• 14 Posts
  • 2.44K Comments
Joined 3 years ago
cake
Cake day: June 16th, 2023

help-circle


  • Groups like the ones pushing data centers can and do literally hire people to figure out how to get in the politicians’ good graces, convince the politicians it is not only a good idea but the best idea, stoke the politicians’ ego(s) such that they think they know best/better than the people they supposedly represent, and then literally train the politicians on how they can do an end run around their constituents to get things passed by the letter of the law but clearly not the intent of the law.

    I know Louis Rossman can be a controversial figure due to how he communicates things, but he’s been doing a good job exposing how Flock surveillance cameras are getting passed/governmentally funded in shady ways in numerous jurisdictions where they have negative public support. It would be silly to expect that the tactics they are using are also not in use by the much larger forces with deeper pockets behind all these data center pushes.


    I absolutely have less than zero respect for politicians, but I seriously cannot imagine living a life almost entirely surrounded by people deeply trained to manipulate my emotions, sense of self, and self validation towards corporate ends. Beyond all the obvious life experience/world view differences due to wealth and socioeconomic strata, that’s fucking terrifying.


  • I agree, but I think there’s less spaces for that then there used to be, and I don’t think 13 is a particularly unreasonable age for access to still be restricted. It’s probably the older end of when I’d be trying to teach a kid proper online safety and behavior before starting to loosen the reins, but every kid is going to be different. Some would be ready earlier, and others later.

    I think we just disagree on where the middle ground might lie, which is probably to be expected on complicated topics like this. Everyone’s going to have their own take.

    I definitely wouldn’t be comfortable tossing a hypothetical kid into the deep end, so to speak, at 13.

    On top of that, kids are resourceful with a ton of time on their hands. Sufficiently motivated kids will find ways around restrictions (I sure did, locked doors without a deadbolt are not a real lockdown, lol) or friends with less restrictions anyway, and there’s some value to allowing them to think they’re getting away with things and navigating on their own, regardless of whether I as a parent would really be aware of it or not.



  • So I am a parent, and while my daughter is still a toddler (3), I’ve thought about it a lot. These plans may not hold as time goes on, but it’s what I’ll be working from at least.

    We have an old Android tablet that is “Daddy’s” where I’ve used ADB to remove almost every app from it, and hide the others. It has Disney Plus (some kids shows), Newpipe (set to open right to a playlist of pre-vetted stuff, mostly Sesame Street), and VLC (Mr. Rogers, Muppet Movies and Specials, some Looney Tunes). It only comes out on long trips (car rides more than two hours long), use is always supervised, and we lock the touch controls as much as we can once the content is playing so she can’t stray into other YouTube content or the more grown up stuff on Disney.

    I’m already working on a Kodi setup with just content for her on it as well, which is reach-able from the living room TV and will be on the play room TV if it gets one. All of Mr. Roger’s Neighborhood is up on archive.org, and she loves it. Wife doesn’t like piracy though, so I can’t just get baby girl’s Disney shows on it and make it a one stop shop.

    As she gets older, we may set her up with an old laptop and edutainment games, but it would be entirely offline. Maybe a Minecraft server for her and friends we’ve met IRL. A co-worker runs one for his tween and it seems to do well used that way.

    I don’t think we’ll be allowing internet until 12 years old or so. Even if she needs it earlier for school, she’ll start on an isolated network segment to reduce chance of any malware spreading to the whole house. Use will be in a common area of the house where Mom and I can see what she’s into at a glance. It will be filtered with PiHole or whatever the modern equivalent ends up being, to block both ads and inappropriate content. Ad blocker on the device itself with similar settings if possible to help catch any strays.

    As she gets older, start teaching media and advertising literacy, as other comments have suggested. As we do that, we slowly scale back the training wheels/filters. Depending on how well we think she’s ready, I can see unattended, still filtered, but somewhat monitored at 14 maybe. Cut the content filters at 15 maybe. Cut the ad filters at 16 maybe. That’s all going to be super-dependent on her own “internet and ad literacy” though.

    I want her to get enough of an idea of the unfiltered and ad-ridden internet that it’s not a danger to her, but I do hope she’ll decide to use ad blocking for her own sake.

    17 or 18 it’s completely hands off. Can’t protect them forever, and she’ll need to learn one way or another.

    My goal is to protect her from creeps, protect her from exposure to stuff she’s too young for, and to make sure she’s prepared for the wider internet hellscape before dropping her in the deep end unsupervised like I was.

    I’d be very interested in hearing the experience of any parents who have already been through this.


  • That was always my assumption of the end game. You have the system prompts, an advertising bias prompt layer over top, then the user prompts.

    “Naturally worded” advertising that doesn’t immediately appear to be advertising and searching using natural language always seemed to be the biggest use cases for LLMs to me, considering they can’t be relied on to output accurate info.








  • Rookie mistake. The password is what we write on a sticky note and tape to the edge of our screen.

    Birthright membership in the Domain Admins group is what keeps all our users from being pestered when they want to install that neat new tool they found. Then you don’t need to harden the built in admin account against attacks, you can just disable it!


  • It’s not always for lack of trying. I spent a year or so building the integration (from a box of scraps!) between the shiny new HR system and our IDP. This integration was supposed to be functional out of the box according to the HR system salesgoblin. It didn’t just need to be configured, it needed to be built from scratch because they didn’t actually support hybrid AD/Entra setups managed from the AD side. Which was only the unofficial standard for Windows based shops at the time.

    Anyway, I wanted to make it grant employees access to shit based off a combo of Job Title and Department. On a technical level, it’s basic baby stuff. Concatenate the Dept and Title into a string, use that as the key to a hashtable with the access they need listed. Bish bash bosh, bob’s your uncle.

    It would have been a cakewalk compared to all the shit I had to build for handling separations and all the data retention shit around those.

    But none of the department managers could actually tell us what the fuck their workers needed access to. Like maybe 3% had any idea at all. And I didn’t have the team or time to try and do data analytics across the access of everyone at the company just to get an unreliable best guess.

    So it just handles setting new hires up with the basic access everyone gets and separations. Still a savings of ~1 hour per employee.


    It’s been something like 7 years since I built that integration. They’re finally going to replace it with a true access management platform. It’s cost them multiple millions so far, has an entire new department dedicated to the thing, it has been “in-progress” for two years, and it still hasn’t replaced my shit yet.

    My favorite part is when they come to me months in to something they’re trying to get working, and I’m able to point them at where they made mistaken assunptions at the first step leading to the mess they’re currently in.

    I provided a ton of in-depth notes on our current standards, the weird gotchas/deviations, every single stumbling block and edge case I had found, all the seemingly logical and safe assumptions that don’t actually hold. I don’t think they read any of it. I keep asking them to reach out before they start working on a new piece of functionality. They don’t.

    So now I get to tell them things like “that assumption you built this piece of logic off of will bite you in the ass in this specific way”, they say they’ll take it under consideration, and I laugh knowing this whole project will probably implode under the weight of incorrect assumptions before it’s finished.





  • Anarchist ones are also blacklisted in a lot of places.

    Nope, they’re actually some of the larger servers (which is still pretty small all things considered, lol).

    For lemmy, there’s the instance/server I’m commenting from: lemmy.dbzer0.com

    It was built by the former head mod db0 of reddit’s /r/piracy, so piracy discussion is cool here too. They’ve also made a decent bunch of software for lemmy servers, like a database/review system for lemmy instances, and a CSAM detection tool.

    The instance also tries to handle as many big instance/server decisions as they can democratically (donators/supporters and community members vouched for get to vote, and the rest of the server’s users act as tie-breaker).