That is why I try to think now in terms of disinformation, more than merely misinformation, when it seems intentional.
Compassion >~ Thought
That is why I try to think now in terms of disinformation, more than merely misinformation, when it seems intentional.
And this right here is why I like the Fediverse. Not immediately presuming the absolute worst case scenario and confidently asserting such, refusing to hear anything to the contrary? Offering kindness as well as accuracy in your answer? You didn’t go for the jugular in trying (even if failing) to “pwn” your victim!? You, sir, would make a very bad modern Redditor 🤪. Which is why I hope you stay here, where I can keep getting to read amazingly kind replies like these:-).
You are so helpful, I for one find that fucking awesome! 😎
THIS is indeed the way:-).
Not a public one no, but instance admins can see it.
And what is to stop someone from hosting content - like an image - onto their personal server, then collect the IP addresses of everyone who visits? e.g. couldn’t you receive a message in your DM, and without being asked, merely viewing the (auto-loading!) image could reveal that it was your account (that the DM was sent to) that came from the IP address that the image hosting server recorded in the incoming traffic?
Maybe I’m wrong? But that’s what I fear.
The content is, but the IP addresses used to interact are not.
Oh I thought that was blocked, but I guess maybe that’s just Lemmy.World that did that, while other instances can do otherwise (I thought I recalled that lemmy.cafe could - not from an onion b/c Lemmy itself somehow precludes that, but over Tor perhaps?).
How much though? I mean we have usernames yes there’s that, but can the federal agencies simply request that an instance turn over all signup data for all users and accounts? That might be an argument to avoid using US-based instances (though those mostly use Mbin or PieFed rather than Lemmy).
Or Lemmy is notoriously leaky itself - couldn’t someone simply put a thumbnail that pings a server owned by those agencies, and thereby get IP data directly? (or if not a thumbnail then a link to some website, like maybe supposedly a wordpress software or something, which functions yet also feeds IPs too) They could even spin up their own instance and watch all voting and posting traffic coming in as well, which in correlation to the IP addresses could tie down a user account. I guess a proxy would solve this particular issue. iirc there is all kinds of traffic from all kinds of servers whenever you visit every single Lemmy page, so simply putting out a post seems like it would be enough to get data from anyone that even so much as views it in their feed?
Another one relates to that time that Lemmy.World put out a user survey based on Google - anyone that responded would thereby tie a Google account to using Lemmy.
Sorry, I am all questions here and no answers, but this is going to be life & death & livelihood to so many people - splitting families apart all over again (I am referring to the previous border incidents, where e.g. babies were ripped from their mothers’ arms, some of which never did get reconnected even multiple years later).
I wonder if Lemmy will be included. On the one hand we are tiny, but there are also a lot of extremists here so it’s enriched in precisely the types that they would most want to know about.
Ofc they won’t SAY that - they’ll talk about “what a fantastic savings it will be, to not spend that money”, and probably they’ll work up gently to the point of sending US citizens to become meat shields like the North Koreans and so many others lately. But at each stage, it will always be what “we” wanted to do - it’s “our” idea to do it, I tell you!?
And this was from September so not even elected yet.
Tbh it kinda sounds like they just want to leave NATO regardless.
Unless you are saving it for something else, like the header of a table:-).
Absolutely. Plus the keyboard shortcuts are just outstanding - e.g. shift-M takes you to the middle of the screen - and you can even programmatically do things like make changes to every other line within the range 100-1000 but nowhere else, and even then restrict the changes to only those matching a pattern.
And it is installed on most every machine in the world - even Windows is putting bash onto things these days (I forget if that is still optional, admittedly I haven’t touched Windows in nearly a decade:-P) - and has been since virtually the dawn of computing, certainly long before the modern age. :-D I’ve used ssh on a fucking blackberry and edited files with vim before smartphones existed!
It is, however, notably hard to learn to use, I grant that:-).
Okay but… obligatory “gVim offers the best of both worlds by offering use of a mouse if you want it”. There are also native ports for Mac OSX and Windows, etc.
Vim, in contrast, is a command-line program, suited for e.g. working with a text file on a remote server that may not even be running an X-windows interface, or maybe the user simply did not bother to connect to it:-).
Okay, we may now proceed with the humorous jesting:-).
I mean, tbf we kinda are. If they are willing to lie, cheat, steal etc., but meanwhile nobody is willing to oppose them, then we aren’t players in their set of strategic moves.
The only thing required for evil to flourish is for good people to do nothing to stop it.