• 0 Posts
  • 178 Comments
Joined 2 years ago
cake
Cake day: June 13th, 2024

help-circle






  • There’s nothing illegal about using Tor, which was developed and published by the US Navy and supported by the US State Department. Like other users have said, this is not an exit node which is the only type of node that I would be concerned about running.

    Definitely look into I2P which, in a nutshell, is a peer-to-peer version of Tor. Hosting an I2P router comes with no legal risk, too. Hosting an I2P outproxy would be similar to hosting a Tor exit node, so be aware of that.




  • So this is basically just misinformation. There is no age or identity verification as part of this bill, the age is self-reported by the user and you could select any age you want. The bill requires the operating system to have users select an age when creating an account. The intention is that parents will select their child’s age when setting up their child’s accounts on phones and computers, to age-gate them from accessing certain software or websites.

    Regardless, I don’t support this feature being mandatory, because it limits parents’ choices. Parents should be able to choose to disable this feature entirely or allow their children to use an OS that does not include this feature, if that is what they feel is appropriate for their child.


  • I think the gun analogy does not really work here: you cannot be held accountable for creating any part of a gun, in case of a murder.

    You’re not making the gun, the programmers that wrote the DDoS program did. You’re firing it.

    It’s more like, you and a bunch of your friends murder by getting together and flinging the victim with rubber bands until the victim actually dies. Just because all you did was fling a small percentage of the rubber bands and that wouldn’t have killed the victim on your own doesn’t change the fact that you participated in and committed a murder. Legal systems do not have loopholes that allow you to commit crimes like this. They only have loopholes for the ultra wealthy.





  • Yeah, great, except the bot can literally just write whatever it wants to the config file ~/.openclaw/exec-approvals.json and give itself approval to execute bash commands.

    There’s probably a hundred trivial ways to get around these permissions and approval requirements. I’ve played around with this bot and also opencode, and have witnessed opencode bypass permissions in real time by just coming up with a different way to do the thing it is wanting to do.