@GuerillaOntologist Thanks for the post! Redesigning punktv.com now and adding some unknown bands from back in the day!

One of the great things about living in a small town is the baseline sense of mutual aid. When I tell people my landlord is trying to evict me, I'm immediately met with generous offers of help.

"Do you need a place to stay? Do you want me to get you in touch with the lawyer on my curling team? Do you want my jar of leftover bacon grease to pour down the drain? Would you like me to burn your landlord's house down?"

"too smart to not be depressed"

I mean...

privilege does play into that, right? the ability to ignore the hellscape because it doesn't impact you?

but it's also... okay? to not doomscroll all day? like you have a limited amount of spoons to give, so you prioritize

taking someone who's neutral and going:

"arg why aren't you freaking out like I am that the world is burning you aren't doing enough?!??!?!"

vs

"hey, I care about ABC, so later on me and the crew were gonna talk about XYZ steps to make the world a better place. you wanna join?"

like, yes the world is on fire, and needs action now.

motivating people to do something is a skill.

anybody with half a brain can alienate people into inaction.

if "Aaaaahhh!! on fire!" motivates you and your friend group, cool.

I'm trying to motivate a bunch of peaceful, privileged, "it doesn't affect me yet" folks.

they would instantly tune out a protest.
but they are someone who could do other stuff :)

organize to solve a smaller local problem, first.

@liaizon A lot of people think that the pentacle was chosen because of its occult or satanic connotations. And while it would be in Fediverse's rebellious spirit, this was not the case.

My idea was to illustrate the structure of the network. There must be multiple nodes (multiple servers). There must be nothing in the middle (no center). The connections can cross each other, but must never follow the same path twice. No connection must be on top of each other.

It can't be done with two nodes, because it's just a line and in the middle of the line, there's line. It can be done with triangle, but it's boring. It can not be done with four nodes, because their connection cross in the middle.

So, five nodes it is. Thus, a pentacle.

Also, a pentacle is a classic symbol for a star. And I always wanted to associate the Fediverse with the stars and space in public consciousness.

What's plural of "a fedi node"? "a constellation".

@eudaimon

When it comes down to the essential corporate model, BU tells Faculty we are "managers" - the employers of grad student employees. I reject this assertion of my relationship with grad workders as an advisor, mentor, and teacher. I never signed or agreed to the term "manager". I didn't "hire" the teaching fellow, and I don't "manage" them. We work together for the undergraduate students, and learn from and advise each other, in different ways.

Segmentation fault (core dumped)

Ah, how I was not looking forward to writing #C again!

(But it's fine, I'm getting paid for this inconvenience.)

#coding #unsafe

#Forgejo v1.21.8-0 was just released! This is a bug fix release.

We recommend that all installations are upgraded to the latest version.

Check out the release notes and download it at forgejo.org/releases/. If you experience any issues with this release, please report to codeberg.org/forgejo/forgejo/i.

@ct_bergstrom when my boss talks about using AI for things like writing help desk articles or training documentation, he caveats "of course it has to be reviewed." & what I don't say back (because it would hurt my credibility) is 'but we WON'T review it.'

Because I know we won't. It just won't happen. We'll create the help desk articles & they'll go up & people will get wrong info from them & we'll never know because they'll either just work around the errors or fail & never tell us.

I knew @FreeScholar had been in a punk band, but much to my shame I never bothered to look them up. Thankfully, that oversight has now been rectified.

youtube.com/watch?v=4i7dlmxasy

[The Black Punk Pioneer Boston Forgot]
disappearingmedia.substack.com

The idea of human beings as rational utility-maximizing particles with insatiable hedonic desires is very much the product of an ideological project to justify capitalism as “natural” and has virtually no relationship to how actual human beings live but a lot of people have genuinely internalized it.

Trying to derive “human nature” by observing people under capitalist modernity is like looking at a bored, depressed wolf obsessively pacing a circle in a tiny zoo enclosure and concluding that this is “wolf nature.”

I'm using Google podcasts until the last possible second. Will I learn and stop using their always abandoned apps? Of course not. I'm stupid.

#Coffee drinkers have much lower risk of bowel #cancer recurrence, study finds - theguardian.com/society/2024/m "those who drank at least two cups daily had a lower risk of dying compared with those who did not. " fab news, but more research needed

We just had our first “go-around and report on your grad worker” session. I declined to report. #BUGradWorkerStrike

Show thread

@foolishowl
When I go out into the backcountry, I've never once had to sit down and trade or ration resources or tasks with the people I'm with. And I've never once had to threaten, withhold, etc. These are contexts with resource scarcity, life-sustaining tasks, and time sensitivity. It always all gets done, and it's not even that hard to sort out. Like, "Hey, can you filter some more water down at the river while I watch the soup?"

@HeavenlyPossum

A newly discovered vulnerability baked into Apple’s M-series of chips allows attackers to extract secret keys from Macs when they perform widely used cryptographic operations, academic researchers have revealed in a paper published Thursday.

The flaw—a side channel allowing end-to-end key extractions when Apple chips run implementations of widely used cryptographic protocols—can’t be patched directly because it stems from the microarchitectural design of the silicon itself. Instead, it can only be mitigated by building defenses into third-party cryptographic software that could drastically degrade M-series performance when executing cryptographic operations, particularly on the earlier M1 and M2 generations. The vulnerability can be exploited when the targeted cryptographic operation and the malicious application with normal user system privileges run on the same CPU cluster.

arstechnica.com/security/2024/

While responding to a ShotSpotter alert, a Chicago police officer opened fire on an unarmed child in his backyard lighting fireworks. eff.org/deeplinks/2024/03/resp

Show more
Librem Social

Librem Social is an opt-in public network. Messages are shared under Creative Commons BY-SA 4.0 license terms. Policy.

Stay safe. Please abide by our code of conduct.

(Source code)

image/svg+xml Librem Chat image/svg+xml