Stalking can present real, immediate, and severe consequences to the target(s).
Dead Comment
Dead Comment
Stalking can present real, immediate, and severe consequences to the target(s).
if it's unreasonable to expect a child to clear this bar, then they are not yet responsible enough to be entrusted with their own computing device.
When do they get clearance to use their brains?
Just like in infosec, controls (etc) do not guarantee safety (accuracy), but they let you know that processes were followed and that fact is documented. Third parties (accounting firms) confirm that you have the evidence of having followed your processes. Corruptable? Sure. Better? Definitely yes.
Just like in infosec: if you have evidence that every week you've plowed through the access logs, you're more likely to have caught an intruder/mistake. The approach tends to route out single acts of sloppiness and subterfuge and turn mistakes in to conspiracies, which is a much harder thing to pull off than a single actor looking for fame or a raise.
For my part, I genuinely believe these organizations are trying their best to do something very hard but that their own efforts at fairness can be undermined by a lot of factors, especially money. The natural incentives (clicks/$) need to be counterbalanced with self-imposed "regulation" that is third-party verified.
[EDIT: s/factories/factors
You're going to stop having conversations, or will you be recording them all?
Not to say you shouldn't, but it isn't easy and requires a lot of consideration, energy and discipline.
The digital tools are definitely NOT ready, there's a few gigabytes of raw mathematical data to be processed by humans into algorithms before we get there.
Maybe starting from something like an Arduino is a better route for that.
Relying on security through obscurity is bad, but you need some obscurity.
Passwords and keyfiles are ultimately a form of security through obscurity.
https://en.wikipedia.org/wiki/Advanced_persistent_threat