ransomwarelettuce

joined 2 years ago

Nothing special tastes like bleach with pineapple notes.

[–] ransomwarelettuce@lemmy.world 1 points 2 months ago

Yeah Disney is a shitty corp, but common majority of those movies are mostly fine.

[–] ransomwarelettuce@lemmy.world 111 points 2 months ago

"You may be eligible ..."

Yap it's a honeypot.

[–] ransomwarelettuce@lemmy.world 4 points 2 months ago* (last edited 2 months ago)

I will throw another two

Mind of a junkie - Anders Osborne

Que Sera Sera - pixies

[–] ransomwarelettuce@lemmy.world 11 points 3 months ago (4 children)

Correct me if I am wrong isn't it :

If it's brown lay down, if it's black fight back and if it is white goodbye

[–] ransomwarelettuce@lemmy.world 1 points 3 months ago* (last edited 3 months ago)

At least here in Portugal we have a eletronic ID platform that provides some services that could be one of them.

What I was saying was going to that platform or app ( they have a app I think too ) grab a token generated for that website specifically and paste it.

Than the website would receive the token and given a key received by the gov to operate in the contry gets the playload and checks if the person is of age.

[–] ransomwarelettuce@lemmy.world 4 points 3 months ago

I was mentioning the token payload witch would be only the age or a boolean value.

[–] ransomwarelettuce@lemmy.world 1 points 3 months ago (2 children)

Yeah . . . Now being devil's advocate faceID would prevent that.

But still if instead of bounding a cert to a device we went to a gov platform for a limited time token/OTP it would work too. It could be shared too but so could u ask ur brother to show up in the facescan before entering a website.

[–] ransomwarelettuce@lemmy.world 3 points 3 months ago

Yeah I was overcomplicating things when a token approach maybe even generated with a card reader or through a gov platform is way more simple.

And would not be hard to implement now that I realise there are many solutions like that such as JWT, SSL, GPG, OTP, etc ...

[–] ransomwarelettuce@lemmy.world 2 points 3 months ago* (last edited 3 months ago)

Tbh honest I am against the idea of blocking gov blocking websites.

Parents should be responsible for their kids online presence and exploration using existing tools for such control. For that though people would have to know how to use such tools and unfortunately many do not and there is a lack of programs to teach the parents how to use them.

But I agree with u I am overcomplicating things, was just letting my mind wander and now I am realising that a simple gov generated token or a key with which we could generate such token and pass it to website would be the easier and most logical way like a user pointed out.

This whole ID and face recon honestly could be replaced such system and I would be OK with it.

[–] ransomwarelettuce@lemmy.world 2 points 3 months ago

What I was implying was something local that somehow determined the age of someone, of course such device would have to sign that info with a gov key to limit explotation.

But still everything local, but having to sign the info to make it credible I think like someone suggested a gov issued temp token would be a better solution.

31
Age verification (lemmy.world)
submitted 3 months ago* (last edited 3 months ago) by ransomwarelettuce@lemmy.world to c/science@lemmy.world
 

Lately there has been a lot of controversy about age verification and it's implementation in places such as UK and US.

The main critic to this mechanism is due being done through facial recognition or a government ID which are privacy invasive.

So here is my question as someone who comes from IT, wouldn't it be possible to create a device which just gives out true or false depending if the person is of age, given some kind of piece of DNA (hair, blood, nails) ?

I known there is carbon dating, but from what I understand is a bit of complicated process. The human body however shows it's age visually and I would be interested to know if genetically there are some signs as well that could be somewhat used in a automatic process.

Again I come from IT, just curious about the implications and your takes on the problem.

view more: next ›