

35·
2 days agoI can’t wait until it’s leaked that these child accounts are being used to target minors for whatever: ads, sexual exploitation, etc.
IT nerd


I can’t wait until it’s leaked that these child accounts are being used to target minors for whatever: ads, sexual exploitation, etc.


So use a VPN, buy a 3d printer in another state, send it to a mail forwarding service?
Or buy a printer and install different firmware on it?
And maybe my understand of 3d printers is wrong, but a 3d printer itself doesn’t know what it is printing, it only gets the gcode from the slicer. So if the slicer is what is being modified, then use an open slicer like OrcaSlicer?
So a nothing burger of massive proportion this looks like. Which will soon spread to California. Great…
For real. What is stopping a program from querying if an account is an adult or child, and then seeing if there’s an email or username or whatever tied to that account age?
So now we have a database of children with their names and emails? Addresses? Or if a system gets hacked and that information is sold to bad actors?
What is stopping a pedophile from making a “child” account and then being lumped in with a group of other children?
These are things you think about in the first 10 minutes of questioning whether something like this is viable and how it can be exploited.