Hacker Newsnew | past | comments | ask | show | jobs | submit | more stvltvs's commentslogin

Puts message in a bottle and tosses into the most convenient black hole.


Doesn't the black hole compresses the bottle beyond recovery?



In the hospitality sector, tariffs (and harassment of tourists at the border) are reducing earnings by reducing tourism.


This assumes that education's sole goal is to prepare students for work.

What would be the impact on democratic systems if voters always turn to an LLM for answers because schools didn't require them to think on their own?


This is simply raising one specific case of something education is expected to train for. There is already ample evidence that critical thinking skills are essential for political function and social stability.


It also needs to prevent sharing the age verification token.


Agreed. As an adult, I would use a VPN to bypass ID requirements to preserve my privacy.


Which they're fully aware of. They will eventually at some point pass a law requiring you to identify yourself to the VPN and/or government.

This decision is ultimately about the end of the last vestiges of anonymity on the internet, unfortunately.


Whatever technical solution is implemented needs to:

1. Not inform the authentication provider about which websites you're visiting.

2. Not inform the websites about your meat space identity.


Add

3. Not allow someone who gets both (1) a log of authentication provider transactions, including timestamps, who was being verified, and whatever output the provider generated, and (2) a log of the website's age checks including timestamps, website accounts, and whatever proof was provided to match them up to associate real IDs from the authentication provider with website account IDs.

To make this work I think any such system will need to be so widely used that there are hundreds or thousands of verifications happening every second at each authentication provider and typical users get verified many times a day, and there should probably be some random delays introduced by the user's computer.

Otherwise it could be too easy to unmask people by looking at verification timing. If you are trying to unmask a user who verified through provider P and P only did a verification for one person that day it is very likely that is the person you are trying to unmask.


At this point, I can't even imagine a return to normal governing, let alone good governing. Like imposing enormous fines for ISPs selling user traffic data for packet analysis, to sell name-associated web traffic data to any company or foreign power even when the user is behind a VPN.


Unless I'm missing something, what I'm describing satisfies both of these (unless one or both parties are malicious).


> (unless one or both parties are malicious)

It should be assumed (for the purpose of evaluating if a system is actually secure) that they both are, and are working together.

Validation can be done cryptographically so that assertions (like age) can be verified by one party, and consumed by another party, without either of those parties being able to tie the combination together, even if they are actively cooperating.


We should be careful not to equivocate between pedophilia which in the technical jargon of research studies is a sexual attraction to pre-pubertal children and child sexual abuse which loosely is the act of sexually assaulting someone below the legal age of consent. They are two different things. An abuser might not be a pedophile in the technical sense, and a pedophile might not be an abuser.

So rates of pedophilic attractions and use of CSAM could be rising while rates of child sexual abuse is falling. I don't know if that's the case, but we shouldn't confuse the two things.


Not true. Human tetrachromats have an extra kind of receptor somewhere between the blue and red receptors' sensitivity. This doesn't help with colors like violet that are outside of that range.

Also, purple (a non-spectral color) is easily distinguished from violet (a spectral color) if you see them side-by-side.


There exists a shade of purple that is indistinguishable from violet because it triggers the cones of the eyes at the same level that violet does.

You can buy paint called "violet". This isn't the spectral violet, it's a shade of purple that looks very similar to spectral violet.

Tetrochromats can distinguish between that purple shade and real violet. But if you mixed the paint using 4 tints rather than 3 you could fool them too.


Source?

edit: You may be confusing tetrachromacy with people who don't have a lens and can therefore perceive ultraviolet light that's normally filtered out. These folks can see shades of violet where other people don't because the blue receptors are being stimulated by the ultraviolet light.


Exactly this, purple ≠ violet. They don't even look the same.

You won't see violet on a computer screen because it's a higher frequency than what blue LEDs produce. You won't see it on the output of consumer-grade printers for similar reasons regarding the color of the ink.

The easiest way to see actual true violet is to pass sunlight through a prism onto a white surface.

Purple on the other hand is a mixture of red and blue frequencies that stimulate both kinds of receptors in your eyes. It looks like a reddish blue that can't be produced by any one frequency of light.

True violet looks like a deep, deep blue without any red tint.


I imagine most of us prefer to know that a real person is on the other side of an image, but I'm sure there are plenty of us who don't care. In any case, AI porn still has a certain vibe that is detectable.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: