Avatar

Khan

Khan@feddit.nl
Joined
2 posts • 13 comments
Direct message

Yes and no.

Structurally, it’ll remain decentralized, so one clear advantage here is that if the admins of a very large instance start trying something, my current understanding of how this works would let users ignore them. They don’t control account creation, since any federated instance can see everything, so there’s no meaningful way to actually block someone, they can make a new account and the rogue instance has no further powers to stop individuals. They could block whole instances that don’t conform, but unlike Reddit, that doesn’t get rid of them. Instead, it fractures the communities, which hurts everyone. In that case, a user protest wouldn’t be a blackout like Reddit had, it would be a migration to another instance, and if other instances blocked them back, replacement communities would form.

Of course, this is a double-edged sword, it’s harder for Lemmy to permanently end communities of hate and others that deserve permanent bans, as is always the case with decentralized authority, but that’s the tradeoff.

permalink
report
reply

Dunno for sure, I feel the same way as you, but I think it’s more about "I refuse to use the app you intended me to be forced to by killing [favorite 3rd party app].

If combined with an adblocker they don’t get your ad revenue but they do still get to add you to the tally of “active users”, so I still feel abandoning ship altogether is best practice.

permalink
report
reply

Based on a Google search and the following link, no.

Google defined child porn using the term “sexually explicit conduct”, involving a minor, fair enough, gotta look deeper.

Cornell has a legal definition of sexually explicit conduct for us, which basically breaks it into 5 categories, actual sex, bestiality, masturbating, specific kinds of abuse, and displays of various body parts.

https://www.law.cornell.edu/definitions/uscode.php?def_id=18-USC-821371409-1416780790

If this would be CP, it’d have to be some kind of abuse or the display, and I don’t think anything Nick aired would count as “masochistic” or “sadistic”. The body parts listed are also specific and don’t include feet.

So, in the US, it’s just really creepy, not CP. the fact we have to delve this deep to determine it’s not CP is pretty telling on its own, though.

permalink
report
reply

Purchase history would just be what apple knows, not your general purchase history.

If you use Apple Pay, for instance, they’re the middleman and have to know, and anything you buy on the App Store.

A legitimate reason to share that is a budgeting app. Facebook is taking advantage of that, obviously, but in this instance, I see no fault from apple, here, there’s reason to allow an app to get that, so an app can request it, and we can deny it by not getting that app, so fuck Facebook, I’m not downloading it.

permalink
report
parent
reply

In my opinion, he’s the asshole for pushing. That said, if you’ve been talking for a year, I think he’s just trying to learn more about you and doing it wrong, not that he’s got some scam behind the scenes. But whether he’s real or not, a friend should respect your boundaries for something like this, it’s literally a safety issue, and he’s being a bad friend.

If you value this friendship and think this can be a one-time thing, I’d unblock him and give him another chance to leave the address thing alone. If you don’t think he’s real or don’t think he’ll leave it alone, leave him blocked, and either way, he’s the asshole, not you.

permalink
report
reply

It’s not in that same section, but I find pretty much everything but coffee and tea lists the amount near it.

permalink
report
parent
reply

I’d pass it on to someone younger than you. You didn’t benefit, the tradition/luck was upheld, seems like the best answer here.

Morally that makes you all squared up, although legally you still accepted it, so this advice is only good if you know you could get away with accepting money, since this sounds like you visit this guy as part of a job.

permalink
report
reply

You can go into your account and under two-step, generate a one-time code. Store that code somewhere secure, like a note in your password manager if you trust it with both steps, and you can do it.

Pretty sure Google authenticator will have something equivalent but likely more secure, but haven’t used it.

permalink
report
parent
reply

At least most of that can be turned off in settings somewhere.

Bought a neat closed-loop watercooling cpu heatsink that has a whole dang programmable screen on it if I pay a monthly thing, or solid colors if I don’t. defaults to cycling through the rainbow. But it has an off mode, so I’m A-OK with none of that.

permalink
report
parent
reply

I have never heard of anything secure doing that. Assuming they have taken security steps, it would mean they recorded those characters in plaintext when you set your password, but that means that at least those characters aren’t secure, and a breach means some hacker has a great hint.

When the hashing occurs, it happens using the code you downloaded when you visit the site, so it’s your computer that does the hash, and then just the hash is sent onwards, so they can’t just pull the letters out of a properly secure password.

A secure company would use two-factor authentication to verify you above and beyond your password, anyway, since a compromised password somewhere else automatically compromises questions about your password.

permalink
report
reply