

You are asuming the cost of a network card and a microchip is higher than the profit they expect from the ads. Many smart TVs are cheaper than an equivalent dumb TV


You are asuming the cost of a network card and a microchip is higher than the profit they expect from the ads. Many smart TVs are cheaper than an equivalent dumb TV


It could also be solved in any other way.
Everybody puting the toilet upside down. Everybody going outside and not having a debate anymore. Everybody outing the seat up. Everybody getting a seatles toilet.
The “everybody agreeing one one solution” is the thing that ends the debate and not what the solution is.
Because somewhere on their side they have a synchronization process that runs periodically every 10 minutes. If you click the link directly some of your information will be sent to a system that doesn’t yet know the link has been sent because it wasn’t synchronized.
Complete failure of design but from an IT standpoint it is understandable.
Not sure if there are tar pits with dinosaur bones but there are bones (not petrified bones) of post-dinosaur megafauna like sabertooths in the La Break tar pit in Los Angeles. There probably exists a real dinosaur bone somewhere on the planet.


Both of those are screwed over by the healthcare system and the companies perpetrating it. If you cant afford healthcare or don’t understand it because it is to convoluted, that is a result of the policies of healthcare providers.


The verifier does not have the information which sites you use. That’s the point of the setup. All communication goes through you, never the site to the verifier directly. You only pass cryptographic values between them that does not include identifiable information (neither about you to the website, nor about the website to the verifier). The verifier knows who you are, the website knows that you are old enough. Nothing else.


This system does nothing to protect against an allowed user helping a not allowed user to gain access
There is no system in the world that can fully prevent an authorized user to grant access to an unauthorized user. Even with an all time on camera and screensharing I can still find ways to have someone else control my computer while I “authorize” the connection with my face in the camera


Super easy. Technology has existed for quite some time and was already used in the encrpytion of web traffic.
Basically: you sign up with your “age verification institution” (ideally a service of your government because they have your ID anyway and no profit motive). This involves createing a private key (reaaaaaaaaaaly long password that is saved in a file on your device) and saving the public key with that institution. They also check your ID to ensure your identity and your age.
When you want to visit a 18+ website, the website sends you a nonce (loooooong random number). You take that nonce and send it to the verifier, along with a signature of your private key (and the age they want you verified against). The verifier verifies your signature using your public key. They then sign the nonce with their own private key, thereby verifying, that you, the owner of your private key (whos identity and age they have verified) are above the asked age theshould. You then send the signed nonce back to the 18+ website and they can verifiy the signature to confirm that a trusted age verifier has verified your age.
The site never has access to your identity and the verifier never knows which site you visited, only that you wanted to visit a website that wants to know if you are of a certain age.
(The corresponding technology was used for OCSP Stapling in TLS verification … and has been discontinued last year because nobody was using it …)


You can read right?
Führer = Hitler
Something-Führer / Führer-Something = not Hitler


The word Führer is 99% used for Hitler. There are many variants that are OK to use though. Most notably Anführer (if Führer is leader, Anführer would be “the one who leads ahead”) which is the common word to use for leader. Others are composites like Bergführer (mountain guide).
The swastica also existed before the nazis but is now forever tainted.


Infinities don’t care about the actual numbers in the set, but about the cardinality (size). Obviously the numbers between 0,1 and 1,2 are different but have the same size.
But 0,1 and 0,2? Size is unintuitive for infinities because they are … infinite. So the trick is to look for the simplest mathematical formula that can produce a matching from every number of one set to every number in the second. And as somebody has said, every number in 0,2 can be achieves by multiplying a number in 0,1 by 2. So there is a 1 to 1 relation between 0,1 and 0,2. Ergo they are the same size.


I think the “men evil”, “woman good” is just worded to strongly but is generally true (not actually true, but people considered it to be true).
Its more “men dangerous”, “men threatening” and not “evil”. A man in a women’s bathroom is a threat. A women in a mans bathroom is there because there was a line for the woman’s bathroom. The actual reason for those scenarios does not matter, the man will be seen as an invasion and a perpetrator. I have personally experienced examples of neutral situations as well (going to the woman’s bathroom as a man without negative reactions) but the general discourse about the topic is pretty clear.


You don’t get hacking protection from bots
I disagree. I don’t know the details of cloudflares bot detecion, but there are many automated vulnerability scanners that this could protect against.
I said that instead of crashing the system they should have something that takes an intentional decision and informs properly about what’s happening.
I agree. Every crash is a failure by the designers. Instead it should be caught by the program and result in a useful error state. They probably have something like that but it didn’t work because the crash was to severe.
What’s the point of your complaint if you do agree?
I am not complaining. I am informing you that you are missing an angle in your consideration. You can never prevent every crash ever. So when designing your product you have to consider what should happen if every safeguard fails and you get an uncontrolled crash. In that case you have to design for “fail open” or “fail closed”. Cloudflare fucked up. The crash should not have happened and if it did it should have been caught. They didn’t. They fucked up. But, i agree with the result of the fuck up causing a fail closed state.


it shouldn’t crash the whole thing: if the bot detection module crahses, control it, fire an alert but accept the request until fixed.
Fail open vs fail closed. Bot detection is a security feature. If the security feature fails, do you disable it and allow unchecked access to the client data? Or do you value Integrity over Availability
Imagine the opposite: they disable the feature and during that timeframe some customers get hacked. The hacks could have been prevented by the Bot detection (that the customer is paying for).
Yes, bot detection is not the most critical security feature and probably not the reason someone gets hacked but having “fail closed” as the default for all security features is absolutely a valid policy. Changing this policy should not be the lesson from this disasters.


Yes but no. If you use a different service for the same purpose as you would use cloudflare you will be just as offline if they make a mistake. The difference is just that with a centralized player, everyone is offline at the same time. For the individual websites that does not matter.


sifting through data, finding patterns and acting based on patterns. Its potential applications in medical diagnostics or surveillance …
Those are the "expert systems’ they were talking about. ML systems and not genAI. They are not the AI people mean when they use the word AI.


Sadly they dont. At least not nearly to the extend that they should be.


I also noticed how every post just has 5-10 random down votes. Like perfectly fine post in the correct community, not controversial, no rules broken, -10 down votes.


“Nö” is a very childish “nope” in German (maybe even also in Swedish I don’t know) so a Nö-bel Prize would be very fiting
It can not exist. Microsoft can and will bring it back if they want to. Unless you are also disabeling all windows updates, the computer will never be under your control. And disabeling windows updates … lets just say there hasnt been a month without a 9-10/10 security vulnerability in a microsoft product in a long time.