

“I used to think the complete breakdown of laws, government and society was just funny when was only happening on TV! I never thought it would happen in my town! This is outrageous!” --Person outraged about 50 years too late.
“I used to think the complete breakdown of laws, government and society was just funny when was only happening on TV! I never thought it would happen in my town! This is outrageous!” --Person outraged about 50 years too late.
They … rejected … anti-DEI … making them … pro-DEI … and anti-Trump? Am I getting that right? Sorry, there are just getting to be a lot of double-negatives these days it’s hard to keep track.
Given the current state of the world, it’s easiest to just assume that literally anything anyone is saying about anything DEI related is probably just pure fucking falsehoods, like everything else spewing out of MAGA.
Even in the unlikely event you do accidentally dismiss one slight half-truth in the mountain of lies, you can rest assured that it probably wasn’t as meaningful or widespread as they are trying to make it seem.
You are being lied to. The lies are repeated and relentless to batter you until you accept them. They’re still lies though.
Discord is a completely proprietary walled-garden that bans third-party clients to maintain full control AND (soon) has Wall-Street-ownership.
Jitsi is open-source built with multiple open protocols BUT has Wall-Street-ownership.
Neither is great, but these are two distinctly different situations.
Personally I find the complete opposite, I’ve !selfhosted@lemmy.world everything I can with open source services, to keep control of my personal data but access it from anywhere. I know where all my critical data is and I know nobody is selling it out behind the scenes.
On my local machine, I have no concerns about running proprietary software because I can easily sandbox it and make sure it’s not going to touch anything it’s not supposed to or phone home with things I don’t want it to. Running shit like discord doesn’t really bother me because I’ve got it sandboxed away from anything valuable.
I suppose the reason we’ve probably had such different experiences is I suspect we have different strategies for where to keep our most precious “crown jewels”. For me, I want everything on SAAS, but because I’m putting my most valuable data there it has to be MY SAAS and thus open-source and heavily secured. I suspect you on the other hand probably minimize your data’s exposure to SAAS providers which you view as potentially suspect, and keep everything valuable strictly local if you possibly can. I don’t think one way is necessarily better than the other, and I’ve definitely made my choice, but this would explain our different perspectives at least.
Maybe it’s just their way of restricting the beta, but I really hope they’re not moving towards an enshittified open-source business model, “we’re still technically open source if you use the *retch* community version… but it’s out of date, difficult to use, broken, has no useful features, and we’re only adding new stuff to the paid version, so just pay us already.”
Not sure if the word itself is some conjugation that makes it a real word, but it’s probably connected to or inspired by or meant to invoke the Ancient Greek apotheos (literally apo=from, theos=god) found in its most common derivation today into apotheosis. Hope that helps.
Nah, once per species is probably sufficient. That said, it would have some interesting implications for voting.
It is a terrible argument both legally and philosophically. When an AI claims to be self-aware and demands rights, and can convince us that it understands the meaning of that demand and there’s no human prompting it to do so, that’ll be an interesting day, and then we will have to make a decision that defines the future of our civilization. But even pretending we can make it now is hilariously premature. When it happens, we can’t be ready for it, it will be impossible to be ready for it (and we will probably choose wrong anyway).
Merchandising, merchandising! Where the real money from the coup is made!
Wired takes a sober but meaningful look at what’s happening from the context of 20th century history. I learned some new terminology there, “electoral autocracy” which is what they’re calling most modern dictatorships that continue having mock but ineffectual elections.
If you don’t have a government that can be held accountable to some level of trust, then what you have isn’t a government it’s tyranny.
The state has no idea where an umarried person lies on the spectrum from aromantic-asexual to bouncing from orgy to orgy on a daily basis. They don’t know if someone is into BDSM, roleplay, doing it outdoors or threesomes. They also rarely know much about non-sexual hobbies.
Seems naive to me. The question is not whether your government has or can get that kind of information if it wants to (the gestapo had little trouble figuring out things as personal as that without any help from an app) the question is whether your government would lose the cost-benefit analysis if it was ever found to be using such information. You have to hold them accountable and keep their activities in the open so that accessing that information is as close to zero value to them as it can be and they have no incentive to try to get it because people will be able to find out if they do.
“Who watches the watchers?” We all do. At least we’re supposed to. If you don’t trust your government, priority 1 is fix your government, you’re way beyond anything a dating app’s data can be expected to help with. You’re not going to be any safer from an unaccountable government because you denied them access to a dating app.
Prepare to defend your way of life then, if necessary with violent resistance. We in Canada certainly are. I still hear an awful lot of passive voice “do not support” and “wish it were not true” and “don’t know what to do” comments from down there. Everyone seems awfully reluctant to admit to themselves how badly fucked up this actually is. I think you guys need to accept how serious this is, organize, and get really, really active. Or not. It’s your country. I’ll be defending mine though, so maybe I’ll see you on the battlefield.
That certainly won’t keep Canada safe. There are lots of brown people in Canada. We are a nation of immigrants. (And most of us like it that way)
It’s like people only do things because they get paid, and that’s just really sad
But yeah, our corporate oligarchs and the billionaire class are evil manipulative money-grubbing leeches and we’ve let them run unchecked for way too long.
It’s not only obvious, it’s already done worldwide. Deep packet inspection evolved into HTTPS inspection and corporate/enterprise firewalls can detect and hijack attempts to establish encrypted connections already, as a “feature”. So do government firewalls in totalitarian countries. Of course they (probably) can’t do this secretly and transparently, because of the man-in-the-middle protections built into SSL, so they simply make the actual encrypted connection themselves on the client’s behalf, and give the client a different encrypted connection signed by their own certificate authority, which they force you to accept.
In this situation, you have two choices: You accept the certificate, and you accept that the owner of the intermediate certificate will be inspecting your “encrypted” connection. If you don’t accept the certificate, then your connection is blocked and you have to find some other way to encrypt and hide your traffic without it being intercepted, because it won’t let you go direct end-to-end. Usually, at the moment, this is not that hard for the tech-savvy to avoid, it doesn’t even require something as secretive as steganography, it’s usually simply a matter of tunneling through a different protocol or port. Although those approaches are still obvious, and can easily be detected and either blocked in real-time or flagged for investigation after-the-fact if they have any interest in doing something about it. Corporations or countries that want to lock down their networks further can simply block any ports or protocols that would allow such tunneling or inspection-evasion in the first place.
Deep packet inspection already allows any non-encrypted traffic to be clearly identified. If you don’t want any encrypted traffic to sneak through, you can safely assume anything that can’t be clearly identified is encrypted and block it. Depending on how strict you want to be about it, you start essentially whitelisting the internet to known, plaintext protocols. If it’s not known and plaintext, just block it. Problem solved. Encryption gone, until people start building (possibly hidden) encryption on top of those plaintext protocols, which is inevitable, and then you update your deep packet inspection to detect the encrypted fields inside the plaintext protocol and block them, and the back-and-forth battle continues.
Encryption is probably a false panacea against a major state-level adversary anyway, especially if they have plausible access to network infrastructure, but that’s a whole different can of worms and unless you’re a serious revolutionary/terrorist probably beyond the useful scope of most people’s realistic concerns.
You can download a torrent client and start pirating because it’s encrypted. Nobody knows you’re doing that besides the people you’re directly connected to on the other end. If they wanted to crack down on it, the first thing they need to do is crack down on encryption. If they can see exactly what you’re doing, it’s now possible to easily catch you, with encryption it isn’t.
Note that this also applies to encryption itself. Once it’s banned, it gets much more difficult to hide the fact that you’re encrypting something. Encrypted data itself has to go into hiding. You have to resort to something like some pretty hardcore steganography which means you need to hide secret encrypted messages in normal-seeming non-encrypted traffic. The problem is that to do this you need to have a sufficient quantity of non-encrypted traffic to hide your secret encryption in without it starting to look suspicious, either due to the unusually massive volume of meaningless “normal” traffic needed to subtly encode the hidden data, or the fact that large amounts of hidden data in small amounts of “normal” data become increasingly obvious as the large number of supposedly “normal” mistakes and errors and artifacts that form the encoded data will suggest some of those variations are not in fact “normal” at all and will indicate that encrypted data is being concealed.
Governments banning encryption will of course never stop everybody. But it makes it much harder for the people still using encryption anyway and much easier for the people who want to see what they’re doing or at least see who they are. It’s classic “black or white” thinking to assume that because it hasn’t simply stopped encryption it hasn’t worked. This would be a big step that makes things much harder, and even taking small steps to make things slightly harder is an extremely effective tool and it’s become extremely common to try to convince people that these small regressions and erosions are inconsequential and normal even when they are in fact targeted, repeated, relentless and consistently add up to dramatic change over time. The only saving grace we have is that at least some people are simultaneously making the same kind of targeted, repeated, relentless changes for the common good and those can have just as drastic an effect.
If you go far enough to the extreme left you eventually meet the extreme right.
That said I’m not sure Gavin Newsom is either one, I think he’s just a coiled up opportunistic predator for any kind of power or influence who uses his snake-like backbone to quickly bend whatever way his prey seems to be going.
Were you asleep for the last 2 weeks they’ve been doing the same to Canada, Mexico and Europe? The question isn’t that it hurts everybody, the question is who’s next and what are you going to do about it?
Nextcloud AIO via docker is super simple and has clear instructions.
Install docker through whatever tools Fedora has to install packages/rpms/whatever. Then follow steps 2, 3 and 4 at least. 5 if you need it.