• If I were a lawyer arguing against the law in court, my primary argument would be that this violates the interstate commerce section of the US Constitution.

  • 1 hour

    So how do they plan on figuring out if any given user behind a VPN user is in Utah?

    • 12 minutes

      Age and identity verification. Unfortunately selling user data is profitable, so I think this will become more common.

  • The stupidity of these lawmakers is beyond wild. How the fuck is this real?

    I have a similar idea, let’s prosecute the police when they fail to catch criminals and punish them instead. A killer got away? Death penalty for the police officer in charge. That will make the killers think twice!

    Or even better, let’s prosecute politicians when their laws backfire and do more damage than good.

    • 3 hours

      I bet you a dollar that all of them are technologically illiterate.

  • From my point of view, all I want is that Europe doesn’t follow the US into suiciding it’s own future in Tech by structurally dismounting the workings of the Internet for the purpose of autoritarian surveillance.

    Mind you, given the seeming high amounts of corruption and kompromat for European politicians - especially EU ones - I fear that even here they might send us down the path of Technological Black Age to satisfy the short term desires of whatever large American Tech Companies that have them in their pockets or populist American or Israeli politicians holding kompromat on them.

    • Von der Leyen keeps pushing for Chat Control. Plus the age verification app they want to release. The EU is already following the US

      • Estonia has this system for a decade already btw and uses block chain to make it transparant and for integrity, and the verification app will be zero-knowledge proof, and is open-source. Literally the best two specs you want for privacy… The only thing I would want is a decentralized system where you can get verified by showing your ID to your local municipal services, not uploading it.

        But the chat control has to go away asap fr
        maybe a compromis for chat control would be a decentralized database of photo hashes that are scanned by the chat control app where only trusted organizations for childrens safety can add hashes to, supported by block chain so we have full transparency of who adds what… wdyt of this?

        This way there is no single point of control. Blockchain provides full transparency because every addition of a hash is recorded as a transaction that anyone can verify, showing who added it and when, and since the blockchain is immutable, hashes can’t be secretly altered or deleted. Digital signatures prove which trusted org added each hash.

      • Yeah, I noticed.

        I have zero hope of the EU comission not being complete total crooks sacrificing Europe to serve corporate America.

        My hope is on the EU Parliament and on national governments, not the unelected “jobs for the boys” naturally rotten part of the EU “management”.

    • Palantir is very active in Europe. They’ll do their darndest to make surveillance states happen.

  • 4 hours

    Wait a second… how can they enforce this legislation when a VPN is masking the user’s location? How do they know a user using a VPN is from Utah?

    Correct me if I’m wrong here, but aren’t the users they’re trying to regulate the exact subsection of users that they don’t have the ability to identify as being citizens of Utah?

    Like if a user appears to be in Utah, then they’re probably not using a vpn. And if the user appears to be from out of state, then they could be using a vpn, but also Utah law doesn’t apply to those people because they’re not from Utah (as far as they know)… So essentially this law can’t actually apply to… anyone?

    • 2 hours

      You are too generous. If a company registered in Utah has a user who is coming in via VPN, then that user could be from Utah and the company is not in compliance unless they enforce age verification and thus liable. Thus, everyone has to hand over their ID. No one cares if a NY resident or European or whatever gets caught in it too. That’s not a requirement to avoid.

      • 1 hour

        Albeit I haven’t checked 100% of my traffic but thank God nothing important is hosted in Utah.

        • 34 minutes

          I don’t know about this one, but these laws usually apply to any company doing commerce inside the jurisdiction. So any company with an office or other business presence there, not just hosting.

  • 8 hours

    This from the people who elected a notorious pedophile, “thinking” that he would find the real pedophiles.

  • utah must have a porn problem, because they have pretty high traffic to PH, or its affiliates.

  • 9 hours

    I’m so weary of everything getting a little bit worse every day.

    I’m sure we all used to be excited about the future of the internet but now it’s just shit.

    • I’m glad I at least got to enjoy the golden age of the internet before enshittification started to infect everything.

    • I used to see technology as our only hope and now I dread the new hells we’re creating.

  • Good thing my firm doesn’t have an office in UT; we’re all on a VPN to work from home.

    • 9 hours

      Generally speaking, most VPNs used for business are a split tunnel, and aren’t forwarding all of your traffic, just the traffic relevant to your company resources that would otherwise be inaccessible unless you were on-site. So your internet traffic and regular browsing are still sent as if you had no VPN connection at all.

      • They can do that, but in my experience they do not, if only because it would be a vector for external attackers (who could control that machine via those connections routed directly to the Internet) to get into the company’s intranet without actually having to go through the company’s firewalls.

        • 2 hours

          This is what strong endpoint security is for. EDR software is also common. Routing everyone’s internet traffic is pretty strenuous.

      • 8 hours

        I don’t think that’s actually true. Most route traffic through malware/protection software which would be bypassed by split vpns.

        There are also a number of attacks that target this sort of VPN setup so it’s my understanding it’s generally not a good idea.

      • 9 hours

        Routing is something you can control client-side. Well alt least you can configure that all traffic should be routed over the VPN. If your company provides an exit to the internet over VPN is another issue, but I suppose most do.

      • Not on the company provided computers we used on my last job guess they would just be illegal

  • Get a list of every dumbass politician who voted this through, and access their campaign websites through a VPN from a computer in Utah. Boom.

    Self owned.

        • 30 minutes

          That is probably true. But the lobbyists have no power to actually make the law. And the politicians to do have the power to sell a law for enough money. But they are not as stupid as many here think. They will somehow be exempt from prosecution.

    • 1 hour

      Absolutely! Journalists really need to start describing these as what they are rather than the marketing term. It is much more accurate to call them “ID Checks” or something like that.

  • This is just another dog and pony show. If the company doesn’t have any offices or assets in utah, then they don’t have to care. Utah can censor it’s own internet if it doesn’t like it.
    This law simply has no legs to stand on.

    • Can states not sue companies that accept payment from citizens within their state?

    • The point is it will spread. Unless you can convince people to jump to i2p en masse it not going to end well.

      I have to wonder how a webtorrent based setup on Yggdrasil would perform…

    • Yeah, I was wondering how on earth this would work. If my organization doesn’t operate or host in Utah and they file suit against me why wouldn’t I tell them to pound sand?