If you can feel a very small tinge of existential horror when you read the words “try to”, congratulations, you’re a true *nix devotee.
If legislators get grumpy about this, just gently thwap them with your handy copy of The Unix Haters Handbook and tell them you’re working as hard as you can under the circumstances.


I recently read an article from the creaters of PopOS. In that they raise a vaild point. If a child installs a virtualization software (say with the concent of an adult for educational purposes), then they can but browse internet through the VM, with them being the root user, pretending to be adults. It defeats the whole purpose of such verification methods. So their plan would to stick with ID based ones.
I think this was never about age verification, but to uniquely fingerprint every person using internet and to keep accountability.
Lets face it, the internet you knew is dead.
Also, unless the verification thing provided by the OS is signed by TPM, it can probably just be emulated in userspace software.
I’ll just do what I’m always done since I was 10
“How old are you?”
“115 years young of course”
1/1/1900, just celebrated my 126th
I was born on 1/1/1970 trust me bro
These laws are not written by the technically literate. They are written by attorneys based on the whims of old legislators who think that Siri is a real woman that they are talking to.
While the people who write the laws are competent, the legislators are not.
At the state level, it’s even worse because they are often given legislation carefully written by lobbyists and special interest groups.
If you have any inkling to run for office, please consider doing so because we need smarter people in every branch of government.
Can you install a VM without root? I assume the kids account isnt being out into a group with virtualization by default.
You can. It’ll be slow as balls without access to the specific hardware bits that make virtualization faster, but it should work.
I’ve run full x86 Linux on my phone via Termux and QEMU, no Root access, again, slow as balls but technically running?
I see people doing it on iOS too with UTM SE (SE standing for “Slow Edition” since Apple is anal about JIT on their platform)
On a computer it’ll be even easier, and given the extra grunt, maybe slightly less painful
Friendship ended with IP. Now I2P is friend.
Check out reticulum as well.