Hacker News .hnnew | past | comments | ask | show | jobs | submit | elwebmaster's commentslogin

This! Absolutely needed regulation. Why is it that such a clearly beneficial and necessary piece of legislation is not making its way through the legislative bodies of the world while age checks somehow magically appeared universally?

First we need to understand what the root cause of the problem really is then we can discuss solutions. All we've been told is that "Android users are getting scammed, we are going to make side loading impossible". There is no clear cause and effect established, no data shared with the public on what percent of scams were caused by sideloaded apps and how the scams actually operate for us to be able to accept the solution.

> no data shared with the public on what percent of scams were caused by sideloaded apps and how the scams actually operate for us to be able to accept the solution.

They will not share the data because the data goes against their public stance.

Apks are already very annoying to install for your average user. The scams will target the web, the playstore and then as a very last resort, direct installs


What public stance do you mean? Did they say somewhere that sharing statistics about Android is against their morals or what do you mean?

Their stance is that they want to lock up Android, if they start sharing the truth, it just doesn't support their goals

Why would you say "semi-legally"? Nothing "semi" here. What is "semi-legal" is making hardware e-waste by deciding it is "no longer supported". It is "semi" legal because it is legal under the corrupt political systems in most of the world but is criminal against humanity and the planet we all call home. In that sense if you can prevent e-waste trough any means you are a hero.

The semi legal process it's reverse engineering the code. I watched the video she uses gidra and other descompilation tools. The video it's really good

Can one be opposed to age verification in the OS and yet totally happy that Meta got this fine? There is a very big difference between e2e encryption /telephone and social media. Social media is more akin to a phone book. I do not recall there ever being any phone books listing minors. That's completely unacceptable and unnecessary. I am totally OK with phonebooks (or their modern digital equivalents which enable people discovery and user generated content discovery) to abide by the same KYC rules as banks. And be only for adults. Your kids using e2e encrypted messaging to communicate with their friends whom they have met in person? Nothing wrong with that, we all have the right to privacy. Kids listing their contact information publicly? Absolute no.

What techies are missing is that AI doesn't make it possible for mom and pop shops to create and manage a website but it levels the playing field for enterprenuers. We can't expect plumbers and restaurant owners to spend 12+ hours fighting with AI website builders just to get a cookie cutter-website that is nothing more than a brochure. Nor can they fork thousands of dollars for web design agencies and spend months in mindless meetings. Thanks to AI now there is a way: small mom and pop local website builders can offer a white-gloves solution that scales and drives revenue for the SMBs.

They have already been doing that for 10-15 years via page builders and themes in Wordpress. It is easier now, but small players have had relatively decent tools for quite some time.

Exactly this. It was already very easy. Just choose a local hosting company, most of them have free ssl and one click installs for wordpress etc.

People are overthinking it.


Most people hired someone for handling WordPress. Rally, most people are overwhelmed with that complexity.

Most people are indeed. Many of these people will also be able to complete very difficult tasks that you can't.

Sure, thats why people hire others... I just wanted to say that even with WordPress it's not easy to build a website.

You should mention that it uses PeerJS. That's not without servers. PeerJS runs their own signaling server which you are relying on to connect your peers.

Anything taxpayer funded should be open source to begin with.


Similarly taxpayer funded contracts for any type of infrastructure (obviously I have digital infrastructure powered by proprietary solutions in mind) should only be awarded if interoperability is guaranteed to prevent lock-in and abuse.



Just got a SPAM email from a Github scraper while reading this thread:

From: james@techglobal.website Quick note – your GitHub profile Hi X,

I came across your profile on GitHub. Given you're based in the US, I thought it might be relevant to reach out.

Profile:

I run a technical team (full-stack, cloud, DevOps) that delivers for clients. We're looking to work with an engineer based in the US on client-facing coordination—discovery, requirements, alignment—while we handle delivery. If that might be relevant, I'd be glad to set up a short call.

Regards, James

If I had to guess, "James" is a North Korean looking to scam US clients, based on my experience with shady actors.


Checked my spam after seeing this thread and found the same sender/email. Subject and signature are slightly changed.

From: james@techglobal.website Brief note – Following up on your GitHub work

Hi ,

I came across your profile on GitHub. Given you're based in the US, I thought it might be relevant to reach out.

Profile:

I run a technical team (full-stack, cloud, DevOps) that delivers for clients. We're looking to work with an engineer based in the US on client-facing coordination—discovery, requirements, alignment—while we handle delivery. If that might be relevant, I'd be glad to set up a short call.

Best, James


I'm curious, what leads you to North Korean from that email? Is it that there's an anonymous team, which has a US "front"?


Yes, having a US "front" is how North Koreans pass the identity verifications at US companies looking for remote workers. I have personally spoken with numerous such individuals. Think about it, if you were a legitimite organization attempting to gain US presence would your first action be to SPAM individuals on Github or to register a business and submit a job post on LinkedIn?


And had the highest proportion of ignorant users.


While it can happen to anyone npm does preselect the users most likely to unknowingly amplify such an attack. Just today I was working on a simple JS script while disconnected from the Internet, Qwen Coder suggested I “npm install glob” which I couldn’t because there was no internet, so I asked for an alternative and sure enough the alternative solution was two lines of vanilla JS. This is just one example but it is the modus operandi of the NPM ecosystem.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: