Utah’s VPN Ban Law Goes Into Effect in Age Verification Escalation
Utah is attempting to cover up the failures of their age verification law by effectively banning VPNs.
https://www.freezenet.ca/utahs-vpn-ban-law-goes-into-effect-in-age-verification-escalation/
#Censorship #News #Privacy #Security #AgeVerification #encryption #law #legislation #US #Utah #VPN
@h4890
I'm at a at a similar spot. Vocation & role of father involves protecting the family in a defensive manner that may involve force.
But that is a far cry from the justifications for war we hear today on national level that are built on future theoretical possibilities.
"Because of their rhetoric, We have to destroy them before they might be able to destroy us."
Bombings & killing of innocents NOW based on some perceived future possibie action by them against us.
Israel/USA do this.
Friends & Followers, I'm back from my week off (having avoided the news completely since last Sunday) and normal commentary & posts will re-commence tomorrow morning.
Thanks to everyone who sent me supportive messages after the post about my respite time off, I really appreciated your good wishes.
My batteries are recharged (appropriately enough given some of the recent discussion in the timeline) & I feel refreshed.
AI bubble: OpenAI’s business model is ‘falling apart’ | Ed Zitron
https://www.youtube.com/watch?v=fmK40iq-U6Y
All 3 of my aunts were married off before they turned 15. Hundreds of thousands of little girls are married off legally and systematically in Muslim countries. This isn’t something that happened to Aisha 1400 years ago. This isn’t something that can be whitewashed by calling Aisha “Mother” and pretending she was revered. This isn’t over yet. Little girls are doomed to a lifetime of abuse under Islam
I don’t want to run a mitigation that doesn’t need to be run. Just in case that introduces a problem in a system that is currently working fine and not exploitable.
So from what I’ve learned so far:
lsmod | grep algif_aead
this checks to see if the exploitable module is loaded.
You can check if the module is present in the system, but not currently loaded with:
modinfo algif_aead 2>/dev/null
If that returns information, the module is present and could be loaded.
But you have to have root privileges to load the module.
So my logic is that if
lsmod | grep algif_aead
returns nothing, the vulnerable Linux kernel module is not loaded and therefore not exploitable… even if the module is present on the system but not loaded.
Please correct me if I am wrong.
If claude code detected that you were cheating on it with another harness, it would silently route requests to the more expensive "extra usage" endpoint even if you had tokens left on your normal plan.
https://github.com/anthropics/claude-code/issues/53262