• 3 Posts
  • 472 Comments
Joined 2 years ago
cake
Cake day: June 11th, 2023

help-circle
  • He then said I groomed him.

    He was trying to make himself feel better about being creepy with a kid. He’s wrong is this situation. There isn’t really any room for ambiguity.

    Neither of us were exactly saints

    You were a kid. Kids are entitled to do dumb stuff while figuring out how social interaction works, and should not feel bad about it years later. He was an adult, pretending to be a kid online and being very creepy. Depending on exactly what he said, sent, or requested, his behavior may even be criminal in some jurisdictions.


  • Reading through this story, I don’t see any mention of sexual contact, which would make it pretty hard for there to be any sexual assault. If I’m reading this right, it looks like you, as a child had a purely online relationship that was half roleplay and half real with an adult.

    If you knowingly misled him, kids do dumb things sometimes; don’t do that again. If he knowingly mislead you, he’s an asshole. If he continued having romantic or sexual chats with you knowing your real age, he’s a creep.









  • Something becomes an addiction when it is unreasonably difficult to stop doing it in order to address something you would consciously rate as more important. That could mean biological needs like food or sleep, social needs like work or seeing friends and family, or self-improvement like exercise or pursuing hobbies other than video games. It is not determined primarily by hours spent.

    Of course if you have no other hobbies, never exercise, don’t have friends, and actively minimize other time commitments to maximize the time you can spend gaming, most people would consider your lifestyle imbalanced. That doesn’t make it an addiction though, and if you’re an adult, what kind of lifestyle you want is ultimately up to you.



  • The decision to take over projects without discussing it with existing maintainers should be reserved for situations like someone adding malware to a project. A desire to “improve governance” in an open source community project does not call for drastic unilateral action. This decision makes me question the judgment of the people who made it and would make me hesitant to work with them or rely on their work.

    It looks like Matz, the creator of Ruby is now overseeing things. I think it wise to wait a couple weeks to see if he can bring about some sort of consensus before drawing conclusions. Rumor has it, he’s nice.

    DHH doesn’t seem nice. I’d be happy about a change to Rails governance.


  • The who has supplied them part is the critical point here.

    I’ll give an example outside of digital technology. If Ford sells a car with Michelin tires on it, Ford has some responsibility for those tires even though I can also buy them from Joe’s Tire Shop and put them on any car with the right size wheels. I can also buy Continental tires from Joe’s Tire Shop and put them on my Ford car. Ford has no responsibilities in relation to Continental Tires or Joe’s Tire Shop.

    If Samsung preloads WhatsApp and Android on a phone, Samsung has to know where it got WhatsApp and Android. If I download Signal from https://signal.org/android/apk/ and install it on a Samsung phone running Google Android, neither Samsung nor Google is a party to that.

    The CRA, including the parts you’re quoting does not impose any obligation on anyone with respect to a product or component they never touch.


  • The OS or a phone both fit that definition.

    Yes it does, and it means someone making and selling either has to have a certain level of knowledge about it supply chain.

    An app fits the definition of a component.

    If it’s bundled with the OS, it probably does. In that case, the OS vendor is a manufacturer and has a variety of obligations relative to the app detailed in article 13.

    If the user is obtaining it directly from the developer and installing themselves, it doesn’t really matter if it’s a component or a product because the OS vendor is not distributing or manufacturing anything. If the app/OS combination were to be treated as a system of which the app is a component, it is the user who has manufactured that product by combining the two. If the user is not selling that system, they have no obligations under the CRA.


  • Apps definitely qualify as products with digital elements. The term that determines whether Google has obligations is this scenario is ‘economic operator’ Here’s the definition for that:

    ‘economic operator’ means the manufacturer, the authorised representative, the importer, the distributor, or other natural or legal person who is subject to obligations in relation to the manufacture of products with digital elements or to the making available of products with digital elements on the market in accordance with this Regulation

    When Google distributes apps via the Play Store, it is very obviously the distributor, which is defined:

    ‘distributor’ means a natural or legal person in the supply chain, other than the manufacturer or the importer, that makes a product with digital elements available on the Union market without affecting its properties

    If someone else distributes apps using other infrastructure that happen to run on an OS that Google made, Google is not the distributor and does not incur any obligations that apply to distributors. (For completeness, Google is obviously not the manufacturer, authorised representative, or importer either.)



  • Zak@lemmy.worldtoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    arrow-up
    15
    ·
    17 days ago

    No. ClamAV can, for example scan Linux ELF executables and its database contains signatures for malware that could affect desktop Linux. The most common use case is servers that are distributing files, but it can be used to scan local files.

    The local use case is fairly rare because malware targeting desktop Linux is rare. That’s partly because Linux users tend to have a better understanding of computers on average than Windows users, and partly because the sort of attack vectors that work well against Windows users don’t align with Linux workflows (e.g. if you want to execute a file sent as an email attachment, you’ll have to save it and set it executable first).