Giver of skulls

Verified icon

  • 0 Posts
  • 172 Comments
Joined 102 years ago
cake
Cake day: June 6th, 1923

help-circle

  • Many suicides being opportunistic is why a small barrier or a sign added to a bridge or railway can prevent a lot of suicides. Most suicides aren’t really well thought out, they happen because the victim happens to see an opportunity right at the wrong time. Making them walk around a barrier can be enough to dissuade them from trying (that day, at that spot).

    It’s no wonder so many Americans kill themselves using guns. They’re deadly, death is instant when done right with no suffering, and they’re accepted to have laying around. Knives and pills will also do the job but they’re not as quick and easy, and often become quite gruesome and painful ways to go if not stopped in time. That said, preferred methods of suicide are different for different groups of people, for instance with men typically choosing a rather violent yet effective methods while women typically choose less violent (but easier to survive) methods.



  • That screenshot again proves that this person is extremely cringe, presumably a troll, but there’s still no threat. At worst that’s racism against Americans. Should obviously be removed by moderators from any normal online service that wants to encourage pleasant conversation, but that’s not necessarily illegal.

    As for the PDF, that’s not a legal definition by any kind, it’s a quick explainer for a law that only applies to hosting providers receiving complaints from European authorities. So yes, if the Belgian police sent a takedown notice regarding terroristic content then it does apply.

    However, that regulation is mere instruction to EU states to draft compliant laws. It’s not actionable legislation in itself (similar to the GDPR).

    The full text of the Regulation does include this instruction for EU countries, which I haven’t seen before:

    In order to provide clarity about the actions that both hosting service providers and competent authorities are to take to address the dissemination of terrorist content online, this Regulation should establish a definition of ‘terrorist content’ for preventative purposes, consistent with the definitions of relevant offences under Directive (EU) 2017/541 of the European Parliament and of the Council (6). Given the need to address the most harmful terrorist propaganda online, that definition should cover material that incites or solicits someone to commit, or to contribute to the commission of, terrorist offences, solicits someone to participate in activities of a terrorist group, or glorifies terrorist activities including by disseminating material depicting a terrorist attack. The definition should also include material that provides instruction on the making or use of explosives, firearms or other weapons or noxious or hazardous substances, as well as chemical, biological, radiological and nuclear (CBRN) substances, or on other specific methods or techniques, including the selection of targets, for the purpose of committing or contributing to the commission of terrorist offences. Such material includes text, images, sound recordings and videos, as well as live transmissions of terrorist offences, that cause a danger of further such offences being committed. When assessing whether material constitutes terrorist content within the meaning of this Regulation, competent authorities and hosting service providers should take into account factors such as the nature and wording of statements, the context in which the statements were made and their potential to lead to harmful consequences in respect of the security and safety of persons. The fact that the material was produced by, is attributable to or is disseminated on behalf of a person, group or entity included in the Union list of persons, groups and entities involved in terrorist acts and subject to restrictive measures should constitute an important factor in the assessment.

    However, the Regulation also refers to human rights such as freedom of expression. One can be of the opinion that it’s better for the USA to stop existing without any plans or support for actual genocide. Someone expressing hate for your country isn’t immediately a terrorist.


  • Do you have a copy of the actual threat? Because “you are a settler” is stupid but not an actual threat.

    I don’t know where you got that picture from, I can’t find the legal definition for a terroristic threat within the EU. The best I could find is:

    For the purposes of this Convention, “public provocation to commit a terorist offence” means the distribution, or otherwise making available, of a message to the public, with the intent to incite the commission of a terrorist offence, where such conduct, whether or not directly committed.

    That’s just a convention, though, not direct law. The definition by the convention does require proof of intent, which I haven’t found about the cringe hexbear user.






  • There are other political parties, but because of the way American elections are structured, they have basically no chance of gaining any influence on a large scale. Dividing the vote just reduces the chances of your preferred party in the current system. If a “Republican-but-not-Trump” party would gain popularity, it’d divide the vote 50/25/25 and the Democrats would overwhelmingly win.

    Third parties have a handful of representatives but they’re effectively powerless on a large scale.

    This is very difficult to fix as it would require restructuring elections to remove the third party disadvantage. Neither party currently in power is a fan, because they only stand to lose votes when such a system is organised. I don’t think it’ll ever happen unless the USA collapses or we get some kind of united world government or something.


  • I’ve had the opposite happen. I (unknowingly, at the time) rejected a girl whose friends told me she liked me by going “haha okay then” and walking off, assuming it was a joke. Only realised nobody was laughing and it probably wasn’t a joke ten years later when the memory popped back into my head.

    She seemed pretty happy dating another guy when I last saw her. Good for her, hope I didn’t hurt her too much by dismissing her like that. Would’ve absolutely crushed me had I been in her position.


  • Linux works on desktops because the companies making desktop hardware put somewhere between “some” and “massive” effort into making mainline Linux work. It’s not that difficult for motherboards (most of the work is done for motherboard manufacturers already) but for anything from CPUs to disk drives, manufacturers write Linux code and submit it back upstream. Without companies wanting to make Linux work on PC, it simply wouldn’t. Of course there are plenty of volunteer and hobbyist programmers who also contribute, as well as people paid by the various free software funds, but they generally do smaller stuff rather than complete device support. It also helps that computers have standardised ways of booting and identifying what hardware is present.

    On ARM, companies like Qualcomm take the inverse approach. They take Linux, make some modifications (usually ones that will never be accepted upstream because of code quality or style concerns), build binary drivers for that specific version of Linux, and then hand that entire thing to companies like Google and Samsung. These vendors have no interest in upstreaming code and make a lot of money selling ongoing maintenance for old, customised kernels.

    Booting ARM devices is also a pain. Instead of BIOS/UEFI, every vendor has their own boot method, usually involving a modified version of u-boot that’s customised to do whatever weird shit the vendor needs.

    Even if you get Linux to boot, you’ll probably struggle with basic features like “not burning through the battery in ten minutes” without vendor code or binaries.

    There are projects to bring normal Linux to phones. Ubuntu Touch is actually quite usable, Plasma Mobile works on a few devices, and postmarketOS has a surprising range of working hardware. One big challenge is support for hardware accelerated wifi, and the latter is doing quite well for that.

    Still, despite all the hard work, some stuff like binary drivers just won’t make it into the kernel without major effort for every model of SoC. For Android phones, the custom upstream kernel can form a good basis, but someone needs to go through the code and make it Linux compatible. WiFi and Bluetooth can usually be hacked together but someone needs to do it. Cell modems are even worse, so calling and texting are even less likely to work.

    Basically, there’s no commercial interest, the hardware works very differently, and it’s a lot of work. It can be done if someone is passionate enough about Linux on their device but only for one or a few related models in that case.


  • America is a bit weird in that sales tax can differ between state and even municipality. Having different prices in a store two towns over isn’t very practical. This is different from how Europe does it, where taxes may differ between countries/states but not at the local level. Plus, with VAT there’s a system between EU countries to equalise VAT between countries when people show internationally.

    Infuriatingly, bottle/can deposits often aren’t displayed on the price labels even in the EU. You come in with a two euro coin, buy a 2 euro bottle of your choice, and learn at checkout that your 2 euro coin isn’t enough to pay for the 3 euro bottle.

    I know it’s different because you get your deposit back, but I think stores should be forced to show the deposit fees on the label. It’s not a huge amount of money, but it makes for some very annoying head math if you’re trying to buy something and only carry a little bit of cash.


  • There are many reasons why your hands may tend to shake, and none of them are masturbation. And no, you won’t go blind either.

    Talk to your doctor if you worry about this stuff. Shaky hands could be a symptom of a harmless combination of your genetics (essential tremor, that kind of stuff), not getting enough sleep, stress, or it could be a sign of something bad (early onset Parkinson’s, thyroid issues), or maybe it’s just low blood sugar. Don’t listen to the internet for medical stuff, get a professional’s opinion!

    As for sex toys, some people swear by them, others find them more trouble than they’re worth. They won’t stop your hands from shaking but that doesn’t mean you can’t try them if you’re interested.



  • A lot of it comes down to trust. Scan downloads with antivirus. Decide how much you trust everything else. Err on the side of caution if you’re unsure.

    In your example, the software you’re using seems fine to me. A simple addon with limited scope that hasn’t been updated in years, but has some good reviews.

    That said, you don’t need this addon; go to your favourite Wikipedia front page, right click the search bar, and click “add keyword for this search”. If you enter keyword “wen”, you can search English Wikipedia by typing “wen <something>” in the search bar. Works for other websites too

    Github releases can contain completely different code than the source code on there. Don’t trust them blindly like others might suggest. It’d be trivial for someone with bad intent to release FOSS software and include a virus. It happened to an important Linux tool not that long ago. Most code on Github is fine and most software is just out there to help you, but it’s good to he careful.

    My personal process involves checking for things like “how many downloads does this have” and in the case of addons and apps “how many permissions does this ask”. Addon with a dozen downloads to change your Facebook theme that wants access to your entire browsing history? No thanks!

    The biggest differentiator between virus and safe in my experience is “how legal is the thing I’m downloading”. Viruses, cracks, keygens, pay wall bypasses, that sort of stuff is full of bad shit, because whether or not there’s a virus in there, your antivirus will go off anyway and you’d assume it to be a false positive.

    There are steps you can take to protect your computer, but generally “keep antivirus on”, “don’t pirate stuff”, and “when in doubt, click no” are generally good enough.

    There’s a cool trick recent pro/education versions of Windows have where you can create an entirely temporary copy of Windows by simply right clicking an executable and clicking “run in sandbox” or something like that. This is great for trying out small programs that you don’t 100% trust but seem fine at a glance. Doesn’t work well for games, isn’t 100% bullet proof, but it’s an easy way to prevent unexpected infections. The only downside is that you need to get a Windows pro/education key somewhere (though those are not hard to come by). Really wish Microsoft would roll that out to home users.


  • Your messages won’t work right in some Office365 servers that inject the “this email came from outside of your organisation” banner into the body. Oh, and people who get notifications about your email will only see the PGP header string.

    Other than that, I don’t see the problem. Just make sure not to sign any emails that you don’t mind being used against you in court, because PGP accidentally makes it possible to prove your laptop was used to send your messages.

    On the plus side, the 12 people you’ll ever meet that also use PGP will send you encrypted emails. Just make sure you keep those old, expired keys around, or you won’t be able to read your old emails back.


  • That’s a load-bearing “could” if I’ve ever seen one.

    I don’t really see the point of these new authentication methods. OpenID had federated authentication years ago that was actually used by a bunch of sites like stackoverflow. Native browser support is nice (as long as browser addons can be used to manage credentials) but I don’t really see that big an advantage to good ol’ OpenID.

    OpenID died in the federated space because developers couldn’t be bothered to trust anyone but Google, Facebook, and Twitter, so I’m not sure why things would change now, unless the big auth providers shut down their OAuth APIs in favour of fedcm.


  • Link detection is flaky as hell, especially for special characters. They rarely work reliably. URLs themselves don’t contain unicode. They use basic ASCII and anything beyond that needs to be encoded in some form. The link you posted isn’t a spec-compliant link, it only works because Lemmy apps and browsers are nice and do the conversion to the real URL for you. According to the spec:

    When a new URI scheme defines a component that represents textual data consisting of characters from the Universal Character Set [UCS], the data should first be encoded as octets according to the UTF-8 character encoding [STD63]; then only those octets that do not correspond to characters in the unreserved set should be percent- encoded. For example, the character A would be represented as “A”, the character LATIN CAPITAL LETTER A WITH GRAVE would be represented as “%C3%80”, and the character KATAKANA LETTER A would be represented as “%E3%82%A2”.

    If you use usernames as identifiers (which, again, are optional) like Lemmy does, databases and external entities will use the percentage URLs, not the readable ones. Unicode domains will have their xn-- form stored as well. It’s up to apps and browsers to decide those and turn them back into unicode. It’s not really relevant what apps and browsers show you when it comes to the technical interoperability of users.

    ActivityPub itself has wide support for various languages, including having different names and content for different languages. The username (actually preferredUsername) is transmitted through JSON, which is by definition UTF-8, so most encodings in use today (not that weird Japanese one and that other Asian encoding that’s not UTF compatible) will Just Work™ assuming the necessary URL encoding and decoding logic is added in the right places.

    I think Lemmy can be patched to accept unicode characters as usernames, as the current limitations in code and in the UI are just choices made during development. I don’t think it’ll add much, though.