Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)LM
Posts
0
Comments
420
Joined
7 mo. ago

  • Is that not the purpose of their ATM networks? Though I never use them, I read some offer deposits that way.

    I've always direct deposited or scanned checks. If someone needs to send me cash, it's always through some service like Zelle, ACH, or online bill pay.

    I don't like to carry cash. Cards, digital wallets, & ACH meet all my needs. I can see how that's a PITA for those who do, though.

  • My state literally made pornhub illegal today

    They did not. Words mean things. Answered here. Cite the law: you can't.

    please stop doing apologia and/or propaganda

    Right back at you: twisting the word illegal. I disapprove of the dumb online ID regulations, too: still not illegal. US isn't throwing pornographers & erotica writers in jail.

    China has always banned porn

    You said it. Not banned in USA.

    You’re welcome to sleepwalk into authoritarianism

    Chinese government is already there.

    US still has a long way to "catch up". They're not

    The Chinese government doesn't care about individual rights & never has: it's baked into the formula. They always put tankie ideology first, the individual later, sometimes far later.

  • overdraft fee

    Banks & brokers without those are common, especially online ones. I've switched to online ones & never had to think about them.

    • They block overdrafts without charging a fee.
    • Deposited cash often earns high interest rates.
    • Large ATM networks or ATM fee refunds.
    • Well documented policies.

    They beat the credit union I had in every way, especially in the documentation (an unusual pain point with my credit union). Some guides

    Financial planning/advising services (perhaps through work) may offer good guidance, too.

  • Fundamental principles that define & operate a government aren't supposed to change frequently or easily. Neither are fundamental restrictions on the authority of government (ie, fundamental rights).

    It makes sense to me that those fundamental freedoms are written somewhere & that judicial decisions would frequently cite them & related case law especially in claims that legislation violates them.

    It also makes sense to me that changing those fundamental rights requires something more substantial (to indicate overwhelming consent of the people) than merely legislating them away. Otherwise, a congress with a simple majority of Trumpy republicans could simply legislate away essential freedoms as they pleased.

    While the US has problems, merely having a constitution (1) the courts meaningfully refer to (2) that demands special effort to amend isn't clearly a problem. Do you have a better solution for ensuring some freedoms aren't recklessly written away?

  • As I was suggesting with

    If you think it’s so easy, then go ahead, try it, and tell us how that went.

    the barriers to change it (process, legal requirements) aren't something to easily dismiss (are you aware of the process & requirements?) especially with today's political obstructionism. It requires approval by supermajorities (²⁄₃) of both houses & ratification by ³⁄₄ of the states.

  • From article

    Do you remember when a police officer in Massachusetts arrested Harvard Professor Henry Louis Gates as he was trying to get into his own home? That got huge national attention. And then President Obama called a “beer summit” and brought them both to the White House to talk.

    That was diplomacy in a sense, but it was also democracy policy.

    Wasn't that mostly superficial, performative, photo-op theater? Shouldn't democracy policy be more substantive?

    I think an effective democracy policy needs to revitalize community & public service programs to promote social engagement, understanding, & support.

  • I own you!
    take ownership & full access of all resources
    threat actor exploits a vulnerable application that is (1) running as you to (2) access resources it doesn't need: they commandeer your system

    how did that happen?

    🤔