China unveils power of thorium reactor for world’s largest cargo ship
China unveils power of thorium reactor for world’s largest cargo ship
Technological breakthrough could revolutionise commercial shipping, naval engineering and deep sea operations if rolled out at scale.Stephen Chen (South China Morning Post)
A note to politicians hoping to emulate Mamdani’s social media strategy: without the right policies, it’s pointless
A note to politicians hoping to emulate Mamdani’s social media strategy: without the right policies, it’s pointless
Forget the medium and focus on the New York City mayor-elect’s message – centrists can’t compete with rent freezes, free buses and support for Palestine, says writer Rohan SathyamoorthyRohan Sathyamoorthy (The Guardian)
Chinese EV maker Xpeng to launch robotaxis, humanoid robots with self-developed AI chips
Chinese EV maker Xpeng to launch robotaxis, humanoid robots with self-developed AI chips
Chinese electric car company Xpeng is following in Tesla's footsteps by moving into robotaxis and humanoid robots.Evelyn Cheng (CNBC)
Oakland City Council Passes Resolution in Support of Polluters Pay Climate Superfund | Oakland is latest in wave of support from California Cities, Youth for Climate Superfund
Oakland City Council Passes Resolution in Support of Polluters Pay Climate Superfund | Food & Water Watch
Oakland is latest in wave of support from California Cities, Youth for Climate SuperfundMadeline Bove (Food & Water Watch)
Meta is earning a fortune on a deluge of fraudulent ads, documents show
Router as tiny server?
Go with me here. Routers are routers, and servers are servers. Some people mix and match things, but generally, ideally, this is how it goes. And I agree.
But the router I just set up, the Google WiFi, has 4gb storage, 512mb of ram, a quad core CPU at 800mhz, is easy to flash, and only costs $10-15 on eBay all day long.
If you used it as only a little computer, no routing.. Then..
If I wanted to say... Set up a tailscale node at my family's house. Why spend $45-80, or even $130(!) on a raspberry pi with an Ethernet port, when the Google WiFi works just as well if not better for that job?
Maybe a tiny matrix server? Tiny web hosting?
Or, for a less ideal solution, but still reasonable. What if I wanted to set up a remote backup node for my main server? If my needs were small enough, the Google WiFi would be much more economical, although you'd need to add a USB hub to break out the USB ports. And there would be limitations obviously.
Or getting really crazy, you could potentially squeeze one or two bigger services onto a router, just to see if it's possible.. Minecraft server?
My question is. What is the best device for this? The Google WiFi is dirt cheap at $10-15, I'm about to pull the trigger on a second one just to play with. But I wanted to see if you guys had any other suggestions?
I tried searching the toh for similar devices, but even restricting it down every way I can think of, I've still got over a hundred devices to look at.
Basically, I think older router hardware is an overlooked, cheaper alternative, to raspberry pis, for some scenarios.
Neither the Google WiFi nor an RPI make a good nas server, but either would certainly work. Some routers even have m.2 or USB connectors specifically for that reason.
For a simple web server, there's even an nginx package for OpenWRT, so you have reverse proxying and basic web hosting on that Google puck with just a couple clicks.
Another interesting possibility is putting a tftp server on your router, and using it as a pxe server.
Plenty of options, if you don't mind the performance.
Former Speaker Nancy Pelosi will not seek reelection
Klimaexperte Höhne: "Wir sind nicht machtlos"
Klimaexperte Höhne: "Wir sind nicht machtlos"
Die Erde steuert auf eine Erwärmung von bis zu 2,8 Grad gegenüber dem vorindustriellen Niveau zu. Der Klimaexperte Niklas Höhne sagt: Die Folgen wären unbeherrschbar - aber es sei noch nicht zu spät.www.inforadio.de
How Mamdani built an ‘unstoppable force’ that won over New York
How Mamdani built an ‘unstoppable force’ that won over New York
The mayor-elect built the greatest field operation by any political campaign in the city’s history – by getting New Yorkers to talk to eachother. Can Democrats learn from his success?Ed Pilkington (The Guardian)
How could Tropical Forest Forever fund proposed at Cop30 tackle climate change
Scheme aims to disrupt deforestation by raising $125bn, investing it in bonds, with returns used to reward tropical forest nations for good behaviour
RRF Caserta. 06 11 25 . Cronache Africane. Crisi in Sudan, Camerun. Mali , Congo e Costa d'Avorio
The Internet is Dying. We Can Still Stop It
The Internet faces an existential crisis as nearly 50% of all traffic is now non-human, with AI-generated content and bots threatening to overwhelm authentic human interaction[^1]. According to recent studies, this includes automated programs responsible for 49.6% of web traffic in 2023, a trend accelerated by AI models scraping content[^1].The problems are stark:
- Search engines flooded with AI-generated content optimized for algorithms rather than humans
- Social media platforms filled with AI "slop" and automated responses
- Genuine human content being drowned out by machine-generated noise
- Erosion of trusted information sources and shared truthHowever, concrete solutions exist:
- Technical Defenses:
- Open-source spam filtering tools like mosparo for protecting website forms
- AI scraper blocking through systems like Anubis
- Content authenticity verification via the CAI SDK[^1]
- Community Building:
- Supporting decentralized social networks (Mastodon, Lemmy)
- Using open-source forum platforms that emphasize human moderation
- Participating in curated communities with active fact-checking[^1]
- Individual Actions:
- Using privacy-focused browsers and search engines
- Supporting trusted news sources and independent creators
- Being conscious of data sharing and digital footprint[^1]"While exposure to AI-generated misinformation does make people more worried about the quality of information available online, it can also increase the value they attach to outlets with reputations for credibility," notes a 2025 study by Campante[^1].
[^1]: It's FOSS - The Internet is Dying. We Can Still Stop It
The Internet is Dying. We Can Still Stop It
Almost 50% of all internet traffic are non-human already. Unchecked, it could lead to a zombie internet.Theena Kumaragurunathan (It's FOSS News)
BrikoX doesn't like this.
JavaScript is the primary fingerprinting tool used inside the browsers.
Mastodon 4.5 is out now
Mastodon 4.5
Quote posts, the end of missing replies, new tools for admins and better emojis. All of these and more, in our latest release.Mastodon Blog
Nuovo articolo: Eurovision 2026, c’è la prima artista ufficiale: Antigoni in gara per Cipro
Eurovision 2026, c'è la prima artista ufficiale: Antigoni in gara per Cipro
Eurovision 2026, c'è la prima artista ufficiale: Antigoni in gara per Cipro. La cantante di origine britannica ha una popolarità televisiva nel Regno UnitoEmanuele Lombardini (Eurofestival News)
Feddit Un'istanza italiana Lemmy reshared this.
US businesses object to EPA bid to kill carbon reporting
US businesses object to EPA bid to kill carbon reporting - E&E News by POLITICO
A cross section of manufacturers and environmentalists raised objections to the agency's plan to repeal its greenhouse gas reporting rule.Jean Chemnick (E&E News by POLITICO)
reshared this
The Internet is Dying. We Can Still Stop It
The Internet is Dying. We Can Still Stop It
Almost 50% of all internet traffic are non-human already. Unchecked, it could lead to a zombie internet.Theena Kumaragurunathan (It's FOSS News)
adhocfungus likes this.
Tech Trivia
adhocfungus likes this.
The Internet is Dying. We Can Still Stop It
The Internet faces an existential crisis as nearly 50% of all traffic is now non-human, with AI-generated content and bots threatening to overwhelm authentic human interaction1. According to recent studies, this includes automated programs responsible for 49.6% of web traffic in 2023, a trend accelerated by AI models scraping content1.
The problems are stark:
- Search engines flooded with AI-generated content optimized for algorithms rather than humans
- Social media platforms filled with AI "slop" and automated responses
- Genuine human content being drowned out by machine-generated noise
- Erosion of trusted information sources and shared truth
However, concrete solutions exist:
- Technical Defenses:
- Open-source spam filtering tools like mosparo for protecting website forms
- AI scraper blocking through systems like Anubis
- Content authenticity verification via the CAI SDK1
- Community Building:
- Supporting decentralized social networks (Mastodon, Lemmy)
- Using open-source forum platforms that emphasize human moderation
- Participating in curated communities with active fact-checking1
- Individual Actions:
- Using privacy-focused browsers and search engines
- Supporting trusted news sources and independent creators
- Being conscious of data sharing and digital footprint1
"While exposure to AI-generated misinformation does make people more worried about the quality of information available online, it can also increase the value they attach to outlets with reputations for credibility," notes a 2025 study by Campante1.
The Internet is Dying. We Can Still Stop It
Almost 50% of all internet traffic are non-human already. Unchecked, it could lead to a zombie internet.Theena Kumaragurunathan (It's FOSS News)
like this
The Great Firewall: Massive data leak reveals the inner workings of China's censorship regime
cross-posted from: lemmy.sdf.org/post/45192281
Archived[...]
In a historic breach of China’s censorship infrastructure, internal data were leaked from Chinese infrastructure firms associated with the Great Firewall (GFW) in September this year. Researchers now estimate that the data has a volume of approximately 600 GB.
The material includes more than 100,000 documents, internal source code, work logs, configuration files, emails, technical manuals, and operational runbooks. The number of files in the dump is reported to be in the thousands, though exact totals vary by source.
[...]
An unexpected but critical component of the breach is the metadata embedded within documents and logs. Authorship tags, file paths, and computer hostnames have linked hundreds of documents to individual users, systems, and organizations. These human fingerprints offer unprecedented visibility into the organizational structure behind the GFW’s operation. Engineers, data analysts, lab researchers, and regional technicians are all traceable by name or system alias. Many entries refer to known ISPs, national labs, or university-affiliated nodes, suggesting that the enforcement apparatus spans a wide constellation of public-private partnerships, military-academic collaborations, and centralized policy deployment.
Together, these findings constitute a unique technical cross-section of the Chinese censorship-industrial complex, revealing not just what is filtered or how, but who enforces it, who maintains the infrastructure, and how decisions flow through the layered topology of digital control.
[...]
The current report represents only the first installment in a three-part investigative series into the unprecedented breach of China’s censorship apparatus. While this Part 1 has centered on exposing the dataset’s contents and evaluating its technical, organizational, and strategic significance, it is only the beginning. The sheer scale and complexity of the leak, over 500GB of internal GFW infrastructure data, demands a methodical, layered approach to fully grasp its implications.
The next two parts in this series will delve even deeper, uncovering the architecture of China’s censorship regime and examining the wider consequences for global digital governance.
Part 2 of the series will look into the architecture and will offer a forensic reconstruction of how the Great Firewall actually works at the technical level, mapping the core design of the censorship stack. This includes how packets are intercepted, filtered, redirected, or dropped; how apps like Psiphon and V2Ray are detected at the protocol level; and how traffic shaping is deployed based on geography, ISP, or session context.
Part 3 will the geopolitics and the fallout will address the broader implications. This breach does more than just reveal technical controls, it changes the strategic calculus of censorship resistance. We will assess how the exposure reshapes China’s ability to sustain its domestic information control and international cyber operations, and how it informs countermeasures by VPN developers, privacy advocates, and democratic governments. Ethical and legal questions will also be raised: what does responsible engagement with such data look like?
[...]
With this series, we aim to present not just the most complete picture yet of the GFW, but a roadmap for pushing back against the machinery of state censorship.
Inside the Great Firewall Part 1: The Dump - DomainTools Investigations | DTI
Analysis of the 500GB+ Great Firewall data breach revealing China’s state censorship network, VPN evasion tactics, and the operators behind it.DomainTools Investigations | DTI
Is Enerkem's Waste Gasification technology a Failure or a promising Climate Solution?
Is Enerkem's Waste Gasification technology a Failure or a promising Climate Solution?
Repsol wants to build a waste gasification plant to make circular and biogenic Methanol in Spain. The Ecoplanta project will use a technology that previously failed to deliver on its promises in Canada.Hanno Böck (industrydecarbonization.com)
Appeals Court Upholds Shaken Baby Conviction Despite Medical Examiner Recanting Testimony
Appeals Court Upholds Shaken Baby Conviction Despite Medical Examiner Recanting Testimony
Dissenting from the court’s majority, one judge sounded the alarm about ignoring recanted forensic testimony, saying the medical examiner’s reversal “calls into doubt the foundation of the trial.”lisa.larson-walker@propublica.org (ProPublica)
The Great Firewall: Massive data leak reveals the inner workings of China's censorship regime
cross-posted from: lemmy.sdf.org/post/45192281
Archived[...]
In a historic breach of China’s censorship infrastructure, internal data were leaked from Chinese infrastructure firms associated with the Great Firewall (GFW) in September this year. Researchers now estimate that the data has a volume of approximately 600 GB.
The material includes more than 100,000 documents, internal source code, work logs, configuration files, emails, technical manuals, and operational runbooks. The number of files in the dump is reported to be in the thousands, though exact totals vary by source.
[...]
An unexpected but critical component of the breach is the metadata embedded within documents and logs. Authorship tags, file paths, and computer hostnames have linked hundreds of documents to individual users, systems, and organizations. These human fingerprints offer unprecedented visibility into the organizational structure behind the GFW’s operation. Engineers, data analysts, lab researchers, and regional technicians are all traceable by name or system alias. Many entries refer to known ISPs, national labs, or university-affiliated nodes, suggesting that the enforcement apparatus spans a wide constellation of public-private partnerships, military-academic collaborations, and centralized policy deployment.
Together, these findings constitute a unique technical cross-section of the Chinese censorship-industrial complex, revealing not just what is filtered or how, but who enforces it, who maintains the infrastructure, and how decisions flow through the layered topology of digital control.
[...]
The current report represents only the first installment in a three-part investigative series into the unprecedented breach of China’s censorship apparatus. While this Part 1 has centered on exposing the dataset’s contents and evaluating its technical, organizational, and strategic significance, it is only the beginning. The sheer scale and complexity of the leak, over 500GB of internal GFW infrastructure data, demands a methodical, layered approach to fully grasp its implications.
The next two parts in this series will delve even deeper, uncovering the architecture of China’s censorship regime and examining the wider consequences for global digital governance.
Part 2 of the series will look into the architecture and will offer a forensic reconstruction of how the Great Firewall actually works at the technical level, mapping the core design of the censorship stack. This includes how packets are intercepted, filtered, redirected, or dropped; how apps like Psiphon and V2Ray are detected at the protocol level; and how traffic shaping is deployed based on geography, ISP, or session context.
Part 3 will the geopolitics and the fallout will address the broader implications. This breach does more than just reveal technical controls, it changes the strategic calculus of censorship resistance. We will assess how the exposure reshapes China’s ability to sustain its domestic information control and international cyber operations, and how it informs countermeasures by VPN developers, privacy advocates, and democratic governments. Ethical and legal questions will also be raised: what does responsible engagement with such data look like?
[...]
With this series, we aim to present not just the most complete picture yet of the GFW, but a roadmap for pushing back against the machinery of state censorship.
Inside the Great Firewall Part 1: The Dump - DomainTools Investigations | DTI
Analysis of the 500GB+ Great Firewall data breach revealing China’s state censorship network, VPN evasion tactics, and the operators behind it.DomainTools Investigations | DTI
copymyjalopy likes this.
Battleground Maine Rep. Jared Golden will not seek reelection
Battleground Rep. Jared Golden will not seek reelection - E&E News by POLITICO
The Maine Democrat’s unexpected retirement opens up a House seat in a district that President Donald Trump carried.Aaron Pellish, Andrew Howard (E&E News by POLITICO)
Petition e6679 - Political Honesty
There is a petition, e6679, on the official ourcommons.ca website for the government of Canada, which address is misinformation in Canadian politicians.
If you ask me, this is a very important petition, because I believe that the threat to Canadian sovereignty and democracy is indeed misinformation that is being spread by Canadian politicians. Sure, misinformation from social media is annoying, and when it comes from the traditional media it's disturbing, but when it comes from Federal politicians, it's downright dangerous.
It has almost 40,000 signatures. Please sign it, there's only three weeks left. The more signatures, the more weight it will have when it's read in parliament
We need to send a message to Parliament and let them know that we're concerned and frustrated with misinformation.
I should note that the website has had lots of problems recently. Please be patient and try until you succeed. You need to receive a validation email, click on that, and then you get a confirmation email. Until you get that second email, your signature has not been counted.
Wikipedia co-founder joins editing conflict over the Gaza genocide page
Wikipedia co-founder joins editing conflict over the Gaza genocide page
Wikipedia co-founder Jimmy Wales has inserted himself into discussions over the site’s “Gaza genocide” page, saying that it has issues with neutrality and “requires immediate correction.”Emma Roth (The Verge)
So, the marketing aspect is the thing that hung me up.
You gotta put yourself out there soooooo much on all the forums all the socials all the goon subs.
Thinking it through makes me not want to.
I just want a money cheat code.
Neue Vereinsmeisterschaftstabelle nach Nachtgolfen
Mit dem letzten Turnier hat sich auch die Tabelle zur Vereinsmeisterschaft leicht verändert.
Damit ihr mal seht, wie man Nachtgolf spielt, hier ein kleines Video dazu.
tube.tchncs.de/videos/embed/5u…
Und jetzt die Tabelle:
2025 Nachtgolfen in Elster - Bahn 10 # Golf #Crossgolf #Nachtgolf - tchncs
Hier noch ein kleines Video, wie Nachtgolfen wirklich ist vom 01.11.2025tube.tchncs.de
Gov. JB Pritzker says an Indiana remap might force Illinois to act as he celebrates Democratic wins Tuesday
The Democratic governor, a vocal Trump critic who is pursuing a third term next year as well as a potential 2028 White House bid, also indicated that any effort to redraw Illinois’ congressional districts to counter gerrymandering pushed by the president in GOP-led states may depend on whether Indiana takes action on redistricting.
Gov. JB Pritzker says an Indiana remap might force Illinois to act as he celebrates Democratic wins Tuesday
The Democratic governor, a vocal Trump critic who is pursuing a third term next year as well as a potential 2028 White House bid, also indicated that any effort to redraw Illinois’ congressional districts to counter gerrymandering pushed by the president in GOP-led states may depend on whether Indiana takes action on redistricting.
AI gets 45% of news wrong — but readers still trust it
no plans to fix it, though
- video
pivottoai.libsyn.com/20251105-… - podcast
time: 4 min 58 sec
AI gets 45% of news wrong — but readers still trust it
The BBC and the European Broadcasting Union have produced a large study of how well AI chatbots handle summarising the news. In short: badly. [BBC; EBU] The researchers asked ChatGPT, Copilot, Gemi…Pivot to AI
xAI used employee biometric data to train Elon Musk’s AI girlfriend
xAI used employee biometric data to train Elon Musk’s AI girlfriend
xAI employees were compelled to submit their biometric data to train Grok’s AI companion Ani and other avatars.Andrew J. Hawkins (The Verge)
xAI used employee biometric data to train Elon Musk’s AI girlfriend
xAI used employee biometric data to train Elon Musk’s AI girlfriend
xAI employees were compelled to submit their biometric data to train Grok’s AI companion Ani and other avatars.Andrew J. Hawkins (The Verge)
xAI used employee biometric data to train Elon Musk’s AI girlfriend
xAI used employee biometric data to train Elon Musk’s AI girlfriend
xAI employees were compelled to submit their biometric data to train Grok’s AI companion Ani and other avatars.Andrew J. Hawkins (The Verge)
Something to Think About this month
As well as everything else, each month I offer you something to think about and get the brain working. This month …
Do illiterate people get the full effect of alphabet soup?
#blog #logic #thoughts #zenmischief
rabbia femcellica della mattina sorprendente in cui la rogna universale si riabbatte sul mio culo (gli innamorati in giro mi fanno stare male)
Lo so che ormai non solo sembro, ma sono, un disco rotto, ma a questo punto I swear to god, come si dice in questi casi… Ormai mi pare sempre più di vivere in un mondo costruito apposta per distruggermi a tutti i costi; mi sembra di essere all’interno di una di quelle visual novel […]
EU scientists record 99.5% sunlight absorption leap for solar towers
EU scientists record 99.5% sunlight absorption leap for solar towers
EHU researchers have demonstrated new nanomaterials for solar towers capable of 99.5% light absorption, boosting renewable energy potential.Atharva Gosavi (Interesting Engineering)
Mihon, an aggregated manga reading app, issues a troubling warning they might shut down due to imitators that uses old Tachiyomi name
Citing Kotatsu's recent shut down, two of Mihon's devs said that misuse of Mihon’s name and branding by a group may endanger the project.
I copied the text if you don't want to go the link. It's a bit long so I spoilered it.
::: spoiler spoiler
Hello everyone,With Kotatsu's recent shutdown and due to some ongoing issues over the years, I believe Mihon is also under threat. If you care about the project's future, please take a moment to read this message.
Who is behind the threat, and how?
A group going by iiTachiyomi and recently Miyomi has built a massive following by impersonating Tachiyomi (Mihon's predecessor) across various platform. They only rebranded to iiTachiyomi after years of request and only on platforms where they had a low following.Their blatant impersonation was one of the key reason behind the legal threat Tachiyomi received, which ultimately led to its shutdown. When we announced Mihon and exposed their behavior, iiTachiyomi promised to change their ways and not impersonate Mihon.
However, just months after Mihon launched, they resumed the same behavior by:
- Creating a new brand "Miyomi: Tachiyomi and Mihon community" to capitalize on Mihon's name
- Posting Mihon release notes and announcements without attribution
- Sharing updates of third-party extension repos without attribution
- Failing to clarify they are not the developers behind Mihon or those extensions
- Selling fake Mihon branded merchandise
Why does this threaten Mihon?
When P.CoK, the anti-piracy division of Kakao requested the removal of extensions, the Tachiyomi team complied. iiTachiyomi, however continued distributing them in a misleading way, causing confusion that escalated into legal pressure, which resulted in Tachiyomi shutting down.Now, they are doing the same thing with Mihon. Their misrepresentation and misuse of Mihon’s name, branding and work puts the project at risk, despite Mihon having already corrected the mistakes Tachiyomi made. It could also cause problems for other apps they promote.
What to do from now on
iiTachiyomi claims to serve the community, but their actions prove otherwise. To protect Mihon:
- Report iiTachiyomi or Miyomi pages that mislead users
- Correct people who confuse Mihon with iiTachiyomi or Miyomi
- Don’t share or support unofficial Mihon merchandise
- Spread the word: Mihon has no connection to themSigned by:
- Antsy, Mihon Developer
- jobobby04, TachiyomiSY Developer
:::
This is after the action that Kotatsu manga app shutting down due to Kakao's continued war on manga piracy, and Google's future policy of limiting what Android users can install on their own devices.
From Kotatsu's github readme:
::: spoiler screenshot
:::
ImportantIn light of recent challenges — including threating actions from Kakao Entertainment Corp and upcoming Google’s new sideloading policy — we’ve made the difficult decision to shut down Kotatsu and end its support. We’re deeply grateful to everyone who contributed and to the amazing community that grew around this project.
One year ago, Tachiyomi shut down due to Kakao's efforts, as per this post here.
Mihon could be under threat
Misuse of Mihon’s name and branding by a group may endanger the projectMihon
like this
It works fine with whatever. Western comics, novels, textbooks, whatever you want. Komga supports epub/pdf/cbz/zip/cbr etc.
It only becomes a pain if you want to automatically scrape metadata. This isn’t directly supported in komga but there’s another project, komf, that directly interfaces with the komga api and will scrape metadata providers to populate. I have multiple libraries because as far as I know this really only gracefully works with manga. It can sometimes work okay with western comics via scraping gocomics but it’s a crapshoot and if your library is large it’s definitely not a good idea to let it cook. It has no support for fiction/nonfiction stuff like goodreads or whatever so I have those in yet another library. I don’t know of a metadata provider for textbooks (Amazon? Libgen? Wikipedia?) so yet another.
But manga works great. And metadata aside all my books work and I can read them from whatever device, ereader, phone, laptop, etc. komga itself has a built in reader so if it has a browser I’m good but mihon or whatever tachiyomi fork I can use (like Tachimanga for iOS devices, though that has iap to unlock stuff like tracking and no ads (though adblocking works), gross) is preferable
Richard Thompson - Still (2015)
Figura centrale per la nascita del folk-rock inglese e con alle spalle una discografia ormai corposissima, Richard Thompson, prosegue con entusiasmo e convinzione il proprio percorso artistico, animato da una curiosità febbrile nel ricercare sonorità nuove, dando alle stampe “Still”, disco nato dalla collaborazione artistica con Jeff Tweedy, il quale ne ha curato la produzione... Leggi e ascolta...
The Big Short Guy Just Bet $1 Billion That the AI Bubble Pops
The Big Short Guy Just Bet $1 Billion That the AI Bubble Pops
Michael Burry, who shorted the housing market in 2008, has bet over $1 billion that the shares of AI companies Nvidia and Palantir will fall.Victor Tangermann (Futurism)
adhocfungus likes this.
US-Based Partner Wanted
Hi.
I’m a Mobile App developer (Android, iOS, React Native, Flutter, AWS) with 5+ years of experience shipping real products. I’m not looking for clients — I’m looking for a US-based partner to team up and earn together.
You must be older than 25 and younger than 40 and need a pc.
The idea is simple:
- You: land freelance or contract work on Upwork, LinkedIn, or your network. Or you can share Upwork, Linkedin to me so I can land freelance or contract.
- I: deliver high-quality code, on time, with clean documentation.
- We split by detailed discussion after platform fees.
What I bring:
- Full development (frontend, backend, APIs, cloud)
- Daily updates & flexible with US time zones
- Portfolio + GitHub ready to share
What you bring:
- US profile/address for platforms
- Client communication & project management
- Ability to win paid gigs
DM me if you’re interested — tell me:
One platform you’ve used to get work
Your rough availability
Looking forward to building something profitable together!
Best,
Granchio, granchio cornuto della battigia, perché dardeggi svelto sopra la sabbia grigia? - Il blog di Jacopo Ranieri
Granchio, granchio cornuto della battigia, perché dardeggi svelto sopra la sabbia grigia? - Il blog di Jacopo Ranieri
Sono molti gli animali che possiedono un significato simbolico frequentemente citato nell’espressione di un concetto umano. Il cane è fedele, la volpe scaltra, l’orso è forte, l’aquila è libera e il granchio… Uhm, cammina di lato.Jacopo (Il blog di Jacopo Ranieri)
Authorities detain & deport 2 Jews after they sought to support the olive harvest in a Palestinian village
“The two participants who were detained were volunteering with Rabbis for Human Rights’ long-standing olive harvest initiative—an act of nonviolent solidarity that supports Palestinian farmers facing settler/military violence and access restrictions to their own lands. They joined the harvest as part of their regular volunteer placements through Achvat,” says Oltersdorf.The charges? “Violating IDF Orders,” according to the Israeli Population and Immigration Authority.
The principles and actions of these […] groups might seem soft compared to the ardent anti-Zionist Jewish groups popping up around the world. They were not arrested engaging in insurgent direct action, did not call for an end to Israel, they simply went to go pick olives.
Yet the targeting of these interfaith groups calling for co-existence in Israel/Palestine shows a troubling trend for International solidarity activists seeking to engage in front line activities in Palestine. While groups like International Solidarity Movement, who bring people of all faiths and backgrounds to Palestine have been consistently targeted by Israel for arrest and deportation, the same has rarely applied to Jewish, faith-based groups. The Jewish supremacy that once protected International Jews with Israeli organizations is slowly fading.
Avi Dabush, CEO of Rabbis for Human Rights says: “We are disappointed and outraged by the expulsion of Jewish women from Israel and the delay of volunteers. This is selective enforcement of the most blatant and dangerous kind. We are only two weeks into the harvest season and we have already been given 9 orders declaring the harvest areas a closed military area prohibiting us from entering, but on the other hand, the violent settlers have not been detained or arrested so far in all the attacks that have been recorded. We operate without violence and according to the law, and it is a shame that the police and the army wasted an entire day turning away people who came to stand by people under attack.”
But with this rise in retaliation from Israel against insurgent Jews within their borders, the narrative that Zionism and Israel has been pushing also begins to crack. When Jews become unsafe and unwelcome in Israel because of the Israeli government itself, the hypocrisy of Israel as a means for Jewish safety becomes further exposed. As Israel seeks to determine what Jews are politically aligned enough to engage in apartheid and Jewish supremacy, the world must take note that Jewish safety is not helped by Israel. Indeed at the two activists can attest, Israel makes the world more dangerous for Jews.
Israel deports 32 activists aiding Palestinian olive farmers amid attacks
Israeli army and settlers have carried out 158 attacks against olive pickers since the start of the current seasonFederica Marsi (Al Jazeera)
like this
blattrules
in reply to silence7 • • •StinkyFingerItchyBum
in reply to blattrules • • •Rolder
in reply to silence7 • • •