I remember getting some questionable quality books from amazon which didn't match up to the usual standard of a publisher. No Starch Press called this out in the past saying amazon sell counterfieght books. https://x.com/nostarch/status/1183095004258099202
I'm not sure what actually happens, but I mostly stopped buying paperbacks on Amazon a good while ago, and if I do, and I'm unhappy with the quality I'll return it.
In the UK all mobile phones default to no adult content on the mobile networks, if you want to access adult content you need to request it with the mobile network provider. They could have gone the same route with consumer internet access. Most ISP supplied routers support content blocking, it could have been turned on by default with a simple update pushed by the ISP.
Kids here in the UK get educated about online safety in school, schools have sessions for parents covering this stuff too. My own kids have had age appropriate internet access all their lives, its not been difficult to control it, we have had the tools and knowledge for years.
This stuff really isn't about child safety in my opinion.
I've done a huge number of hours on sentry duty (unmedicated) and the the hour would either pass by in an instant and I wouldn't even realise it, or it would seem to drag on for hours.
One thing I certainly couldn't do was pay attention to nothing happening for an hour just incase something happened.
I stopped buying them when I saw users posting on reddit that they were logging in to their systems and seeing other peoples camera feeds and networks.
> Was it worth it? Yes, it is terrible, shoddy, insecure code, but he proved out a viable business with just a few hundred dollars of investment.
Was it worth it to put all his customers at risk like that?
He is honestly lucky, the "hackers" could have done much worse, it would have been much more profitable for them to go after his customers via his software than to demand money from him had they been financially motivated.
> Third, the hacker has been trying to inject XSS attacks into app
> Now he's hiring a developer to shore it up.
So this is an ongoing attack? He should probably also hire some incident response and get some security consultancy.
reply