• 2 Posts
  • 286 Comments
Joined 2 years ago
cake
Cake day: June 11th, 2023

help-circle


  • Why do you care?

    If it’s just about following the rules as a matter of principle, I suggest not doing that. Nobody is checking, and saying your exact age on public social media is oversharing anyway.

    If it’s about content moderation being strict enough to satisfy some comfort level, I wouldn’t rely on that, but I also think 13 is old enough to start learning there are shitty people online and how to deal with them, preferably with some adult support.









  • There seem to be two main arguments put forth here:

    1. F-Droid does not thoroughly audit the apps it distributes, so they might include bad behavior that is not initially obvious.
    2. It is theoretically possible to provide a package to F-Droid that does not match the source code it claims to be based on.

    To which I respond:

    1. No app store thoroughly audits the apps they distribute. You must ultimately decide if you trust the developer enough to run their app, or audit the code and build it yourself.
    2. This creates a theoretical opportunity for a developer or maintainer to upload a package that doesn’t match its purported source code, but it’s possible to check for this manually, and to automate that process. It’s likely anyone exploiting this would be caught and their reputation tarnished. It comes back to the first point: do you trust the developer or maintainer enough to run their app?

    If you have average security needs, you probably don’t need to worry about this. If you have reason to believe someone well-resourced and dangerous wants to compromise your phone, you should probably be extremely selective about what apps you install and where you get them.


  • I agree it’s not possible with an uncooperative/adversarial recipient, but it’s very possible that the recipient is cooperative, but too passive to reliably follow an instruction like “delete after reading”.

    It may be reasonable to use technical means to protect certain messages against the possibility that the recipient’s computer or mail provider will be stolen or compromised in the future. Email isn’t a great tool for this.









  • Zak@lemmy.worldtoFediverse@lemmy.worldFediverse for teens
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 month ago

    They’re all essentially adults now, so we don’t enforce it anymore, but they sometimes still do it anyway.

    I know adults old enough they didn’t grow up with smartphones who exclude devices from their bedrooms by choice to have a healthier relationship with technology.