He self-identified as a fascist in his private journals, but who the fuck knows what he actually meant by that. There was a talk on him from an anarchist perspective at BASTARD about... 5 years ago? And they sometimes publish short essays based on the talks, so that might be out there somewhere if you're interested

Me: "There's a Buddhist temple here."
OpenStreetMap: "Is it Catholic, or Protestant?"

It isn't a straw man if it's your argument. E.g., why the focus on anti-nazi social media, and not gab, which certainly wins on the "dehumanizing and extreme rhetoric" front? The battles we choose reflect our desires, and if your battles don't focus on addressing power dynamics, then they are bound to reinforce them.

I'm sorry, but you've made this claim in the past, and never answered my question: do you seriously not see the difference between governments taking actions targeting dissidents and minorities, and random people on social media saying things you don't like?

As for SSH, it was just an example of an encrypted connection. There are technically some sites that provide SSH browsing functionality, but mostly as a neat trick. I do use SSH over Tor a lot, but almost always via Onion Services, for NAT punching and a secure DNS alternative on my personal machines, which means it's already e2e encrypted anyway.
@switchingsocial @torproject

To be more clear, I'm not saying that there's nothing an exit node can learn about you, I'm saying there's nothing an exit node can learn about you that an adversary sitting just outside your VPN can't learn. VPNs were more useful when *actively* malicious exits were a problem, since VPN providers were historically less likely to inject malware into an unencrypted connection. On the guard side, they only provide more stable points for fingerprinting attacks.
@switchingsocial @torproject

Tor is significantly faster than it used to be. As long as you're okay with an extra ~0.1 seconds of latency, and aren't downloading huge files, it's barely noticeable (other than captchas). Also, you shouldn't use VPNs with Tor, since they violate some of the circuit path construction assumptions, create a single point of failure for traffic fingerprinting, and don't really add any security if your connection is encrypted to the destination (TLS, SSH, etc.).
@switchingsocial @torproject

You should not install addons if using Tor Browser, as they make your fingerprint unique. This is especially true of Privacy Badger, which is trained on your browsing. Both uBlock Origin and Privacy Badger are excellent addons for Firefox, but their techniques are mutually exclusive with how Tor Browser works -- they block trackers, while TBB allows them, but makes you identical to other TBB users (which you won't be if you block them).

There are ways to represent public transit on OSM, but it's extremely poorly tagged and often out of date, because the strict copyright standards OSM has means you have to go to every possible stop and record everything about it by hand. The best open source public transit app right now is transportr, which uses Navitia, who pull from publicly available feeds. But that puts Navitia in about the same spot as Google, just not an ad company and fewer cities.

I could be wrong, but as someone who (many years ago) followed GIMP dev discussions closely, my guess is none of the actual devs will mind. There have been scam forks in the past that were nothing but renames people sold for money, and the devs were like "that's fine, as long as it's not malware."

@szbalint your point was that mastalab was somehow acting in bad faith by using a user agent that let their users access the content they wanted, because it circumvented server-side blocks. I agree that the creators have made some disappointing decisions lately, but acting like spoofing a user agent is some nefarious ploy is a disingenuous description of a fairly standard practice.

Tor Browser and Firefox with anti-fingerprinting enabled spoof their user agent to reduce the ability of the server to run fingerprinting code on said useragent (e.g., they identify the OS as Windows, and decrease the version to the last ESR). The user doesn't opt in, and many serverers try to identify the user agent anyway using other avenues (e.g., TCP stack config). Some sites, like the NYT, will disable the site if they detect this behavior, because ads.

anarcho pol, griping some more 

@szbalint By that reasoning, Tor Browser, and even Firefox with anti-fingerprinting mode enabled, are also "acting in bad faith".

The idea of a "radical software license" is self-contradictory. Adding clauses to a standard license to make sure only people you like use it is implicitly threatening to use the legal system, and all that comes with that, against people you don't like. Radicals use FOSS licenses to defend themselves from the enforcement of intellectual property, not to gleefully reinforce those norms.

It's also just a dumb idea.

what do these custom license plates mean??? 

Maybe the real skull and crossbones was inside us all along?

I've typically experienced the opposite, where pro-nuclear takes assume that anti-nuclear arguments haven't developed at all since the 80s, and spend all their time taking down strawmen about safety, instead of the more common and more nuanced takes you see today about the way nuclear power requires centralized and authority-based decision making, which has ramifications for hundreds of generations.

Oh for sure, this problem is infinitely more tractable than it used to be now that basically all publications have some form of structured data. My point was just that, at least when I'm searching for existing research on a subject I'm broaching for the first time, I rely on searching the unstructured portions to familiarize myself with the body of existing research, and that's still a hard problem.

Show more

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!