What happens when they move from default dns to ech with pinned dns servers? I was reading about ech a bit yesterday so I could keep up with apps trying to circumvent dns filtering on my kids' devices.
Usually I require a root cert so devices can have their traffic inspected or be isolated into an unsafe network where most nonessential traffic is blocked by default. I suppose letting an iot device connect will become more risky in the future when I can't control the dns resolver or can't confidently block requests through dns alone.
It's either because the non-ad-driven tvs cost more, resulting in too few sales to sustain (because no lifetime revenue from data sales) or the lifetime revenue from data sales is so profitable that companies take the risk on being undercut by a market entrant that will sell dumb tvs.
My guess is that the vast majority of people will trade data for a cheaper price point every time (my wife is certainly one of these people), so the market just can't support the volume of sales necessary to make the price point of dumb tvs competitive.
Lol I remember back in the day when we used to replace the windows logo during boot with our own bitmaps (if I can appropriately remember the file format) at school. We showed kids and suddenly every computer was booting with unexpected media. Admins were not pleased.
But the real fun began when we showed people how to set bios passwords and that cascaded into kids rendering an entire classroom of computers unbootable.
And then there was the time I thought I was really clever because I realized I could open arbitrary files in notepad, so I attempted to edit save files for a learn-to-type program by replacing the score with my own. It seemed to work so I told my friends and then they started copying the same save file into their program files. I don't remember exactly what happened, but I do know the UI update did not propagate to the actual scores and also it introduced a bug into the prodgram which would cause it to crash at distant future epochs, so we destroyed the program for everyone, not just our user profiles. There was an investigation and I think they gave up because the same bad file somehow was on everyone's computer and everyone just told them they got the file from someone else and there was no root of the chain.
This is all to say, any bypass will be identified and implemented at the speed of virality.
The law necessarily exists for parents that aren't tech literate, since we already have the ability to monitor and lock kids out from adult content.
Do we really think parents will notice that a kid has installed a specific executable? The purpose of this law is to allow parents to outsource caring out which executables are safe, so there is no reason they would check.
Plus a kid can just live boot from a USB if the parent doesn't lock the bios, which would give them an ephemeral session to do whatever they want without the parent knowing unless caught-in-the-act.
And some adults will lie too, assuming they don't need adult content, to avoid being tracked for advertisements, if laws exist that prevent ad targetting on some demo, say <13 year Olds.
Wait until they learn about live booting, VMs, keyloggers, etc. The goal of this bill is to set precedent that this can be regulated by the gov. Five years down the line they will complain it's not working and move to require tpm-based remote attlestation to prove the software isn't altered in order the authenticate with an isp.
I agree with you, but then the implication becomes, "any platform that allows user content must scan all content posted or uploaded by the user to determine if any of it suggests they are a minor".
I adds a bit of burden to all sites under the threat of civil penalties. Say I own a site that allows user posts like HN. If someone mentions they're in grade school in any post and later starts receiving links to adult sites in their DMs, now I'm liable.
Agreed. Which is why I think the OS level is dumb. Kids can just live boot or launch a vm or keylog their parents' account.
If it's windows, they can just live boot into the OS and get access to pretty much all the files anyway, if the parent didn't encrypt things.
My point is, if the implementation is trivial to bypass, why do we need this legislation? Just let the parents use the existing tools we have and parent.
Usually I require a root cert so devices can have their traffic inspected or be isolated into an unsafe network where most nonessential traffic is blocked by default. I suppose letting an iot device connect will become more risky in the future when I can't control the dns resolver or can't confidently block requests through dns alone.
reply