical slippery slope and a logical path to an obvious goal.
CubitOom@infosec.pubto
News@lemmy.world•Sources Briefed on Iran War Say U.S. Has No Plans for What Comes NextEnglish
7·2 days agoIts gunna depend on what ChatGPT says huh?
CubitOom@infosec.pubto
A Boring Dystopia@lemmy.world•Forget cereal bars, what's your flavor of drug in the morning?English
3·2 days agoWell if you like that, perhaps you’ll also enjoy reading about his deformed genitals.
CubitOom@infosec.pubOPto
pics@lemmy.world•Marine Corps Veteran McGinnis reacts to his broken arm after a forced removal for protestingEnglish
158·2 days agoThere’s no reason for the situation to happen to begin with.









Lateral violence or horizontal hostility is a form of intra-group conflict where members of an oppressed group displace their aggression towards their own community rather than towards the oppressors of the community.[1] Work environments with strong vertical hierarchies and where horizontal hostility is common are associated with poor outcomes for patients and clients.[2] Horizontal hostility benefits oppressing groups and impedes movements that promote social justice.[2]