Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)ZA
Posts
0
Comments
19
Joined
2 yr. ago

  • If each of the following 70 counterexamples to an Old Earth were to have merely a 10% chance of being valid, then the probability that the Earth is billions of years old is less than one-tenth of 1%. In other words, the Earth must be young with a likelihood of more than 99.9%

    Flawless logic

  • From Wikipedia:

    Due to his adherence to an approach to politics called Realpolitik, which prioritizes pragmatic geopolitical considerations over moral or ideological values, Kissinger has been criticized for turning a blind eye to war crimes committed by American allies during his tenure.[6]

    A number of activists and human rights lawyers have sought to prosecute him for war crimes committed by American allies during his tenure.[8][150] Kissinger has been associated with such controversial policies as the U.S. bombing of Cambodia during the Vietnam War, U.S. involvement in the 1973 Chilean military coup, a "green light" to Argentina's military junta for their Dirty War, and U.S. support for Pakistan during the Bangladesh Liberation War despite a genocide being perpetrated.[255]

    https://en.m.wikipedia.org/wiki/Henry_Kissinger

  • Just wanted to add this link explaining how to use tunnels in a more privacy respecting way

    https://help.nextcloud.com/t/is-cloudflare-tunnel-safe-privacy-focused/150268/2

    Problems with TLS (free option of routing on cloudlfare tunnels)

    interception (or HTTPS interception if applied particularly to that protocol) is the practice of intercepting an encrypted data stream in order to decrypt it, read and possibly manipulate it, and then re-encrypt it and send the data on its way again. This is done by way of a “transparent proxy”: the interception software terminates the incoming TLS connection, inspects the HTTP plaintext, and then creates a new TLS connection to the destination.

  • But how can it trust you’re a person when it just confirms that you’re running an in-modified site. It takes a hash of the site, then make sure your local view of the website matches that hash.

    This disables add blockers, custom css, etc; but I don’t see how this standard would prevent bots…

  • I'd just like to interject for a moment. What you're referring to as Linux, is in fact, GNU/Linux, or as I've recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX. Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called "Linux", and many of its users are not aware that it is basically the GNU system, developed by the GNU Project. There really is a Linux, and these people are using it, but it is just a part of the system they use. Linux is the kernel: the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called "Linux" distributions are really distributions of GNU/Linux.