+1 for Explosions & Fire and Extractions & Ire. This guy puts out videos where he’s synthesizing various explosives or just extracting weird compounds from things, all laced with a blend of Aussie humor and shitposting. Highly recommend
- 0 Posts
- 6 Comments
jabberwock@lemmy.dbzer0.comto
No Stupid Questions@lemmy.world•Is it completely impossible to do age verification without compromising privacy?
2·1 month agoCould tie it to something like a biometric. That and storing it on a write-only device would keep it from being shared too wide. The trickiss to tie it to a true multi-factor and not just something you have (if unencrypted) or something you know (if ASCII armored).
jabberwock@lemmy.dbzer0.comto
No Stupid Questions@lemmy.world•Is it completely impossible to do age verification without compromising privacy?
2·1 month agoI’ll address the second objection first regarding the phone or browser. You’re always going to rely on some technology for the solutions that use cryptography, you just can’t do those calculations long-hand realistically. That said, look up frameworks like CTAP that allow a potentially untrusted user terminal, like a browser, to interact with a trusted hardware token. Those hardware tokens can be made fairly tamper-proof, see FIPS authorized Yubikeys, such that the phone is pretty much removed from the attestation process. Yes these can still be stolen, but they make hardware keys that are fingerprint authenticated and the biometric stays on the device. Doesn’t get much more self-sovereign than that.
The existence of a trusted credential provider is a challenge. Fully self-sovereign credentials need to either be trust on first use or validated against a larger system everyone participates in. Even if we had some system of birth certificates tied to a distributed ledger, we would have to trust the third party recording that certificate in the first place, be it a hospital, doctor, or state entity. These trust and proof systems don’t create the trust, they just allow us to extend that trust from one claimant to a verifier. Whether you place that trust in the state, an individual, or an independent third party is up to you.
jabberwock@lemmy.dbzer0.comto
Technology@lemmy.world•After police used Flock cameras to accuse a Denver woman of theft, she had to prove her own innocenceEnglish
24·2 months agoFor anyone unaware, there is a community effort to map these cameras. https://deflock.me/
jabberwock@lemmy.dbzer0.comto
Technology@lemmy.world•Everyday AI looks more like the '08 housing bubbleEnglish
8·3 months agoI’ll play devil’s advocate here: agreed that the rest of the (US) economy seems to be slowing or shrinking but remains buoyed by AI / Mag 7 stocks. That said, a lot of the investment reflected above is in data centers and hardware (Nvidia, Coreweave, Oracle, Microsoft).
The bubble pop will hinge on whether there is value in this data center buildup beyond AI. Unless everyone starts paying fistfulls of cash for AI chat, these companies may be able to find another use for all that compute and avoid a total crash. That could be a target for all that investment you mention.

I use StartMail (mentioned on the bottom of the guide) and it supports unlimited email aliases. They don’t have a free tier though to my knowledge.