Most active commenters
  • gumby271(6)
  • mathiaspoint(5)
  • rafram(5)
  • danieldk(5)
  • Hizonner(5)
  • hollerith(4)
  • rikafurude21(4)
  • fleshmonad(4)
  • shagie(4)
  • 2paz7x(3)

←back to thread

205 points ColinWright | 83 comments | | HN request time: 2.054s | source | bottom
1. enriquto ◴[] No.45074254[source]
> Are you allowed to run whatever computer program you want on the hardware you own?

Yes. It is a basic human right.

> This is a question where freedom, practicality, and reality all collide into a mess.

No; it isn't. The answer is clear and not messy. If you are not allowed to run programs of your choice, then it is not your hardware. Practicality and "reality" (whatever that means) are irrelevant issues here.

Maybe you prefer to use hardware that is not yours, but that is a different question.

replies(7): >>45074265 #>>45074374 #>>45074385 #>>45074396 #>>45074529 #>>45074536 #>>45074595 #
2. mathiaspoint ◴[] No.45074265[source]
Or it's not a computer and really something more like a television. In that case these things should be thought of as a vice rather than a productivity tool.

The social structure of the smartphone app ecosystem is remarkably similar to the cable provider -> network -> show situation from before too.

replies(4): >>45074354 #>>45074367 #>>45074379 #>>45074805 #
3. cwillu ◴[] No.45074354[source]
Only because of sustained pressure from all the usual suspects to try to make that the social structure.
replies(1): >>45074381 #
4. ninkendo ◴[] No.45074367[source]
The example I always go to is a Nintendo or PlayStation, etc.

They’re clearly just computers, they’re “hardware you own”, but you’ve never been able to run whatever software you want on them. But it’s been like this since the 1970’s and there’s never been an uproar over it.

For me the difference is that you know what you’re getting into when you buy a console, and it’s clear up front that it’s not for “general” computing. I’m inclined to put smart phones into this category as well, but I can see how reasonable people may disagree here.

replies(4): >>45074450 #>>45074477 #>>45074484 #>>45074518 #
5. rafram ◴[] No.45074374[source]
That’s a great ideal, but Android is used both by sophisticated users who want a phone they can tinker with and the tech-illiterate grandparents of the world, who will never have a legitimate reason to install an app outside the Play Store, and who would never attempt to do that unless they were being guided by a scammer.
replies(4): >>45074413 #>>45074437 #>>45074462 #>>45074780 #
6. martin-t ◴[] No.45074379[source]
Increasingly, I keep noticing that all human-corporation relationships are a rehash of older power structures and basically struggles for power in which people gradually keep losing it until they realize they are exploited and then finally start fighting back.

People started free and equal, then some specialized into warriors[0] and gradually built deeper and deeper hierarchical power structures, called themselves "nobles" and started exploiting the "commoners".

At some point people snapped, killed a bunch of them (French revolution, US was for independence, etc.) and decided they wanna rule themselves.

And then companies started getting bigger and bigger, with deeper hierarchical power structures, the "nobles" call themselves "executives" or "shareholders" and the people doing actual productive work are not longer "commoners", they are "workers"[1].

[0]: And thus controlled the true source of power - violence.

[1]: Ironically admitting that people who are not workers are not doing real work, they are just redistributing other people's work and money.

replies(1): >>45074552 #
7. mathiaspoint ◴[] No.45074381{3}[source]
I think it's always going to evolve that way when people are so concerned about "safety" (no matter how that's defined) that all the escape hatches are removed.
replies(1): >>45077502 #
8. hollerith ◴[] No.45074385[source]
I don't want to live in your overly simplistic world.
replies(1): >>45074449 #
9. rikafurude21 ◴[] No.45074396[source]
It seems that this is another one of those things where the lowest common denominator sets the rules for everyone. Most people arent tech savvy programmers so giving them the freedom to do 'whatever they want' will lead them to hurt themselves in some way. Of course this is not an excuse for locking down your hardware. Smartphones just came into being as a consumer-first product and didnt require many of the freedoms that programmers needed, which is why computers are fundamentally more open than smartphones. Apple of course is trying to change that with their Macs
replies(2): >>45074418 #>>45074440 #
10. danieldk ◴[] No.45074413[source]
So, put a toggle somewhere. When the toggle is toggled, put up a big fat warning sheet and say if somebody on the phone or mail asks you to do that, 99.9% it's a scammer.

If people still go for it, then it is their responsibility. A lot of things in life require responsibility because otherwise the results can be disastrous. But we don't forbid them, because it would be a huge violation of freedoms.

replies(2): >>45074480 #>>45076037 #
11. squigz ◴[] No.45074418[source]
You don't need to be a "tech savvy programmer" to be aware of the risks on the Internet and not do stupid shit.
replies(2): >>45074435 #>>45080206 #
12. rikafurude21 ◴[] No.45074435{3}[source]
https://xkcd.com/2501/
replies(1): >>45074492 #
13. gumby271 ◴[] No.45074437[source]
Then why not lock down their devices. Why aren't people using the parental controls on their parents phones to lock it down and own in on their behalf? I don't understand this idea that because there are some people vulnerable to scams that we all have to give up control to Apple and Google. The option to move the trust and ownership to another party is useful, but it doesn't have to be just those two parties as options.
replies(1): >>45074501 #
14. gr4vityWall ◴[] No.45074440[source]
> this is another one of those things where the lowest common denominator sets the rules for everyone

In that case, the solution should be to raise the lowest commmon denominator. Lots of issues like that could be prevented by investing in education to increase technology literacy. But long term investments (even public ones) do not match well with quarterly reports.

replies(1): >>45074917 #
15. fleshmonad ◴[] No.45074449[source]
How is this overly simplistic? It is pretty simple. You buy some hardware, and some company wants to force you to use their telemetry ridden, data collecting software under the guise of stupid people being unable to do a google search and comparing a string. I can safely say I don't want to live in your technocratic techbro wet dream.
replies(1): >>45074534 #
16. mathiaspoint ◴[] No.45074450{3}[source]
Those are not really personal computers, they're fancy set top boxes and extensions of the television.
replies(1): >>45074898 #
17. pydry ◴[] No.45074462[source]
Or guided by their tech savvy children.
18. gr4vityWall ◴[] No.45074477{3}[source]
Surely it would be better if console makers gave users freedom to control the device, rather than smartphones not being in the users' control either.

Unfortunately, the copyright lobby of the video game industry was too strong in the 70s/80s/90s, so here we are.

19. rafram ◴[] No.45074480{3}[source]
But it’s not someone on the phone - it’s their best friend / star-crossed lover who they met on WhatsApp because of a chance wrong-number text! Since then they’ve become incredibly close, and they can trust each other with anything. When their lover gives them some amazing investment advice and it requires clicking through a scary-looking prompt (like they do all the time on a phone), who do they trust - their one true love or a generic warning message on their phone?

You have to take into account that the threat model here is vulnerable people, often older, being taken in by scammers who talk to them for weeks and gain their complete confidence. To the victims, it feels like a real romantic relationship, not someone who could even possibly be a scammer.

replies(1): >>45074526 #
20. danieldk ◴[] No.45074484{3}[source]
For me the difference is that you know what you’re getting into when you buy a console, and it’s clear up front that it’s not for “general” computing. I’m inclined to put smart phones into this category as well, but I can see how reasonable people may disagree here.

I think there is a huge difference. You can perfectly live your life without a game console. Even if you are a game addict and it is absolutely necessary for you to live, you could buy a PC and game on that.

Smartphones are a necessity nowadays. Some banks only have smartphone apps (or require a smartphone app to log in to their website). Some insurers want you to upload invoices with an app. Some governments require an app to log in (e.g. the Dutch DigiID). You need a smartphone to communicate with a lot of organizations and groups.

Smartphones have become extremely essential. And two companies can decide what does and what doesn't get run on a smartphone and they can take their 30% over virtually everything. They can destroy a company by simply blocking their app on a whim (contrast with game studios, which could always publish their game for PC or Mac or whatever).

It is not a healthy, competitive market. It is the market version of a dictatorship. And Google forbidding non-app store installs is making it worse.

Governments should intervene to guarantee a healthy market (the EU is trying, but I think they are currently worried about the tariff wrath).

replies(1): >>45074776 #
21. fleshmonad ◴[] No.45074492{4}[source]
Only that nothing about this requires big expertise. If you are a user of computers, you should be able to navigate the basics. It's the same like driving a car, you must know the traffic rules and how to behave, but that doesn't mean you have to understand how your engine works in detail.
replies(1): >>45074901 #
22. rafram ◴[] No.45074501{3}[source]
Not everyone has children. Not everyone has children who they remain in contact with. Not everyone has children who are tech-adept enough to do that. Not everyone has children who are less vulnerable than themselves.
replies(1): >>45074632 #
23. danieldk ◴[] No.45074526{4}[source]
The solution is not taking people's freedom away. The solution is education. Lesson 1: lovers are not for investment advise.

Also, scams also happen outside smartphones.

What's next? Are we going to revoke people's control over their financials because they might be scammed? Let's have the bank approve before we can do a transaction. And since we are using their payment platform, maybe they should also take 30%.

Please stop feeding their narrative. Scammers are Google/Apple's "but think of the children".

replies(2): >>45074581 #>>45076058 #
24. conradev ◴[] No.45074529[source]
Control over hardware isn’t actually the issue at stake here: many Android devices can unlock their bootloaders in a moderately safe way. Go nuts.

It’s a more tricky issue where Google and other parties can restrict access to their services to devices they deem legitimate. Their services, their rules. Your hardware. Different arguments required.

It’s everywhere: Widevine is used to prevent stealing 4K content (incl ATSC 3.0), gaming providers use it for anti-cheat, banks use it to rate limit abuse. It’s not just Android.

(I say this as someone with an Apple Vision Pro running visionOS 1.0 with the hope to jailbreak it one day. I’m actually unable to do whatever I want to their hardware, unlike my Pixel phones.)

replies(2): >>45074801 #>>45075137 #
25. hollerith ◴[] No.45074534{3}[source]
Remote attestation is a useful capability. One example: it can be used to create a camera such that the photographer can prove that an image is an accurate recording of reality and not AI-generated. Without remote attestation, we will soon enter a state of affairs in which the courts (and anyone else, too) cannot ever rely on photographic or video evidence.

The banking system has been relying on remote attestation for decades to ensure that devices used in settling financial transactions have not been tampered with:

https://en.wikipedia.org/wiki/IBM_4758

Also, I think the chip-and-PIN cards used for most in-store transactions in Europe for the last 20 years rely on remote attestation and tamper resistance to prevent fraud.

Finally, in the domain of desktop and laptop computers, there is a big security hole in that most components (certainly, disk drives and storage devices, but basically any peripheral or board) are essentially embedded computers that can be pwned with the result that they stayed pwned even if the owner of the computer installs the OS from scratch. One solution to this would be for suppliers of peripherals and boards to get much better at securing their products or to stop using microprocessor to implement their products, but it would be quite a lot of work (and governmental intervention or at least intervention by industry-wide quasi-governmental entities that currently do not exist) to get from the current situation to the one I just described. The only products currently available that are secure against this threat (aside perhaps from using 40-year-old computers) use verified-boot technology to implement the security.

I.e., the only desktop and laptop computers you can buy where you can be reasonable sure some attacker hasn't installed malware in the computer's disk drive or track page or wifi module are things like Macs and Chromebooks, which implement the security using verified boot.

replies(2): >>45074572 #>>45074636 #
26. accle ◴[] No.45074536[source]
> > Are you allowed to run whatever computer program you want on the hardware you own?

> Yes. It is a basic human right.

Says who?

What's your philosophical argument in favour of this?

replies(1): >>45074591 #
27. Kim_Bruning ◴[] No.45074552{3}[source]
Some variant of Anacyclosis?

https://www.youtube.com/watch?v=uqsBx58GxYY

replies(1): >>45075552 #
28. 2paz7x ◴[] No.45074572{4}[source]
So we should all give up our rights so we can use the fancy new locked down technology to digitally sign our photographs. Oh, and now every photograph you ever post on social media can be tracked to your device. I love your future!! We should also install a camera in your bathroom. Just to attest. It's just attestation, bro.
29. rafram ◴[] No.45074581{5}[source]
> lovers are not for investment advise.

Aren’t they? I ask my partner for investment opinions all the time.

> Let's have the bank approve before we can do a transaction.

Yes… That’s already how it works. Banks use heuristics to detect and prevent suspicious transactions. That’s why most of these scams ultimately involve crypto.

replies(2): >>45075693 #>>45075892 #
30. justinrubek ◴[] No.45074591[source]
It's directly in the text.

> hardware you own

replies(2): >>45074608 #>>45074639 #
31. MrsPeaches ◴[] No.45074595[source]
What else do you consider basic human rights?

My suspicion is: were you to list them, running programmes on hardware you own would be fairly low on that list.

replies(1): >>45074666 #
32. accle ◴[] No.45074608{3}[source]
That's not an argument.

Please explain how owning an item of hardware implies that running whatever computer program you want on it is a basic human right.

replies(1): >>45077448 #
33. gumby271 ◴[] No.45074632{4}[source]
Well maybe let's start small and cover the people that do first, just to see how that goes. Instead we're starting with all people on the planet, and it will be declared a success because the metrics will say it was, there's no rolling this back.

And it doesn't have to be children of parents, that's just the common example that's brought out every time this comes up.

replies(1): >>45074762 #
34. fleshmonad ◴[] No.45074636{4}[source]
I am sorry that free choice what software to install on your device goes against your existential fear of "AI extinction" as displayed in your profile description. I guess I was wrong, and surrendering all your rights, being tracked and used for datapoints that will in turn be used to train AI is actually good.
replies(1): >>45074713 #
35. MrsPeaches ◴[] No.45074639{3}[source]
Is it not possible to run software on any hardware you own?

Is it illegal to spin up a Linux server on your mobile phone?

replies(1): >>45075736 #
36. 2paz7x ◴[] No.45074666[source]
So because it's low on the list it's not a right? Where do we draw the line? Let's do an experiment. Which rights can we take away from you? Some are pretty far down the list, right? The right to live is pretty important, so that's all the way up on the list. So where's the line drawn?
37. hollerith ◴[] No.45074713{5}[source]
I don't think the "ethic" you are proposing (i.e., a consumer should have free choice of what software to install on their own device) has much bearing one way or the other on AI extinction risk.

Do you simply not care that this Linux computer that you have such warm feelings about is fairly easy to pwn (in part because of the lack of verified boot and in part because desktop Linux software is just much easier to pwn than the systems software on a Mac or a Chromebook or an iPhone or an Android phone) such that if you ever got to be an effective activist against some government or some powerful industrial interest, that government or industrial interest could fairly easily eavesdrop on everything you do with this Linux computer?

That doesn't sound much like protecting your individual rights.

replies(2): >>45074757 #>>45074836 #
38. fleshmonad ◴[] No.45074757{6}[source]
You're right. My loonixtard brain didn't grok this without your input. My device is going to be pwned because I didn't use a Microsoft verified image. Should I ever feel the need to start the revolution, I will make sure to use secure boot and use Microsoft windows using my employers account.
replies(1): >>45074839 #
39. snowe2010 ◴[] No.45074762{5}[source]
We literally did start with that… that’s the current situation, everyone has parental toggles and yet millions of people get scammed for billions of dollars a year. You’re acting like we (and these massive corporations) haven’t been trying for decades at this point. And you’re saying we shouldn’t be trying more stuff, we should just stop and give up and let innocent people get scammed because you want to be able to run whatever on your phone.
replies(2): >>45074871 #>>45077540 #
40. snowe2010 ◴[] No.45074776{4}[source]
I have a friend that still uses a dumb flip phone from the early 2000s. No smartphones are not necessary.
replies(1): >>45075700 #
41. jackothy ◴[] No.45074780[source]
Society is held back so much when the most capable have to live by rules made for the least capable.

Give the knowledgeable the freedom to use their skills. Separately, develop ways to help/protect specifically those that need it.

42. mathiaspoint ◴[] No.45074801[source]
There are actually just about no services that genuinely need hardware attestation other than some DRMed music/video and zelle. Everything else pretty much works on Linux in a browser or has some substitute that does.
replies(1): >>45076592 #
43. jackothy ◴[] No.45074805[source]
The problem is larger than just smart phones. Smart phones are the templates for all future devices. You car now runs Android as well.

In the future, when your whole house is controlled by a computer, do you want that computer to be controlled by Google or to be controlled by yourself?

44. 2paz7x ◴[] No.45074836{6}[source]
>this Linux computer that you have such warm feelings about is fairly easy to pwn

It's just not. Otherwise, all servers would be running your beloved iOS, wouldn't they?

>in part because of the lack of verified boot

This does not matter. I can generate my own keys.

>easier to pwn [...] than [...]an iPhone

Lol... If anything, phones are more vulnerable because you have less access to sandboxes and VMs.

Hey, look, an Apple CVE from two days ago. https://nvd.nist.gov/vuln/detail/CVE-2025-43284

And this one's from this month. https://nvd.nist.gov/vuln/detail/CVE-2025-43300

And here's Apple's sandbox failing, last month. https://nvd.nist.gov/vuln/detail/CVE-2025-43274

45. hollerith ◴[] No.45074839{7}[source]
It appears that most PC makers didn't implement verified boot correctly (e.g., they negligently left sample keys in the firmware they shipped), which is why I avoided any mention of Windows in my previous comments.
46. gumby271 ◴[] No.45074871{6}[source]
Maybe I'm wrong, but I have never seen Apple or Google suggest that someone use the parental control tools on a vulnerable adult person's phone to prevent them from hurting themselves. They have never run such a campaign for awareness or changed those tools to make them more palatable to controlling adult's phones (these tools are always sold as things to enable on a child's device). So no, I don't think we've started with that. We've started by adding some toggles and scary warning, and I agree that hasn't worked. I never suggested we stop trying, I suggested we allow the trusted owner/admin of the device to be more easily assigned to someone that person trusts, not just forcing Google into that role without consent.
replies(1): >>45075905 #
47. ninkendo ◴[] No.45074898{4}[source]
They have the same hardware in them as a personal computer, and essentially always have. (The original Nintendo had the same CPU as an Apple II.) The difference is only how they were marketed, and the artificial limitations on what software you could run.
replies(1): >>45075067 #
48. rikafurude21 ◴[] No.45074901{5}[source]
If you want to drive a car you go through driving school and have to pass the tests to get a drivers license. Theres no drivers license for the internet and not really any strict set of rules you have to follow in order to get online - most people pick up a sense for rules online by osmosis, usually about how to not get scammed or get malware - sometimes they have to learn by first hand experience. If we go by your comparison this would be like learning to drive by crashing a couple cars. I definitely believe anyone whos even a little tech savvy underestimates how complicated or confusing technology can be for the average person.
49. rikafurude21 ◴[] No.45074917{3}[source]
I would say young people grow up with tech and usually are very tech literate.
replies(2): >>45075252 #>>45075332 #
50. mathiaspoint ◴[] No.45075067{5}[source]
Right. They're vices and not tools even though they might look like tools.
51. fsflover ◴[] No.45075137[source]
> many Android devices can unlock their bootloaders in a moderately safe way.

And yet you can't install an alternative OS like Mobian, postmarketOS or PureOS due to the closed drivers and specs.

52. ColinWright ◴[] No.45075252{4}[source]
I deal with a lot of young people who have grown up with tech, and my experience is that in general they haven't got a sodding clue about how anything works, or the implications of any of this.

Absolutely not a Scooby.

53. shagie ◴[] No.45075332{4}[source]
Tech... a "maybe" yes.

However, this isn't entirely a tech problem - it's a social/human one.

Not every mechanic has a driver's license. Sure, they may enjoy working on cars and the technology of cars... but for one reason or another they may have never gotten or have lost their driver's license.

Not everyone who is tech literate is similarly socially literate. I have programmer co-workers who have been scammed into sending gift card authentication codes or installed malware (or allowed the installation) onto their personal computing devices.

It isn't possible to prevent someone from accessing the internet any more than it is possible to prevent them from accessing a phone.

I am not saying that one should have a license to access the internet. Rather, I am saying that a device that holds and maintains the authentication mechanism for doing banking transactions, it is not unreasonable for the maker of that device and its software to attempt to mitigate the possibility that they are held liable for negligence in allowing user installed software to do banking without the owner's consent.

With the uncertainty that everything in the operating system and hardware is locked down to the point where no-consent access by malware to those banking capabilities is completely restricted (and thus they're not liable for negligence) - the wall that is being put up to try to prevent that is "no software that has not been vetted can be run on this device."

Consider that the phone is often the authentication mechanism and second factor for authorization to restricted systems. Authy, Microsoft Authenticator, and other 2nd factor applications typically do not run on general computing devices.

Technical literacy does not imply social or security literacy.

replies(2): >>45075593 #>>45075861 #
54. martin-t ◴[] No.45075552{4}[source]
Can't watch the video now but partially.

I don't like describing it as cycles because it is too simplistic and pretend it is inevitable, robbing people of agency.

I prefer to think of society as a system where different actors have different goals and gradually lose/gain influence through a) slow processes where those with influence gain more from people who are sufficiently happy to be apathetic b) fast processes when people become sufficiently unhappy to reach for the source of all real world influence - violence.

This happens because uneducated/dumb/complacent people let it happen. It can be prevented by teaching them the importance if freedoms and to always fight back. But that goes directly against the interests of those in power - starting from parents who want children to be obedient.

55. tempodox ◴[] No.45075593{5}[source]
> no software that has not been vetted can be run on this device

That’s just it. Software isn’t being vetted. Witness all the scam apps in the iOS and Android app stores. Even paid developer accounts don’t stop people from publishing these, nor does Apple’s walled garden protect you from them.

replies(1): >>45075763 #
56. danieldk ◴[] No.45075693{6}[source]
Aren’t they? I ask my partner for investment opinions all the time.

Obviously, the probability of it being a scammer reduces with the amount of time. In the end it's a function of time vs. effort. Scamming billionaires by marrying them and waiting until they die happens frequently enough. A 5 year scam for a few thousand bucks, unlikely.

As usual, use common sense, which you would have to do anyway if you do investments.

replies(1): >>45076939 #
57. danieldk ◴[] No.45075700{5}[source]
There was a documentary over here on TV about people that do not use smartphones. The conclusion was that it was almost impossible, they often have to rely on other people for certain things, and are excluded from a lot of social circles.
58. fsflover ◴[] No.45075736{4}[source]
It's practically impossible due to the closed drivers and specs, directly causing planned obsolescence and e-waste. It should be a part of the right to repair.
59. shagie ◴[] No.45075763{6}[source]
Do not make perfect the enemy of the good. There are failings of vetting.

That said, for sensitive apps they tend to go through more strict scrutiny of their functionality. Publishing a "Wəlls Fargo" application will likely not get approval.

The question isn't "does it need to be 100%" but rather "if was not done at all, would Apple or Google be liable for flaws in their software (e.g. VM breakouts) that allows malware to do banking transactions, location tracking, or place calls (e.g. 1-900 number dialing) without user consent?"

I'm fairly certain that Apple and Google take measures to limit their liability. With how courts and countries are finding technology companies liable for such (consumer and data privacy protections), I would expect to see more restrictions on the device to try to further limit the company's exposure.

60. Hizonner ◴[] No.45075861{5}[source]
> Technical literacy does not imply social or security literacy.

Indeed. And people were falling for scams long before the Internet. What's new is the push to make that the fault of bystanders... thus causing those bystanders to intervene. It's neither the bank's fault, nor Google's fault, if somebody falls for a scam. Or installs malware. Or whatever. If you try to make it their fault, they're going to do really annoying things that you don't want.

Sure, you can sell security tools, or curation, or whatever. Many people will even want to buy them, but things break when that starts being a duty. And the only way to prevent it from becoming a duty is to accept that people own their own mistakes.

replies(1): >>45075953 #
61. Hizonner ◴[] No.45075892{6}[source]
> Banks use heuristics to detect and prevent suspicious transactions.

... and it's really fucking annoying when their heuristics misfire-- which is not at all rare-- especially since they do all they can to externalize all costs of that to the customer.

62. Hizonner ◴[] No.45075905{7}[source]
You do not want to live in a world where that's normalized. There are legal processes for determining when somebody's "vulnerable" enough to need a guardian. Those process are heavy and strict for a damned good reason. And sometimes still not strict enough.
replies(1): >>45076030 #
63. shagie ◴[] No.45075953{6}[source]
> And the only way to prevent it from becoming a duty is to accept that people own their own mistakes.

This tends to be counter to consumer protection laws or data privacy laws.

A company that can be held to strict liability for their actions can be sued (and be found liable) even if they presented that the action is unreasonable or dangerous.

In saying a consumer who buys a 100% "you can do anything on it" device liable for every action that that device takes no matter what initiated that action?

To me, the argument that you should be able to do anything on the device and be held liable for all the actions that device allows is very similar to that of "the maker of the device has no liability for providing a device that can be misused."

If that is the case, then (to me) this would need to be something that would need to be changed by the courts and the laws (and such a company would need to pull completely out of Europe).

replies(1): >>45076123 #
64. gumby271 ◴[] No.45076030{8}[source]
If I'm drunk and give my friend my car keys and ask them to not let me do anything stupid, I'm not giving up my legal rights to autonomy. I don't think this is any different. Legal guardianship is entirely unrelated, unless we're having some slippery slope fun.
replies(1): >>45076086 #
65. throw0101c ◴[] No.45076037{3}[source]
> So, put a toggle somewhere. When the toggle is toggled, put up a big fat warning sheet and say if somebody on the phone or mail asks you to do that, 99.9% it's a scammer.

The proverbial grandparents will follow the instructions of the scammers and will click through all of that. We've had decades of empirical evidence: people will keep clicking and tapping on dialogue boxes to achieve their goal.

People have physically driven to cryptocurrency ATMs on the instructions of scammers:

* https://bc-cb.rcmp-grc.gc.ca/ViewPage.action?siteNodeId=2136...

* https://www.usatoday.com/story/money/2025/04/21/bitcoin-atm-...

Warning sheets will do nothing.

replies(2): >>45077506 #>>45078579 #
66. throw0101c ◴[] No.45076058{5}[source]
> The solution is education.

We've been trying to educate people about passwords and phishing for years/decades now, and it has not worked. Further, every day a new ten thousand (US) people need to be educated:

* https://xkcd.com/1053/

67. Hizonner ◴[] No.45076086{9}[source]
So you expect aging parents to actively ask their children to put controls on their devices, and not to reverse that decision when it matters most?

Many, probably most, of the people most at risk aren't going to do that.

When you're (somewhat) drunk, you know that you're drunk, and you're still able to comprehend how that will slow down your reactions while driving. When you're being scammed, you think you're right... and if you begin to doubt that, you may tend to push the thought out of your mind rather than follow it through, and to evade things that might bring it back. And it's very hard to admit to yourself that you're permanently impaired in that sort of way... especially when you're impaired in that sort of way.

replies(1): >>45077359 #
68. Hizonner ◴[] No.45076123{7}[source]
Indeed, the bad attitude I'm talking about has found its way into some laws, as well as into other kinds of norms and expectations. That doesn't make it good.

You may be exaggerating it, but insofar as you're right, you're just describing the problem.

69. conradev ◴[] No.45076592{3}[source]
Yes, only some things for now! I hope it stays that way or decreases, but that’s not the way the arrow is pointing.

Providers still implement it where they can, like for blackout restrictions for US sports games: impossible to enforce on the web because I can spoof location. Very possible to enforce on iOS because jailbreaking is not possible. Possible to enforce on Android because you can check if spoofing was made possible.

It’s currently the primary reason I can’t play games online on Linux.

70. rafram ◴[] No.45076939{7}[source]
There are lots of older people who have never really invested their money, have a lot in their savings account, and might be excited by the idea of a get-rich-quick crypto investment they hear about from someone they trust. Even if they’ve only known them for a little while.
71. gumby271 ◴[] No.45077359{10}[source]
I'm expecting us that come up with something better than "give all computing control to two US companies" Yes this idea has flaws that you're an expert at picking at, but there's gotta be some middle ground that doesn't treat all of us as the most tech illiterate or scammable people.
72. kartoffelsaft ◴[] No.45077448{4}[source]
If there are rooms in your house someone else could lock you out of, do you own the house or do they?

If someone else could use your car without your permission, do you own the car or do they?

If someone could grow their own plants in you back yard, do you own the garden or do they?

If someone else could choose what programs run on your computer, do you own the computer or do they?

Saying "basic human right" instead of just "basic right" may be odd, but definitionally, owning a thing means having the right to say how it is used. Either you own it and have that right, or you don't own it and don't have that right. That's what owning means.

replies(1): >>45078083 #
73. gumby271 ◴[] No.45077502{4}[source]
Is it the people that are pushing for this though? Apple has long pushed privacy and security as a way to maintain their control over personal devices, the people just believe it and accept it. Google is just taking notes and seeing how profitable that approach is. Provided there's no push back, they'll succeed easily with no one actually asking for this.
74. dns_snek ◴[] No.45077506{4}[source]
Okay great, seeing how every reasonable warning and technical restriction is completely pointless and how people will do everything they're told if they're naive enough and the person on the other end is convincing enough, we can skip this whole dance.

Because at the end of the day the scammer is going to convince your grandma to go to the bank, withdraw the entirety of her savings and send them to the scammer in an envelope.

Any technical restrictions therefore only harm our personal freedoms and don't actually protect those who are vulnerable because those people's problems aren't technical in nature.

75. dns_snek ◴[] No.45077540{6}[source]
> let innocent people get scammed because you want to be able to run whatever on your phone.

As always it comes down to insulting and emotionally guilt tripping people to screw them out of their freedoms and of course there's never even a shred of evidence to support any of these incredible claims. You're laying it on too thick, give us a break.

> You’re acting like we (and these massive corporations) haven’t been trying for decades at this point.

You're acting like this would make a dent in the total number of people who are scammed every day.

And it just so happens that the only acceptable remedy necessitates infringing on billions of people's personal freedoms which will, incidentally, secure trillions in future profits for these corporations. All that for a temporary speed bump that would only affect a minority of scammers who would adapt in a month.

replies(1): >>45112515 #
76. shagie ◴[] No.45078083{5}[source]
There are parts of your car that you are not legally allowed to remove or disable (for example, the muffler or catalytic converter https://19january2017snapshot.epa.gov/sites/production/files... ).

There are times when it is necessary to limit the rights that a individual has so that the system that the individual lives within can work.

You can buy a radio transmitter, but you're not allowed to operate it without a license. You can likewise buy a car, but you aren't allowed to operate that either without a license.

You do not have the right to modify your phone so that it acts as a radio frequency jammer.

Possession of a device does not give an individual unrestricted rights to what can be done with it.

replies(1): >>45081338 #
77. broker354690 ◴[] No.45078579{4}[source]
Who cares? Granny is still allowed to buy knives and accidentally chop off her fingers while she cooks. If she ends up doing that it's either her fault or she's too old to be using knives. We don't ban or blunt knives just because you can cut yourself with them.
replies(1): >>45092219 #
78. fc417fc802 ◴[] No.45080206{3}[source]
TBF historically systems were designed with such poor UX that it was sometimes quite difficult not to do stupid things. Such as using Windows back in the day without installing software from the internet at large (ie there was no reputable package manager).

But that's a system design issue as opposed to an argument against user freedom.

replies(1): >>45080789 #
79. pjmlp ◴[] No.45080789{4}[source]
You mean like using curl, shell, and sudo that is so prevalent these days?
replies(1): >>45099138 #
80. wiseowise ◴[] No.45081338{6}[source]
Requiring something and locking someone out are completely different things.

I’m fine with government requiring smoke detectors in my home, I’m not fine with completely unregulated private entity deciding how I live in my home, bought with my money.

And in case of a muffler, there’s literally no one in this entire world who can stop me from removing it. There are repercussion for doing so, but nobody stole my rights from removing it.

81. throw0101c ◴[] No.45092219{5}[source]
> Who cares?

Those of us with elderly parents and piblings (aunts/uncles).

82. fc417fc802 ◴[] No.45099138{5}[source]
Is it? I certainly don't do that. We have access to multiple well known and reasonably well designed distribution mechanisms today. Anyone going the curlbash route is doing so of his own accord and with zero excuse if his known bad choices bites him in the ass.

(For the record I have nothing but disdain for those that choose to go this route. Looking at you rustup home page. In contrast LLVM has the decency to provide an apt repository for nightly images.)

83. snowe2010 ◴[] No.45112515{7}[source]
> You're laying it on too thick, give us a break.

Says the person that thinks they are losing personal freedoms when a company makes a product change and they just don’t want to bother switching to a different product.

Buy a different phone. This isn’t affecting your personal freedom.

And yes, it does affect the number of scams that people fall for, as evidenced by iOS’s hiding of links in scam messages. It forced scammers to try and get the scammee to jump through several more hoops just to be able to open links. Immediate drop in scams.

There are tons of things to be done. None of them are affecting your freedom. Buy a different phone.