top | item 46366308

(no title)

dzikimarian | 2 months ago

Where exactly children have this access in your opinion?

discuss

order

Nevermark|2 months ago

Let’s start with friend’s devices. Children have lots of devices and lots of friends.

Friend’s phones, home computers and devices of other family members.

Unattended PCs and laptops at school. According to a music teacher who has literally had to clean her work computer after it was used for erotic viewing by students when the music room in a temp building wasn’t otherwise in use.

Web browsers on game consoles, e-readers, VR headsets, smart TVs, tablets, …

Now throw in constant device turnover, software updates, including settings panel changes, and settings values that get reverted, across the board.

I am not sure why you wanted my opinion. That’s less of an opinion and more of a list of what counts as ordinary for the last decade or so.

dzikimarian|2 months ago

So if we secure personal devices of children, with simple, standardized "child-owned" marker, we're basically back to 80s/90s, where children could occasionally get access to adult material via friends or irresponsible adults.

In my opinion that's more than enough, especially when you compare it to requiring everyone to identify themselves. It may be ZPK on the tin, but likely it will be close-source, corporation owned implementation, which will have holes. Then in a few years we will learn that Meta exploited them for years to sell your soul for ad money.

Btw - students occasionally steal teacher's cars. Should we block engine start with ID check too?