this post was submitted on 17 Jun 2023
156 points (100.0% liked)

Technology

38759 readers
191 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 3 years ago
MODERATORS
 

Seventy-seven percent of middle-age Americans (35-54 years old) say they want to return to a time before society was “plugged in,” meaning a time before there was widespread internet and cell phone usage. As told by a new Harris Poll (via Fast Company), 63% of younger folks (18-34 years old) were also keen on returning to a pre-plugged-in world, despite that being a world they largely never had a chance to occupy.

you are viewing a single comment's thread
view the rest of the comments
[–] argv_minus_one@beehaw.org 19 points 2 years ago (8 children)

Do people really want to go back to the dark ages before Wikipedia existed? I know I don't. Knowledge is power, and the Internet is a treasure trove of it, if you know where to look.

That said, I do want to go back to computers that obeyed only their users and no one else. Malicious hardware like TPM and Pluton is really scary.

[–] derived_allegory@beehaw.org 3 points 2 years ago (1 children)

As much as I share your centiment about tech. I don't quite realize how is TPM scary? It physically separates security important operation from the main CPU.

[–] argv_minus_one@beehaw.org 2 points 2 years ago

It doesn't obey the user. There is no way for the user to examine the keys stored in it. The entire concept of remote attestation is disobedient to the user. And so on.

load more comments (6 replies)