@victor Someone let you install linux without cowsay installed? Clearly their fault.
Realistically speaking, utopias would probably look a bit grubby and lived-in, especially if we're talking about low-key, actually achievable utopias as opposed to chrome and food pills.
That's the side-effect of making an actually liveable society, people are gonna live in it, and leave stains, scuffmarks, wear, tear and grafitti behind.
@chjara@mk.absturztau.be That's called "the lizardman constant", a couple percent of answers to any poll are complete garbage. https://slatestarcodex.com/2013/04/12/noisy-poll-results-and-reptilian-muslim-climatologists-from-mars/
@urusan This question bothered me, and it took me an embarrassingly long time to figure out why.
If I set up a company it would be a cooperative from the start, and it would stay that way. So it wouldn't even be my decision, because no single person should be taking decisions that significantly change other people's lives without their input.
In practice this means I'll probably never start a company. <<"
@CyReVolt Huh, I wanted this to be a playful complaint, apparently I failed at the first part, sorry about that. The popcorn comment made me expect some amusing takedown there, which made it unpleasant to read.
Also thanks for the source, as the latter part of my previous post implies I actually learned something so it was useful, even if unpleasant.
#Technofeudalism is a new system in which the techno-lords are extracting a new power to make the rest of us do things on their behalf. This new power comes from investing in a new form of capital that allows them to amass a new type of value which, in turn, grants them the opportunity to extract surplus value from vassal-capitalists, the precariat, and everyone using their platforms to produce on their behalf, even more command capital. #surveillancecapitalism
https://the-crypto-syllabus.com/yanis-varoufakis-on-techno-feudalism/
@chjara@mk.absturztau.be You can have the same problem with any power structure, because it's about power not majority/minority. These are often correlated, but not always -- e.g. iirc one of the Middle Eastern countries had a Sunni majority ruled by a Shiite minority, or the other way around. There was systemic oppression against the majority there.
Oh, I actually suspect RSA during apartheid would be an even better example, but I know even less about that.
@bram XMPP is not encrypted by default, which is imo quite important information that's missing from the graphic.
New #blog post: The right thing for the wrong reasons: FLOSS doesn’t imply security . A longer post, ~3623 words.
I think free and open source software is super important and avoid proprietary software (the only proprietary software on my machine is firmware and Zoom, which I’m required to use). But too many people support it for the wrong reasons: they assume that proprietary software is impossible to audit and that source availability is therefore necessary for security. Quote from the article:
One of the biggest parts of the Free and Open Source Software definitions is the freedom to study a program and modify it; in other words, access to editable source code. I agree that such access is essential; however, far too many people support source availability for the wrong reasons. One such reason is that source code is necessary to have any degree of transparency into how a piece of software operates, and is therefore necessary to determine if it is at all secure. Although security through obscurity is certainly not a robust measure, this claim has two issues:
Source code describes what a program is designed to do; it is unnecessary and insufficient to determine if what it actually does aligns with its intended design.
Vulnerability discovery doesn’t require source code.
I’d like to expand on these issues, focusing primarily on compiled binaries. Bear in mind that I do not think that source availability is useless from a security perspective, and I do think that source availability is required for user freedom. I’m arguing only that source unavailability doesn’t automatically imply insecurity, and source availability doesn’t imply security. It’s possible (and often preferable) to perform security analysis on binaries, without necessarily having source code. In fact, vulnerability discovery doesn’t typically rely on source code analysis.
There’s also a gemini version.
tech, parents, ?
'parental control' in tech is pernicious
primarily, i don't believe parents deserve control over another person
and otherwise, the root problem is the harmful nature of the internet's obsession with profit, not that Screen Time magically corrupts a child
limited screen time when i was younger literally just:
- got in my way when i wanted to self-educate
- taught me how to evade user-hostile systems I guess
@kravietz ...what? This article does some strange flips by insinuating that the environmentalist position is to stop using fossil fuels altogether, rather than stop using them as, well, fuels, which is the main way in which they contribute to climate change.
There is a point there to be made about the cost of moving away from fossil fuels as fuels, but if the article is using such dishonest tactics as implying this would stop us from using them in other ways, well, I'm not inclined to trust it.
Much of this article talks about nuclear energy and that part is decent, but there are worrying statements there that too me look like parts of the latest goalpost shift from the climate crisis inaction propaganda. Especially the comment about carbon capture, a technology that is at this point much less likely to work than even going full renewable.
@pre Good post, although:
1. I believe you can deoligarchize PoS, although it requires some work few people are even attempting.
2. It's still better to use less resources, even if they are green.
@mkljczk Ja widzę co najmniej dwa powody do spoofowania -- nieujawnianie własnego i zwiększenie szans że adresat odbierze. @polamatysiak
Good article about a bad subject, all the more because it confirms things I've believed for some time.
You have to design for anti-harassment from day one. Waiting until the project is in the hands of the public and then adding it is much, much too late and you will always be playing catch-up. If you bother trying at all, like those YouTube alternatives I mentioned.
One thing I applaud Mastodon for is actually thinking about it during the design stage.
https://blog.mollywhite.net/abuse-and-harassment-on-the-blockchain/
Programmer and researcher,. Ended up working with all the current buzzwords: #ai #aisafety #ml #deeplearning #cryptocurrency
Other interests include #sewing, being #lesswrong, reading #hardsf, playing #boardgames and omitting stuff on lists.
Oh, and trans rights, duh.
Header image by @WhiteShield@livellosegreto.it .
Heheh, gentoo, heh, nonbinary, heheheh... I'm so easily amused sometimes.