this post was submitted on 10 Mar 2026
370 points (98.9% liked)

Technology

82488 readers
3968 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] BigTrout75@lemmy.world 37 points 12 hours ago (2 children)

The whole law is dumb. They need to create a standard universal method first. So when does this protection get applied? Can't somebody just boot a thumb drive?

[–] starblursd@lemmy.zip 2 points 2 hours ago (1 children)

All the other problems with it aside literally this... All operating system providers, including Linux somehow, are supposed to implement a system with a background API that can be pinged by websites through a method that hasn't even been made yet.. concept of a thing to your software that communicates with this other concept of a thing or else we fined into the ground effective in less than one year... Good luck.

Pssst Microsoft.. pssst Apple... Don't worry we'll send you exactly what to put in your code. Just keep it to yourselves tho

[–] Archr@lemmy.world 1 points 1 hour ago

How I understood it would be that the api could be implemented as an API contained within your os. So it would be more equivalent to comparing it to a system call like open file or allocate memory than a REST API.

[–] night_petal@piefed.social 15 points 11 hours ago (2 children)

Can't somebody just boot a thumb drive?

This has gotten me especially curious about Tails.

[–] nutsack@lemmy.dbzer0.com 4 points 4 hours ago* (last edited 4 hours ago) (1 children)

when major websites start doing this weird browser or os based signature verification, tails isn't going to work very well on them anymore. using the internet without your signature will probably be about as fun as it is to browse with tor right now

[–] night_petal@piefed.social 1 points 4 hours ago (1 children)

That's what I was afraid of, and that sucks because using Tails could mean avoiding prison or worse for journalists doing certain work.

[–] nutsack@lemmy.dbzer0.com 1 points 1 hour ago

journalism is dead

[–] partofthevoice@lemmy.zip 9 points 9 hours ago (1 children)

It’s a solution that seems so divorced from reality… I don’t quite understand how the expectation is reasonable, unless the goal is to force complaints to surface from the OS developers so that they can refine future versions of the law with more accuracy.

Because Linux distributions can be created free-willy. Just check out Linux From Scratch, Gentoo, etc. Same with live boot from USB, same with stripped down server distros like Alpine — you have the same issue.

Linux isn’t a product in the same way that other products can be regulated. It would make more sense if they defined clearly who this law actually targets, being something that is actually enforceable; something like this:

  • Any general-purpose computing device sold to consumers that includes an operating system capable of executing third-party applications…
  • All systems built after date must include a MINIX subos that reproduces this API…
  • All browsers with GUI must support integration with the API, if they also want to support viewing of sensitive content
  • All porn distributors must validate age range via the API exposed via the browser, or refuse serving content

That at least makes some sense. In a way, it only targets PC distributors and porn distributors. The end user could still do whatever they want, but porn distributors may not serve content to them without the functionality described.

[–] LedgeDrop@lemmy.zip 9 points 8 hours ago (1 children)

Because Linux distributions can be created free-willy. Just check out Linux From Scratch, Gentoo, etc. Same with live boot from USB, same with stripped down server distros like Alpine — you have the same issue.

I don't want to be "that person", but here's how it could play out...

The "free-willy" distros would not fulfill the "trust" requirements needed to pass the "certification process". You can still use them, but think of it like running custom firmware on your cellphone: you're not going to be able to access your bank, but somethings will still work.

Larger distros (Red Hat, Ubuntu, etc) would pay to pass the "certification process", but this would come by making certain concessions:

  1. The kernel would not be allowed to be tainted. Which means you can only use official kernel modules provided by your vendor (no self-compiling)
  2. Certain kernel modules would needed to be removed (or nerfed). For example the Fuse filesystem.
  3. You could probably keep root access or at least a nerfed version of it.

Then with theses concessions, your PC world be deemed "reliable" to perform the necessary age verification and have this confirmation passed through your browser to your favor porn site.

[–] partofthevoice@lemmy.zip 12 points 7 hours ago (1 children)

Damn, that sounds like gunk. I’ve been so exciting about the day and age when phones reach the same level of customizability as a PC. Little did I know, they want to phoneify the PCs instead.

[–] EndlessNightmare@reddthat.com 2 points 1 hour ago

Yeah, I have wanted my phone to be more like a computer for a long time, not the other way around! This timeline sucks.