Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)F
Posts
21
Comments
209
Joined
2 yr. ago

  • "Duck!"

    "Ooh, where--"

  • lmao, what?

  • obligatory navier-stokes equation

  • Grandiloquent/sesquipedalian. It's what you get when you use everything in this thread ₍^ >ヮ<^₎ .ᐟ.ᐟ

    /s

  • Specifically, it refers to a deep understanding.

    [A critic] notes that [the coiner's] first intensional definition is simply "to drink", but that this is only a metaphor "much as English 'I see' often means the same as 'I understand'". (from Wikipedia)

    When you claim to "grok" some knowledge or technique, you are asserting that you have not merely learned it in a detached instrumental way but that it has become part of you, part of your identity. For example, to say that you "know" Lisp is simply to assert that you can code in it if necessary – but to say you "grok" Lisp is to claim that you have deeply entered the world-view and spirit of the language, with the implication that it has transformed your view of programming. Contrast zen, which is a similar supernatural understanding experienced as a single brief flash. (The Jargon File; also quoted on Wikipedia)

  • In 2003, Bill Burr wrote “NIST Special Publication 800-63. Appendix A” -- a security document that recommended passwords be changed every 90 days, and have irregular caps and special characters. When asked about it, and the resultant trends in people adding !@#$%^&*() to the end of their passwords, Burr said something enlightening:

    "Much of what I did I now regret."

    Lmao

    so yeah I hit the Bitwarden generate button and forget

  • -1 accuracy point ( ◞ ﹏ ◟)

    linux 4.5-rc5 had efivarfs fixed to prevent "rm -rf /" bricking uefi motherboards -- so maybe someone can try it out? :]

  • Lots of good answers here but I'll toss in my own "figure out what you need" experience from my first firewall funtime. (Disclaimer: I used nftables -- it should be similar to ufw in terms of defaults though).

    • Right off the bat, everything unneeded was blocked. I "needed" no configuration, except for maybe...
    • Whatever CUPS runs on (when I use it)
    • Sometimes I ran python -m http.server -- I unblocked port 8000 for personal use.
    • I chose to unblock port 53 (DNS). I wanted to connect to another computer via hostname IIRC (e.g. connecting to raspberry-pi.local. I might be misremembering this though).
    • At one point I played with NGINX -- that's port 80 (HTTP) and port 443 (HTTPS).
    • SSH was already permitted (port 22 -- you need root access to enable traffic through ports below 1024 anyway so this wasn't an issue for running typical apps)

    I didn't use WireShark back then, really. I think I just ran something like

     bash
        
    sudo lsof -nP -iTCP -sTCP:LISTEN
    
    
      

    which showed me a bunch of port traffic (mostly just harmless language servers).

    You don't have to dive to deep into all the "egress" and "ingress" and whatnot unless you're doing something special. Or your software uses a weird port. (LocalSend lol)

  • I definitely agree. Back then, the bad stuff was often more... innocent, grassroots-ish? (With exceptions.) Like, if you stumbled on a cartel beheading then no one was trying to sell anything to you.

    Nowadays it's markedly more corporate -- there is ad revenue in constructing an extremist pipeline, and anyone can see how content has sprung up to assume that vacuum. (Try opening a private browser tab and watching only Ben Shapiro videos. The algorithm will eventually point you to Trump conspiracy videos with AI voiceovers. Last time I did this was before Cambridge Analytica changed their name to Emerdata though so I'm not sure if it's the same.)

    One thing: you mentioned that there was a pipeline in "'fun' kids content". I've only seen stuff like that directed at early, questioning teens (the Discord offensive-jokester type) -- does this "'fun' kids content" thing target even younger ages now? Because I've yet to hear of that.

  • You prevent them from waking up earlier, huh? Youngsters definitely have infinite energy at the odder times. I sure did my fair share of waking up early to increase the fraction of the day I gamed for.

    This is a pretty convincing stance in favor of timers, actually. The idea of transferring video-watching from the iPad to the television is a friendly way to prevent an unchecked iPad-kid situation. My opinion shifted a little. :P

    Do you have timers on the iPad for any mobile games, or just YouTube?

  • Your stance on the age-inappropriate reminds me of what @southsamurai commented! I've definitely seen a lot of "Don't protect your child too hard by concealing the inappropriate from them" lately. I wonder how many modern parents are shifting to that ideal.

    "Kids respond well to being treated seriously." (from Vox, "Why safe playgrounds aren't great for kids", 3:17)

    You mention that there are some cases where parental controls would help, but you also mentioned that, (1) regarding inapproriacy, you shouldn't baby children and (2) regarding screen time, BananaKing's take is the best route. Doesn't that cover both aspects of where parental controls would be used? What cases would you say parental controls would help with?

  • Someone downvoted but I want to hear your differing stance so I upvoted. (Come on fellow lemmings . let's melting-pot a little!)

    Anyway -- your belief is interesting, though I feel like I might disagree! Seems similar to @Contramuffin's upbringing, but more extreme.

    How would you train them beforehand? Or would you just drop them into the archetypal sink-or-swim? Don't you think the kid would feel lonely, say, if they stumbled on a jumpscare video and got the heebie-jeebies but you didn't help? Everyone makes mistakes. And outside of scarring -- what if your kid turns into one of those YouTube Kids jockeys?

    Is your hypothetical "Tough shit, deal with it and get stronger" approach similar to how you were raised?

  • That makes a lot of sense! Definitely much less friction in that approach -- clearly delineated boundaries, decently low pressure, and secure trust without the ethical quandary.

    ...don't attempt technical solutions to administrative problems.

    Good advice.

  • Thanks for the in-depth response!

    My parents "let health class do the job" and kept their eyes closed -- regarding porn -- so your punishmentless one-on-ones are new and interesting to me. Trust is definitely the most vital here.

  • Someone downvoted you but I'd like to hear differing opinions, so I upvoted.

    By teaching the child how to circumvent these measures, what do you mean by that? Do you teach them to break your router rules? And when would you do that -- when they appear mature enough to you? Of course, there's the chance that they don't like tech.

    Imaginarily, my kid and I could have some arms-race fun, but I don't know how realistic that is.

  • Hah! Faraday Cage, nice. Location spoofs too!

    Interestingly, the route my mother took was, when I went off to college, she asked me if she could track me. We discussed privacy (who has my location?) and security (Is the protection endeavor proportionate to the threat chance?), and I demonstrated a basic location spoof (I am in control of my data).

    In the end, we agreed to allow some monitoring.

    That's different of course -- it's a rare (I think) circumstance and consent, and isn't quite parental control, as both parties had equal grounds to form said consent.

    I wonder if such a conversation could happen among younger children. 12 to 13 y/os maybe? Depends of course.

  • That's fair. Subscribing to a singular doctrine doesn't make sense, and there are lots of culture gaps to acknowledge.

    What about for you specifically? To what extent would you/do you digitally monitor your kids (if you have any or not)?

  • Oh I love the "walk me through what I'm about to do" concept. Dry runs should be more common -- especially in shell scripts...

    The world would be a better place if every install.sh had a --help, some nice printf's saying "Moving this here" / "Overwrite? [Y/N]", and perhaps even a shoehorned-in set -x.

    Hope your r/w wasn't eaten up by the subfolder incident (that I presume happened) :P