• 1 Post
  • 39 Comments
Joined 3 months ago
cake
Cake day: July 5th, 2025

help-circle















  • Not to mention that the scraped indexes can and should be shared. Unfortunately what OP is seeing may be a move to thwart this type of brute force scraping, and might resolve as dynamically assigned domain addresses, where the URL of a set object is temporarily assigned and streamed only to a single or group of IP addresses that request it within a given timeframe before being rotated out until found in search again and then reassigned a new URL, etc. This is a frankly stupid use of resources, but can effectively be used to prevent crowdsourced indexes from proliferating, and to punish IPs or even MAC addresses or browser fingerprints associated with downloading and reuploading videos which almost certainly have stegnographic fingerprinting embedded that associate with who the video was served up to at the time it was downloaded.



  • I looked around a bit more, seems to be regional which is growing faster. UK Meshcore is growing fast, which makes sense since core devs are there. I haven’t found a good statistics source for node numbers, probably for the best given the network goals. Meshtastic of course is older so has the inertia lead, but the security and routing of Meshcore definitely is appealing to me and seems better for emergency situations where text messaging reliability is top priority.




  • If only I were the king of the world!

    I think what you are arguing for is hardcoding requitement for signatures with an “age appropriateness” ranking into the OS. How does this change the current situation where adult sites and apps are legally required to have an age verification popup/warning? Whether signature based or graphically based, what is at issue here is age verification which means referring to some “repository of truth” outside the will of the user. The problem is that the effect of this is to link government ID directly to web traffick, as to truly verify age requires verifying identity meaning abolishing anonymity on the web and enabling complete tracking of dissent.

    I could see a version of what you are describing akin to the way physical cryptographic keys are used to manage DRM on high end enterprise software, where identity/age verification would need to be done by the hardware vendor and not the software/site, the problem with that however is the aftermarket and multiple-user devices. You could say that the “age key” would be a hardware device sold to adults using physical ID akin to spirits or tobacco, something like a SIM Card but preferably with NFC rather than having to be installed in the device. “Adult Access” would then be enabled on sign-in by scanning the “age key”, enabling onboard software to serve software and sites that don’t have an “all ages signature”.

    Honestly as I write this, it isn’t the worst solution, the main thing would be keeping the Age Key as an interchangeable, replaceable device that only interacts with the OS and isn’t referenced by other software, so it doesnt just become another Digital ID proxie.