• 0 Posts
  • 19 Comments
Joined 2 years ago
cake
Cake day: June 14th, 2023

help-circle

  • Yes, all adults.

    Unless you’re proposing that these people on your offender lists are only allowed to date other offenders.

    You are saying that person B is not allowed to date person A, even if both adults consent to enter a relationship, because one of those parties can be sent to jail for the crime of entering into a private consensual adult relationship.

    Ergo, you have removed the ability of both parties to have a mutually consensual relationship of their choosing.

    You haven’t even left the confines of Lemmy, and you’re already running headfirst into unintended consequences.



  • The state has different obligations to protect children than they do adults. Which is why we have things like drinking age laws and legal concepts such as in loco parentis.

    You are completely removing the agency of adults to make their own choices, and instead, inserting the government into those relationships, under the penalty of incarceration and government sanctioned violence, for the crime of having an unauthorized interpersonal consensual relationship between two adults.

    And that’s only taking your proposal at face value and ignoring the plethora of unintended consequences, such as perverse political incentives and privatization.


  • they should be disallowed from participating in a close, intimate relationship

    The legal mechanisms required to enforce that would be some form of government permission and approval structure, such as licensing.

    No amount of rhetorical flourish can get away from what they are essentially presenting, which is requiring government permission for interpersonal relationships.

    How would the government track an individuals approval for personal private relationships?

    How would the government enforce penalties on private citizens who engaged in an unauthorized private relationships?

    And then we get to some fun questions, like what happens if the government privatizes the relationship approval system that OP is proposing?






  • limonfiesta@lemmy.worldtoLinux@lemmy.mlAlternatives to VirtualBox?
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    10 months ago

    Virtual Box is a Type 2 hypervisor, which means it’s running on top of the OS, and not directly on the hardware.

    KVM is a Type 1, which runs directly on the hardware itself.

    There are pros and cons to each, and VBOX is a great piece of software, but it is more resource intensive than other options available.


  • limonfiesta@lemmy.worldtoLinux@lemmy.mlLinux is fucking awesome
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    10 months ago

    There’s plenty of good reasons to keep a windows device updated and available for use.

    Honestly, I prefer that to spinning up a windows VM, especially if your needs include Windows software that interfaces directly with external hardware.

    I realize that’s not an option for everyone, but for those who have an extra device available, or can afford a used laptop to keep in a closet, it’s well worth it IMO.





  • I’m assuming they meant that they were company phones, and that additionally they were required for any work related MFA requirements.

    If that’s the case, it would be YubiKey in addition to, not instead of.

    As for the time tracking software, those are often part of a much larger accounting, payroll, and/or HR software suite. Having his team spin up Windows vms, or even have separate older windows boxes somewhere, probably makes more financial sense than not. At least, until they can switch to a more modern suite that has a web portal.



  • Might be workable if you settle on combining only 2 to 3 keys (small, medium, large) per hex.

    Or, learn metallurgy and material science to find some new polymer or alloy that would be strong enough.

    But honestly, it sounds like a really expensive endeavor that even if you made it work, isn’t practical enough to justify the cost.

    Maybe something like the universal socket wrench style could influence a design that’s workable as a multi-hex, and be made cheaply enough.



  • You just answered your own question. How many users click approve without thinking? How many install Xposed modules that intentionally, or unintentionally, create security issues?

    I didn’t say rooting will break your security, just that it can. Rooting exponentially increasing the attack surface, which for some users isn’t a concern, but for your average user, it probably should be.

    In this case, this person wanted to increase his privacy, which is why I recommended what I did.

    Also, FWIW, there’s a reason why GrapheneOS and DivestOS specifically design their ROMS to NOT be rooted and to RELOCK the bootloader.