• 2 Posts
  • 616 Comments
Joined 8 months ago
cake
Cake day: June 25th, 2025

help-circle












  • Good thing it lies in the theoretical so you don’t have to bother pointing out anything corrupt or evil about him, huh. Although at the time, he was also demonized considerably. He’s a great safe spot for propaganda what-ifs, since he’s unlikely to ever be mainstreamed by democrats, but having said that your comment still sounds astoundingly naive because of its suggestion that even in 2016 elections weren’t being manipulated.

    That’s the biggest problem with your comments, that you try to portray the candidates as the cause when it is a significant part of the system, from the gerrymandering, to the social network manipulation, to the purchase and control of local and regional media networks in the districts that mattered, to the lobbyists financing, contributing, and sabotaging for their candidates, all to place the labels of “evil”, “corrupt”, “loser” to candidates several orders of magnitude less than the current candidate.

    It cannot serve any other purpose to misinform and disarm opposition by eliminating the possibility of any step by step solution over the “we must choose the sacrosanct most virtuous god emperor to save us!” I frankly think you’d be tooting Bernie Sanders flaws if he was more likely to be mainlined into a candidate, because yes, he’s been the better candidate for a while even if the process will not make him electable. Doesn’t mean that there aren’t better alternatives to dictator despot, but no matter how evil, how inhumane, how despicable Trump is, I suspect your conditions will always be placed in such a way as throw insults and discourage support of the clearly flawed but still nowhere as bad alternative. Forgive me if I’m wrong, but regardless I still thank your efforts because it does eventually push for much needed candidates like Zelenski in Ukraine to be voted in, although the US seems a bit hopeless in this regard so much so that state secession seems like a solution it might need to resort to.






  • It wouldn’t even have to be that. There’s enough specialized US data communication and GPS microchips in there that any one of them could be compromised. There’s more than enough history of this, people not willing to consider it are part of a bubble: https://en.wikipedia.org/wiki/Hardware_backdoor#History

    “The ‘kill switch’ in the F-35 is more than just a rumour,” Joachim Schranzhofer, the head of communications at German defense company Hensoldt informed the local media outlet Bild. “But it’s much easier to use the mission planning system - then the plane stays on the ground.”

    I’ll take the word of the head of communication at a German defense company that has actually vetted the systems over armchair commenters any day.

    Then there’s the possibility of backdoors to access mission critical data by deliberately compromising their encryption: https://www.atlasobscura.com/articles/a-brief-history-of-the-nsa-attempting-to-insert-backdoors-into-encrypted-data

    Then there’s the chasm between “complete technical schematics” being available and actually being able to produce said equipment without resorting to a US controlled supply line. It’s not just firmware, if they cut off access to maintenance supplies, you aren’t going to have it easier than Russia is having it with their sanctions, it’s still going to take its toll on your supply line.


  • What I don’t understand is, have these people never heard of OAuth? I don’t know what it is, we have decades of this and people act like it doesn’t exist and don’t see the value in it. Even Lemmy, try to suggest why it might be valuable to separate identity versus community hosting, it’s like you have to walk people through it step by step.

    There’s no way I’m giving platforms like this even more private information, but if governments put forth both publicly available OAuth servers along with the possibility of privately purchasable OAuth servers for this sort of thing, I would have no problem with it because then you have the possibility of vetting age authenticators like you would VPN providers, and the data would never leak into the social networks that abuse it. It’s like the regulators and the Internet has conveniently forgotten about OAuth and certificate authorities and has just said, “Yeah, let’s just have users leak their data all over for this” as if there were no better way. Maybe that’s the point, because I suspect organizations like Palantir will be quite happy at things like this.