Women are as much biological sex robots as men. We've all see tinder data. Connection is just a proxy for whatever 'protect my offspring' is in base pairs.
The mechanisms that attack one attack the other as well. The apparatuses which exist to de-anonymize communication also remove the ability to definitively keep the content of the communication private, and no government (UK or EU or US, etc) that has proposed a ChatControl-like scheme has ever used a method that did not allow them to do both.
If a porn site checks my ID against a gov database, the gov now knows I went to that porn site. That is a loss of both anonymity and privacy.
I'm completely against all infringements of privacy, but,
>If a porn site checks my ID against a gov database, the gov now knows I went to that porn site. That is a loss of both anonymity and privacy.
This is not necessarily true. It is possible to design systems much more like CRL than OCSP, including identity or even just age verification systems. Consider the FedGov sharing a list of public keys tied to identities of people over the age of 18, updated daily, while issuing corresponding private keys to citizens. The citizens could use their private key to sign a challenge issued by the adult media website, who would simply verify that the public key tied to the signed challenge response exists on the list of all public keys tied to identities of people over 18 issued by the fedgov.
With this system, adult websites would not need to send any identifying information to FedGov, nor would private citizens be disclosing any identifying information to the adult website - not their name, not their address, not even their date of birth, just cryptographic proof that they're in possession of a private key that corresponds to the identity of an adult.
Sure, kids could still conceivably obtain cryptographic private keys, just as they can obtain photographs of state-issued government ID that are currently used for age verification.
The real problem with schemes like these isn't the technical feasibility, but rather the capacity of the citizenry to understand and perform their own cryptographic key management.
I have proposed a similar PKI-based system myself before, but no government is proposing this because the point is not to protect children, it's to de-anonymize and surveil.
Neither are eroding our democracy. They are both states of information, not actors.
What you mean is, bad actors are eroding our democracy using anonymity to avoid negative repercussions, but Fox News, OANN, Newsmax hosts, etc, with their names and faces attached to their message, have hurt democracy far worse and more efficiently than internet trolls, and with even less pushback.
Sounds like a company is not adequately defining what the deliverables are.
Task: Walk to the shops & buy some milk.
Deliverables:
1. Video of walking to the shops (including capturing the newspaper for that day at the local shop)
2. Reciept from local store for milk.
3. Physical bottle of Milk.
1. A whitish liquid containing proteins, fats, lactose, and various vitamins and minerals that is produced by the mammary glands of all mature female mammals after they have given birth and serves as nourishment for their young.
2. The milk of cows, goats, or other animals, used as food by humans.
3. Any of various potable liquids resembling milk, such as coconut milk or soymilk.
And when on the receiving end of the deliverables list, it's always a good idea to make sure they are actually deliverable.
There's nothing worse than a task where you can deliver one item and then have to rely on someone else to be able to deliver a second. Was once in a role where performance was judged on closing tasks; getting the burn-down chart to 0, and also having it nicely stepped. Was given a good tip to make sure each task had one deliverable and where possible—be completed independent of any other task.
Well, I think in this example someone else wrote down “buy milk”. Of course I would generally know what that’s likely to mean, and not buy the ridiculous thing. But someone from a culture that’s not used to using milk could easily get confused and buy the wrong thing, to further the example. I guess my point was that it’s never possible to completely unambiguously define when a task is done without assuming some amount of shared knowledge with the person completing the task that lets them figure out what you meant and fill in any gaps
In 1945, about ~90k people died over 2 days from the Tokyo Firebombing. Do you think it would be difficult for any modern millitary - that intentionally wanted to cause as much collateral damage as possible - to greatly exceed that number?
Not sure what is your point. The Israeli military could throw a few atomic bombs and wipe out the entire population in Gaza. That they don't is a sign of restraint for you?
It shows the poster they responded to was wrong when they said "It would be pretty difficult for the IDF to increase their level of collateral damage.".
It wouldn't be difficult at all to increase collateral damage, just fight like they did during ww2 and collateral damage would skyrocket.
80% of buildings in Gaza are destroyed. There are well documented cases of arbitrary killings of civilians and attacks on hospitals. IDF is routinely demanding entire cities to be evacuated, knowing that not all people can comply with such an order. Multiple war crimes and crimes against humanity investigations have been opened by national and international prosecutors.
It is very obvious that the only restraint that the IDF is showing is that they do not kill every single civilian on sight.
Demanding cities be evacuated is what you do when you have restraint. Otherwise you would just kill everyone inside. If they had not done this, you would also claim that it's evidence of lack of restraint.
Beyond that, everything you wrote is perfectly compatible with the IDF showing tremendous restraint. It is all more or less inevitable with any war in such an environment. All of it happened in Iraq with the Americans, for example.
- Buildings destroyed aren't people
- Documented cases are just that - cases. You need to demonstrate a pattern at scale. Bad cases are inevitable among millions of interactions.
- Investigations opened is a signal of political incentives as much as actions taken.
Now you're saying, okay they do have restraint, but what I really meant was their restraint is driven by the PR concerns, not by their own moral hearts. Well, that's pretty different accusation now.
I'm glad you've conceded the original point that they do indeed have restraint. Thank you.
"It doesn't matter how beautiful your theory is, it doesn't matter how smart you are. If it doesn't agree with experiment, it's wrong" .... unless it's economic theory.
People say to me, "Donald, I said nothing. I thought of nothing to say." And they're right! They right! They said nothing, they thought of nothing to say.