California decides that account creation - including Linux - needs age verification

2»

Comments

  • @esyede said:

    @kako1talk said:
    Good luck to the California government trying to enforce a KYC check on a headless Debian instance deployed via an API script.

    Politicians legislating technology is always an absolute comedy show. I can't wait for the new Linux kernel patch that requires us to drink a verification can before getting sudo privileges. 😂

    If you want information, feign ignorance reply with the wrong answer. Internet people will correct you ASAP!
    It’s OK if you disagree with me. I can’t force you to be right!

  • AnthonySmithAnthonySmith ModeratorHosting ProviderOGSenpai

    Well that's it then, who's up for starting a private internet?

    No JavaScript allowed

    TierHive - Hourly VPS - NAT Native - /24 per customer - Lab in the cloud - Free to try. | I am Anthony Smith
    FREE tokens when you sign up, try before you buy. | Join us on Reddit

  • Legally, does anyone understand the wording to mean local vs. online account? In other words, the difference between a Microsoft account vs. a local machine account (in the MS world)?

    @AnthonySmith said:
    Well that's it then, who's up for starting a private internet?

    No JavaScript allowed

    https://gmi.skyjake.fi/lagrange
    https://en.wikipedia.org/wiki/Gemini_(protocol)

    Let's do it!

  • @hornet said:
    Legally, does anyone understand the wording to mean local vs. online account? In other words, the difference between a Microsoft account vs. a local machine account (in the MS world)?

    If you remember, unless you do some black magic (windows shell) and rebooting, you CANT sign up with a local account on a new windows install. I mean I had to look it up every time i install windows to the point i remember it as well as i remember my old windows XP cd key :lol:

    @AnthonySmith said:
    Well that's it thæn, who's up for starting a private internet?

    No JavaScript allowed

    https://gmi.skyjake.fi/lagrange
    https://en.wikipedia.org/wiki/Gemini_(protocol)

    Let's do it!

    Step one, do not use internet routing, meaning run cables manually from house to house. VPN network security can still be broken. Same with Tor network.

    I mean now a days, people can use WiFi to track people's positions from the shadows they cast!!!

    As I see it, the best network that is still yet to be hacked is your dream, but I rather not meet any of you there :lol:

    If you want information, feign ignorance reply with the wrong answer. Internet people will correct you ASAP!
    It’s OK if you disagree with me. I can’t force you to be right!

Sign In or Register to comment.