Reddit -> kbin.social -> kbin.run -> kbin.earth -> piefed.social

5th times the charm, right?

  • 1 Post
  • 64 Comments
Joined 3 months ago
cake
Cake day: August 21st, 2025

help-circle

  • I was taught and fully believed that it was the literal and inerrant word of God, guided by his hand and infallible… so yes, finding errors in it was a disturbing. The authors or it’s age shouldn’t matter if they’re being guided by an all knowing and all powerful being. It wasn’t until much later that I found out how much of it is suspected forgery. Probably could have saved a couple years of agony there






  • Absolutely, C is the weak link. There are ways to mitigate that, though. Like I said, there’s no need for a server. The intermediary can and should be all local.

    As for cloud backups, there’s no reason to keep a log of requests, so there shouldn’t be anything to back up, other than the certs themselves. Even if there is though, that’s in the user’s sphere of influence. De-googling is becoming more and more popular, and there’s nothing preventing you from disabling cloud backups.

    All this is just to take it back to my original point: The idea has some great benefits, but the implementation matters immensely


  • What? So first of, it really doesn’t. You don’t understand evolution if you think that’s what it is, but that’s beside the point.

    You believe that a supernatural sky being made a mud man and a rib woman, who were tricked by a talking snake into eating magic no no fruit. Then 4 thousand years later, a zombie came and made everyone drink it’s blood and eat it’s body in order to get into the good magic sky place.

    It’s real easy to dumb down peoples beliefs and make them sound stupid, especially if you misrepresent them.

    The question was why do you believe in YOUR beliefs. It was not an invitation to be a superior asshole.




  • So I 100% agree with everything you’ve said, and to be clear, I’m not Estonian, have never been to Estonia, and have never seen the system in question, but:

    gives the government a centralized means of tracking individual behavior

    gives private sector actors a central immutable identifiers to associate behavior with that can’t be erased

    I don’t believe that either scenario is possible in the Estonian system. At least, they’ve gone to great lengths to make those scenarios very hard to achieve at either end.

    This is my (probably simplistic, and definitely not guaranteed accurate) understanding of the process using the example of age verification.

    Porn Site A wants to verify User D’s age. D has previously registered their DOB in Govt. System B

    A shows the request to D, which says: I would like to verify JUST that you are over 18. Not your exact DOB, and no ID’s, just enough to prove that you are authorized to view dem titties.

    D then goes to intermediary system C and says: Please generate a 1 time use certificate that proves I’m older than 18.

    C checks with B, and generates a “YES” token that it presents back to A.

    A and B haven’t communicated with each other and B (the govt.) have no knowledge of the transaction, but A still has a valid method of authorizing D without identifying them.

    The problem is C could be tracking the user. I believe in Estonia, this intermediary system is outside govt. control, but is regulated by them. They’re audited like banks. I believe this is supposed to be all local, and would just be a cryptographic wallet for your govt. issued certs, and requests should be between A and your device, not a 3rd party server.

    Another problem is “This site uses cookies” style abuse, and users just agreeing without understanding what they’re agreeing to. They have authorities and laws in place to prevent that theoretically. No idea how effective they are

    Anyway, I kind of went off a bit here. Point is, the Estonian system is pretty robust, and really cool




  • Kraiden@piefed.socialtoToday I Learned@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    55
    arrow-down
    2
    ·
    3 days ago

    The problem isn’t digital id, it’s the implementation.

    The Estonian system is a great example of digital ID done well. It blocks unauthorized access to your data at a policy and technical level. So even if they change the laws, the technology means it’s literally impossible to make the system disclose information without your consent.

    That being said, anything the current US govt. tries to implement around this should probably be treated with heavy distrust.





  • Kraiden@piefed.socialtoLinux@programming.devBuilding a Linux Phone
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    12 days ago

    I just quickly browsed the reviews directly off the page you linked

    https://furilabs.com/reviews/

    The GPS one was from August, and skimming them again now, the impression I get is that it’s a great experience for a Linux phone but that it still requires a fair bit of technical know how.

    Android/iOS level performance

    That doesn’t sound sarcastic, and it pains me to say it but yes, for the core OS and features, I am unlikely to fully commit until it’s at that level of stability.

    I don’t need wide app support, and I’m more than happy to tinker and run compatibility layers and whatever else for 3rd party stuff, but the core features of the phone have to be rock solid. That means GPS, WiFi, mobile data, SMS, MMS, Bluetooth, camera etc etc. need to be absolutely flawless. It’s a safety thing in my mind.

    Not to mention when the rest of my hacky, cobbled-together, bad diy home infrastructure inevitably falls over, it’s usually phone I reach for to fix it. If that starts acting up too, I’m in deep paddle without a creek to stand in

    ETAsk: do you own one? How do you find it? I’ve just read the review you posted and that is really promising


  • Just reading the reviews and it sounds like it’s got problems. GPS doesn’t work, mobile data is sketchy. That’s what I’m talking about. I’m fine to tinker and massage most of my devices into a working state, but not my phone. I can’t be messing around with terminal commands trying to get my gps working when I’m out on a trail for example. Can you imagine if there were an emergency and I first had to try and figure out why telephony was suddenly down before I could call emergency services? My phone is the 1 device that HAS to work flawlessly every time.