Salta al contenuto principale



La Verità Scomoda: Dalla Scienza alla Sanità, Tutti Ci Vogliono Malati?


Amici, preparatevi a perdere la pazienza. L'intervista a Robert F. Kennedy Jr. che ho analizzato fa emergere crepe drammatiche nel sistema che ci governa. Non si parla di teoria, ma di incentivi perversi che trasformano la scienza in propaganda e la sanità in un business miliardario.
Il punto non è solo l'immunità dei produttori di vaccini o le ombre su figure come Anthony Fauci; il dramma è che ogni livello del sistema guadagna se restiamo malati. Le carriere degli scienziati sono legate alle aziende, le riviste sono diventate "contenitori di propaganda" e i bonus dei medici dipendono dai profitti.
Non è forse questa la vera pandemia? Quella di un sistema finanziario che, in nome del profitto, mette a rischio la nostra salute? Dobbiamo esercitare il nostro obbligo di cittadinanza: fare le nostre ricerche e resistere al pensiero unico imposto.



[RESOLVED] GDM Issues (Fedora 42)


I've recently been unable to use my computer running Fedora 42 with gnome. It boots up, and GDM starts running, however it shows a flat grey screen with no login option. I can pull up a tty and login as normal (although using gnome-session to start a GUI session from there doesn't work). I have tried to use systemctl to restart GDM from the tty, but that l brings me back to square one.
What can I do from here to resolve this issue?

GPU: Radeon 7800xt, Open Source Drivers
Window System: Wayland.

Questa voce è stata modificata (4 settimane fa)
in reply to Lime66

UPDATE:
Resolved, it was an issue caused by a faulty display port cable. Different issues from this cable had happened recently, I just initially assumed it was a software issue due to the fact that only GDM was affected.
in reply to Lime66

honestly on single user machines I uninstall a display manager. autologin on console, and put a few lines in my zshrc to start my wm automatically


Talk about choosing "a community", not "a server"


It stroke me that saying things like "First, you have to choose a comunity to join the fediverse" might be a better way to ease onboarding nwecommers than "First, you have to choose a server".

Although the latter might be technically more accurate, the former is what people might
* understand better;
* ends up being what they're really doing;
* frighten them less;
* reinforce the "community" contribution aspect;
* lead them to better understand the federated aspect as they realize that communities are not isolated and can talk to eachother.

What do you think?

"Let me know in the comments bellow..." - just kidding!

in reply to Ninguém

Except you don't have to interact with other users on your server, so why label them as "communities". Communities on Lemmy or subreddits are already more deserving of the term "community" because that's where you actually go to interact with other people.

Edit: Typo

Questa voce è stata modificata (4 settimane fa)
in reply to mnemonicmonkeys

Except you have to interact with other users on your server


Says who? I don't know the server of anyone I'm interacting with. I think "gateway" would be a better choice, but that isn't any less confusing.

in reply to Ninguém

Doesnt really matter i think. Lemmy has become very centralized to Lemmy.world. But you have a few more medium sized instances also so its still better than a central site.
Questa voce è stata modificata (4 settimane fa)

in reply to nutbutter

What site is that? Didn't cohost die?
Questa voce è stata modificata (3 settimane fa)
in reply to nutbutter

My brother's name is fedi therefore I'm calling it Fediverse.




think about the children


being bourgueois democrazy

complaining falsely about those evul commies gathering all your data

proceed to gather your data to get big profit from ads

have an important data breach



F-Droid and Google's Developer Registration Decree


Recently Google decided that in the future for an app to be installable on an Android device, the developer of this app needs to be ID'd and registered at Google. They claim this is in order to "to better protect users". However, I think, this is a move to get more control over the Android ecosystem, and the data they can collect with it. If anyone who wants to develop an app for Android devices has to be registered with Google, this puts all the power of who to allow distributing an app to Google.

Furthermore F-Droid shows, that safe app stores can exist without registration, neither of users nor of developers. There is zero malware or spyware on the F-Droid store. What there is on F-Droid is thousands of beautiful, useful and, most importantly, safe apps. And this entire ecosystem is at risk, because Google wants to gain more control over its users and over the Android operating system.




Way past its prime: how did Amazon get so rubbish?





Fucked my computer trying to upgrade processor, please help me unfuck it


Installed a Ryzen 7 5700G processor to a Gigabyte GA-AB350M-HD3 motherboard. Plugged computer back in, hit power button. Computer powered on but no video output. Double-checked cables, then started Googling. Apparently this is commonly a result of an out-of-date BIOS. Got the latest BIOS update on a flash drive with my roommate's assistance, then went to put the old processor (a Ryzen 5 1500X) back in so that I could run the system BIOS and flash the update, at which point I learned that I accidentally bent several of the pins when removing it. Tried to seat the processor out of a sense of wishful thinking, and sure enough, no number of attempts would get the computer to turn on with it inside.

So, in short: I have a new processor my motherboard doesn't recognize, an old processor it does recognize but is now broken, and a BIOS update that would presumably let it recognize the new processor but that I can't install without a working processor. I've read that some Gigabyte motherboards support loading BIOS updates from a flash drive without a processor, but as far as I can tell, the GA-AB350M-HD3 isn't one of them. Not sure what I'm supposed to do here. I could order another Ryzen 5 1500X, but 1) that costs money and 2) I'd have to wait for it to arrive.


in reply to schizoidman

That’s because they are little removed that can’t compete with people that are smarter than them, that know they can still create things that don’t kill and pollute the planet.
in reply to schizoidman

The Trump administration, everyone in it and everyone that supports it are never going to be a net positive or, arguably, ever do anything positive for anyone, anywhere, ever. They are self-proclaimed terrorists, racists, misogynists, pro-war, anti-life, pro-suffering, pro-pedophile.

This is where we are now and we either need to fight it or accept it. I would hope the former.



The instance chooser is filling up nicely


It took a few days for instances to be upgraded and admins to fill in their profiles but it's looking much healthier now!

piefed.social/auth/instance_ch…

Questa voce è stata modificata (4 settimane fa)

reshared this


in reply to silence7

The prosecution’s case against dozens of Stop Cop City protesters collapsed last month when a judge dismissed most of the charges against them


Well that's great news


in reply to ☆ Yσɠƚԋσʂ ☆

Very sad that no leftist parties are anti NATO. Pro NATO is the real pro Trump and 5% GDP for US weapons, deep austerity, and Russophobia suicide, and every disgusting CIA allegiant lie subjugating Europeans, is not ever going to be popular.
in reply to humanspiral

Indeed, with the principled left being systematically eradicated in Europe, the right became the only remaining alternative to mainstream liberals. As people become disillusioned with the system that's visibly failing them, they fall out of the mainstream and move to the right because that's the only game in town.


Rachel Corrie, The American Activist Who Was Crushed By An Israeli Bulldozer While Protesting In Gaza


On March 16, 2003, 23-year-old Rachel Corrie and several others were protesting against the demolition of Palestinian homes in the Gaza Strip city of Rafah. The Israeli government claimed that militants were using the structures to fire on soldiers, but Corrie and her fellow members of the International Solidarity Movement wanted to protect the families who lived in Rafah. When a bulldozer started to approach the home of a family Corrie was staying with, she stepped in front of the machine and began shouting through a bullhorn so it would stop — but the driver continued forward, crushing Corrie to death.

The operators claimed they didn't see Corrie because she was concealed behind a pile of debris. However, others there said Corrie was wearing a neon orange jacket and was clearly visible. One man later recalled, "Her head and upper torso were above the bulldozer's blade, and the bulldozer operator and co-operator could clearly see her. Despite this, the operator continued forward, which caused her to fall back, and out of view of the driver… she tried to scoot back, but she was quickly pulled underneath the bulldozer." Israeli officials ultimately ruled Corrie's death an accident.

Go inside the untimely killing of an American peace activist by Israel: allthatsinteresting.com/rachel…



in reply to HotWheelsVroom

What's the name of this meme template? First time seeing it and it's awesome.
Questa voce è stata modificata (4 settimane fa)






Morrison, CO.


I seem to have somewhat of a knack lately, for positioning astrological bodies at the top center of cool pictures.

Thank you for seeing my work!







ProtonVPN or Mullvad? Why would you choose one over another?


I'm thinking about paying for a VPN, I currently don't use one.

I'd like to use Mullvad but they don't seem to have regional prices, while Proton does.

I wonder if Proton is still a reliable option, Proton is 60% cheaper in my country, probably because regional pricing (but I didn't check if it's really the case).

If anyone has any other suggestion I'd like to hear it.

Questa voce è stata modificata (4 settimane fa)
in reply to CodenameDarlen

I like mullvad i use their dns filtering and their socks5 proxies however it does lack port forwarding so it sucks for torrenting.
in reply to CodenameDarlen

Definitely Mullvad, the whole point of VPN is to stay private and Proton does not accept crypto while Mullvad does.

If the VPN has your payment details then any privacy just goes out the window.



Drone victims, terror and death: 30 minutes inside a Gaza hospital | UN News




The Private Conversation


The Private Conversation

The Threat Against the Cornerstone of Democracy and the Individual’s

Right to Choose Who Listens

Introduction

“Chat Control 2.0” is once again on the table, and one can’t help but wonder why our politicians are so eager to outlaw private conversation between citizens.
This is not the first open letter written about this legislative proposal. Many people far more technically competent than I have addressed lawmakers and voiced strong criticism against it, often with detailed and well-reasoned arguments. Yet these arguments have mostly fallen on deaf ears. Since our elected representatives seem unwilling to listen to the experts, I am instead turning to you, the people, the very ones who will be affected. Time is short, but our democratic rights are not yet lost.
We have had democracy for a very short time, as little as a few decades in some parts of Europe, The fact that it is so poorly protected, especially by those who are supposed to be its champions, is deeply tragic. Sitting in democracy’s front hall, they now cast their votes in the name of self-interest rather than in the name of the people. Let me make one thing absolutely clear right from the start: this legislative proposal uses children merely as a costume to conceal its true nature,
to open up Sweden’s and the EU’s citizens to mass surveillance.

Perverse Argumentation

Every objection to the proposal is met with the same response: “We just want to protect the children.”
This line is used to force opponents into a defensive position, where their moral intentions are questioned, instead of engaging them in a proper, mature debate. It is, quite simply, a deceitful form of argument.
Consider this: If someone were to oppose locking all children in isolation without human contact until the age of 18, on the grounds that it would “protect them” from online harm or exploitation, one could respond with:
“So you don’t want to protect the children?”
Most of us would recognize how absurd that is. Just because someone opposes total isolation of children doesn’t mean they wish them harm.

Questionable Motivation and False Pretenses

Let’s take a closer look at two specific paragraphs from the proposal currently on the EU agenda, soon to be voted on.
(2) “Those providers often being the only ones in a position to prevent or combat such abuse.”
It has always been, and will continue to be, parents who are primarily in the position to prevent their children from coming to harm online. The widespread apathy toward digital literacy among parents and the general public, ongoing since the late 1990s, bears much of the blame for why adults today are so detached from what their children do on their devices and on the internet.
Even today, in one of the world’s most digital societies, people still toss around phrases like, “I’m not good with technology,” “I’m technically incompetent,” or “I’m from the wrong generation to understand the internet.” But this isn’t a funny joke. Humanity sent people to the moon in 1969, radar was invented in 1904, and the internet has been publicly available for 30 years. Technology is not new.
Of course, there should be moderation on platforms where children are expected to frequently interact, but to claim that technology companies are the only ones in a position to prevent harm to children online is an admission of impotence. It reveals, quite clearly, the staggering technical ignorance of those who support this proposal.
If these lawmakers truly wanted to protect children from exploitation, and if this proposal wasn’t just a Trojan horse for mass surveillance, then why don’t they instead propose things like:

-Requiring parents to become digitally literate.

-Providing more resources to schools.

-Laws regulating children’s unsupervised use of the internet and smartphones.

-Support services for families and children targeted by grooming or online exploitation.

Or even active police protection for every child.

Why not? Because that would cost money!
The cost of implementing this proposal will be astronomical, but that’s fine, because as a bonus, they’ll gain the ability to monitor the population. That is apparently priceless, unlike a child’s innocence, to which they’ve clearly assigned a monetary value.
Of course, I care deeply about our children and want them to be safe. But I cannot leave my children alone in Sarek National Park and then claim that the only ones who could have prevented them from getting hurt were the park rangers, and therefore, the rangers must have the right to listen in on everyone hiking in the wilderness.

The Return of the Class Society

(12a) “In the light of the more limited risk of their use for the purpose of child sexual abuse and the need to preserve confidential information, including classified information, information covered by professional secrecy and trade secrets, electronic communications services that are not publicly available… should be excluded from the scope of this Regulation…”
First, one must ask: how do the authors of this proposal even know how much CSAM (child sexual abuse material) passes through or within corporate internal communication systems? Moreover, they openly acknowledge here that there is a need to preserve confidentiality between two parties for communication that is not childporn.

But apparently, the individual citizen is not deemed worthy of this right. Companies, like feudal lords above the serfs, are placed above the individual. The proposal even carves out exemptions for what it calls “Bodies of Authority,” hammering home the vision of a return to a class-based society across Europe, where rights are stripped from ordinary citizens and reserved only for the so-called elite.
There’s an even darker implication here. Let’s unpack it logically:
• Lawmakers claim that encrypted communication is used by pedophiles to share child pornography.
• Yet they want scanning to apply only to individual citizens, while they themselves are exempt.
• Meaning: politicians want to retain the ability to freely share images and videos on the very platforms they describe as being “used” (and note they changed the wording from misused to used) for child pornography.

So, the only logical conclusion is that those who wrote, support, or vote for this law must either be pedophiles themselves, or wish to create an environment where such material can flow freely within the political and corporate elite, away from public scrutiny.
Do I seriously believe all supporters of the bill are pedophiles? No. Most are likely just useful idiots serving those who stand to gain power or money from it. But history is filled with examples of immoral people seeking positions of authority precisely because those positions lack oversight, so they can indulge their perverse desires at others’ expense.

Returning to paragraph 12a, its wording “in the light of the more limited risk” essentially says: a certain acceptable amount of child pornography is tolerable, as long as corporate interests and trade secrets remain unharmed.
In fact, if you read the paragraph literally, it implies that even a group like “The Berlin men who touch Boys. Inc.” could legally create a private organization and share child abuse material among themselves without oversight.
Let me repeat this clearly: this law’s only purpose is to lay the groundwork for a new class-based society, one in which the individual is perpetually considered suspicious and therefore must be watched by the elite to maintain order.
We cannot allow our elected officials to elevate themselves into a higher social class, standing above ordinary citizens.

A Tiger Without Teeth

We can ask more questions about this obsessive desire for surveillance. Suppose the law passes and comes into force. Let’s even ignore that only massive corporations will have the resources to implement this fantastical solution, and that it will not immediately expand into direct monitoring of all communication.
Do these technically infantile politicians truly believe that criminals won’t adapt? That they won’t find new ways, like TOR, which already exists? But of course, they can’t touch TOR, because many national security agencies depend on it for their own secret communications and operations.
I would even dare to say that the lawmakers probably don’t understand that it’s entirely possible for motivated and skilled groups to communicate secretly, in plain sight, online, using data that is neccesarily random.
A law like this will be like pouring wine on a goose: a complete waste of money, leaving only an angry goose, and the total decay of democracy, of course.

The Unspoken Consequences

The proposal suggests that one or several technical systems (never explained in detail) will automatically scan all images and videos shared between private individuals, to detect known illegal material, but also to identify new, previously unknown material.
First, this is not technically feasible today, not securely or reliably.
Second, it means that this “AI,” which must be a generative model trained on known illegal material, will by definition be capable of generating new child pornography itself if the model is inverted.
In other words, EU lawmakers want to build a child-porn-generating AI model trained on EU’s combined police databases.
Now imagine you send a picture of your toddler playing in the bath, or smiling on a changing table, to their grandparents. A completely normal, innocent family photo.
Would you want an unknown third party to have access to that image? Or for it to be absorbed into a generative AI that could then produce child pornography based on it?
The supposed safety of such a system would rely entirely on the hope that no ill-intentioned individuals ever gain access. But no system is secure.
Remember the Swedish Miljödata Data leak? Now imagine that instead of that data, it was all your private photos from every chat with your family, partner, and friends, open for anyone to search.

Clean Flour in the Wrong Bag

As historian Wilhelm Agrell once said:
“Clean flour in the wrong bag; even the most innocent are caught in the machinery of a surveillance society, and this is nothing new.”
He tells the story of April 29, 1978, when a carpenter named Torsten Leander parked his car at a schoolyard in Norrköping, not knowing that the area was reserved for attendees of a cultural association’s annual meeting.
It wasn’t an offense, but a local security agent recorded all license plates, and Leander’s name ended up in secret police files.
He had done nothing wrong, merely been unlucky enough to get caught in one of the Cold War’s invisible surveillance nets.
It is not up to individuals to prove their innocence. Our justice system was never meant to work that way.
Now imagine that same innocent family photo to the grandparents. If the automated scanner falsely flags it as child sexual abuse material, what happens?
Studies show that AI-based image and facial recognition systems vary wildly in accuracy, sometimes over 90%, but in other cases as low as 36%.
I wouldn’t board a plane with a pilot that inconsistent. Yet in this case, you could be wrongly branded a pedophile.
Good luck clearing your name, even if the investigation is dropped.

The Broken Trust

If this law passes, the foundation of a new class society will be cemented. Along with it, public trust will be irreparably broken.
How could we ever again trust our representatives, knowing that they so easily and ruthlessly discard our civil and human rights in the name of self-interest?

Final Words

I sincerely hope that you, the reader, found parts of this text absurd, because the truth is, the law being proposed is absurd.
Under the banner of “think of the children,” it seeks to dismantle the very foundations of a democratic society.
We cannot allow democracy to become a fleeting curiosity, a relic in the history books.
Capacity takes time to build, but motivation can change overnight.
We need only look across the Atlantic to see how quickly democracy can be dismantled. Laws once made with good intentions are now used to suppress free speech and democratic values.
I know it’s tedious to read EU legislation and proposals, but these 209 pages could be what cements European democracy as nothing more than a historical chapter.
The flour in your bag may be clean today, but who knows how it will be judged tomorrow?
Today it’s legal to criticize your government. Tomorrow, it might not be.

, Folke Arbetsson

in reply to folke_arbetsson

-Requiring parents to become digitally literate.
-Providing more resources to schools.
-Laws regulating children’s unsupervised use of the internet and smartphones.
-Support services for families and children targeted by grooming or online exploitation.


I'm not from Europe, but this was my response. Kind of the same energy. lemmy.world/post/34673832/1888…



The Private Conversation


The Private Conversation

The Threat Against the Cornerstone of Democracy and the Individual’s

Right to Choose Who Listens

Introduction

“Chat Control 2.0” is once again on the table, and one can’t help but wonder why our politicians are so eager to outlaw private conversation between citizens.
This is not the first open letter written about this legislative proposal. Many people far more technically competent than I have addressed lawmakers and voiced strong criticism against it, often with detailed and well-reasoned arguments. Yet these arguments have mostly fallen on deaf ears. Since our elected representatives seem unwilling to listen to the experts, I am instead turning to you, the people, the very ones who will be affected. Time is short, but our democratic rights are not yet lost.
We have had democracy for a very short time, as little as a few decades in some parts of Europe, The fact that it is so poorly protected, especially by those who are supposed to be its champions, is deeply tragic. Sitting in democracy’s front hall, they now cast their votes in the name of self-interest rather than in the name of the people. Let me make one thing absolutely clear right from the start: this legislative proposal uses children merely as a costume to conceal its true nature,
to open up Sweden’s and the EU’s citizens to mass surveillance.

Perverse Argumentation

Every objection to the proposal is met with the same response: “We just want to protect the children.”
This line is used to force opponents into a defensive position, where their moral intentions are questioned, instead of engaging them in a proper, mature debate. It is, quite simply, a deceitful form of argument.
Consider this: If someone were to oppose locking all children in isolation without human contact until the age of 18, on the grounds that it would “protect them” from online harm or exploitation, one could respond with:
“So you don’t want to protect the children?”
Most of us would recognize how absurd that is. Just because someone opposes total isolation of children doesn’t mean they wish them harm.

Questionable Motivation and False Pretenses

Let’s take a closer look at two specific paragraphs from the proposal currently on the EU agenda, soon to be voted on.
(2) “Those providers often being the only ones in a position to prevent or combat such abuse.”
It has always been, and will continue to be, parents who are primarily in the position to prevent their children from coming to harm online. The widespread apathy toward digital literacy among parents and the general public, ongoing since the late 1990s, bears much of the blame for why adults today are so detached from what their children do on their devices and on the internet.
Even today, in one of the world’s most digital societies, people still toss around phrases like, “I’m not good with technology,” “I’m technically incompetent,” or “I’m from the wrong generation to understand the internet.” But this isn’t a funny joke. Humanity sent people to the moon in 1969, radar was invented in 1904, and the internet has been publicly available for 30 years. Technology is not new.
Of course, there should be moderation on platforms where children are expected to frequently interact, but to claim that technology companies are the only ones in a position to prevent harm to children online is an admission of impotence. It reveals, quite clearly, the staggering technical ignorance of those who support this proposal.
If these lawmakers truly wanted to protect children from exploitation, and if this proposal wasn’t just a Trojan horse for mass surveillance, then why don’t they instead propose things like:

-Requiring parents to become digitally literate.

-Providing more resources to schools.

-Laws regulating children’s unsupervised use of the internet and smartphones.

-Support services for families and children targeted by grooming or online exploitation.

Or even active police protection for every child.

Why not? Because that would cost money!
The cost of implementing this proposal will be astronomical, but that’s fine, because as a bonus, they’ll gain the ability to monitor the population. That is apparently priceless, unlike a child’s innocence, to which they’ve clearly assigned a monetary value.
Of course, I care deeply about our children and want them to be safe. But I cannot leave my children alone in Sarek National Park and then claim that the only ones who could have prevented them from getting hurt were the park rangers, and therefore, the rangers must have the right to listen in on everyone hiking in the wilderness.

The Return of the Class Society

(12a) “In the light of the more limited risk of their use for the purpose of child sexual abuse and the need to preserve confidential information, including classified information, information covered by professional secrecy and trade secrets, electronic communications services that are not publicly available… should be excluded from the scope of this Regulation…”
First, one must ask: how do the authors of this proposal even know how much CSAM (child sexual abuse material) passes through or within corporate internal communication systems? Moreover, they openly acknowledge here that there is a need to preserve confidentiality between two parties for communication that is not childporn.

But apparently, the individual citizen is not deemed worthy of this right. Companies, like feudal lords above the serfs, are placed above the individual. The proposal even carves out exemptions for what it calls “Bodies of Authority,” hammering home the vision of a return to a class-based society across Europe, where rights are stripped from ordinary citizens and reserved only for the so-called elite.
There’s an even darker implication here. Let’s unpack it logically:
• Lawmakers claim that encrypted communication is used by pedophiles to share child pornography.
• Yet they want scanning to apply only to individual citizens, while they themselves are exempt.
• Meaning: politicians want to retain the ability to freely share images and videos on the very platforms they describe as being “used” (and note they changed the wording from misused to used) for child pornography.

So, the only logical conclusion is that those who wrote, support, or vote for this law must either be pedophiles themselves, or wish to create an environment where such material can flow freely within the political and corporate elite, away from public scrutiny.
Do I seriously believe all supporters of the bill are pedophiles? No. Most are likely just useful idiots serving those who stand to gain power or money from it. But history is filled with examples of immoral people seeking positions of authority precisely because those positions lack oversight, so they can indulge their perverse desires at others’ expense.

Returning to paragraph 12a, its wording “in the light of the more limited risk” essentially says: a certain acceptable amount of child pornography is tolerable, as long as corporate interests and trade secrets remain unharmed.
In fact, if you read the paragraph literally, it implies that even a group like “The Berlin men who touch Boys. Inc.” could legally create a private organization and share child abuse material among themselves without oversight.
Let me repeat this clearly: this law’s only purpose is to lay the groundwork for a new class-based society, one in which the individual is perpetually considered suspicious and therefore must be watched by the elite to maintain order.
We cannot allow our elected officials to elevate themselves into a higher social class, standing above ordinary citizens.

A Tiger Without Teeth

We can ask more questions about this obsessive desire for surveillance. Suppose the law passes and comes into force. Let’s even ignore that only massive corporations will have the resources to implement this fantastical solution, and that it will not immediately expand into direct monitoring of all communication.
Do these technically infantile politicians truly believe that criminals won’t adapt? That they won’t find new ways, like TOR, which already exists? But of course, they can’t touch TOR, because many national security agencies depend on it for their own secret communications and operations.
I would even dare to say that the lawmakers probably don’t understand that it’s entirely possible for motivated and skilled groups to communicate secretly, in plain sight, online, using data that is neccesarily random.
A law like this will be like pouring wine on a goose: a complete waste of money, leaving only an angry goose, and the total decay of democracy, of course.

The Unspoken Consequences

The proposal suggests that one or several technical systems (never explained in detail) will automatically scan all images and videos shared between private individuals, to detect known illegal material, but also to identify new, previously unknown material.
First, this is not technically feasible today, not securely or reliably.
Second, it means that this “AI,” which must be a generative model trained on known illegal material, will by definition be capable of generating new child pornography itself if the model is inverted.
In other words, EU lawmakers want to build a child-porn-generating AI model trained on EU’s combined police databases.
Now imagine you send a picture of your toddler playing in the bath, or smiling on a changing table, to their grandparents. A completely normal, innocent family photo.
Would you want an unknown third party to have access to that image? Or for it to be absorbed into a generative AI that could then produce child pornography based on it?
The supposed safety of such a system would rely entirely on the hope that no ill-intentioned individuals ever gain access. But no system is secure.
Remember the Swedish Miljödata Data leak? Now imagine that instead of that data, it was all your private photos from every chat with your family, partner, and friends, open for anyone to search.

Clean Flour in the Wrong Bag

As historian Wilhelm Agrell once said:
“Clean flour in the wrong bag; even the most innocent are caught in the machinery of a surveillance society, and this is nothing new.”
He tells the story of April 29, 1978, when a carpenter named Torsten Leander parked his car at a schoolyard in Norrköping, not knowing that the area was reserved for attendees of a cultural association’s annual meeting.
It wasn’t an offense, but a local security agent recorded all license plates, and Leander’s name ended up in secret police files.
He had done nothing wrong, merely been unlucky enough to get caught in one of the Cold War’s invisible surveillance nets.
It is not up to individuals to prove their innocence. Our justice system was never meant to work that way.
Now imagine that same innocent family photo to the grandparents. If the automated scanner falsely flags it as child sexual abuse material, what happens?
Studies show that AI-based image and facial recognition systems vary wildly in accuracy, sometimes over 90%, but in other cases as low as 36%.
I wouldn’t board a plane with a pilot that inconsistent. Yet in this case, you could be wrongly branded a pedophile.
Good luck clearing your name, even if the investigation is dropped.

The Broken Trust

If this law passes, the foundation of a new class society will be cemented. Along with it, public trust will be irreparably broken.
How could we ever again trust our representatives, knowing that they so easily and ruthlessly discard our civil and human rights in the name of self-interest?

Final Words

I sincerely hope that you, the reader, found parts of this text absurd, because the truth is, the law being proposed is absurd.
Under the banner of “think of the children,” it seeks to dismantle the very foundations of a democratic society.
We cannot allow democracy to become a fleeting curiosity, a relic in the history books.
Capacity takes time to build, but motivation can change overnight.
We need only look across the Atlantic to see how quickly democracy can be dismantled. Laws once made with good intentions are now used to suppress free speech and democratic values.
I know it’s tedious to read EU legislation and proposals, but these 209 pages could be what cements European democracy as nothing more than a historical chapter.
The flour in your bag may be clean today, but who knows how it will be judged tomorrow?
Today it’s legal to criticize your government. Tomorrow, it might not be.

, Folke Arbetsson




Taliban Reject Trump’s Demands as Russia and China Warn Against US Presence in Afghanistan



in reply to Deceptichum

The people holding the second set of many and little already made plans, and are just biding their time to, ahh, pull the trigger. You can tell by that conspiratorial look shared between them.


Explanation Of New Approach On Security Patches


Our security preview releases provide early access to Android Security Bulletin patches prior to the official disclosure. Our current security preview releases provide the current revision of the November 2025 and December 2025 patches for the Android Open Source Project. We recommend enabling this.

The only difference between our regular releases and security preview releases are the future Android Security Bulletin patches being applied with any conflicts resolved. The downside of security preview releases is we cannot provide the sources for the patches until the official disclosure date.

The delay for being able to publish the sources is why we're now going through the significant effort of building 2 variants of each release. Our most recent 3 releases have both a regular and security preview variant:

2025092500 and 20250925012025092700 and 20250927012025100300 and 2025100301

You can enable security preview releases via Settings > System > System update > Receive security preview releases.

Our plan is to keep it off-by-default with a new page added to the Setup Wizard which will have it toggled on as a recommendation. We'll prompt users on existing installs to choose.

We're maintaining the upcoming Android security patches in a private repository where we've resolved the conflicts. Each of our security preview releases is tagged in this private repository. Our plan is to publish what we used once the embargo ends, so it will still be open source, but delayed.

The new security update Android is using provides around 3 months of early access to OEMs with permission to make binary-only releases from the beginning. As far as we know, GrapheneOS is the first to take advantage of this and ship the patches early. Even the stock Pixel OS isn't doing this yet.

During the initial month, many patches are added or changed. By around the end of the month, the patches are finalized with nothing else being added or changed. Our 2025092500 release was made on the day the December 2025 patches were finalized, but we plan to ship the March 2026 patches earlier.

Previously, Android had monthly security patches with a 1 month embargo not permitting early releases. For GrapheneOS users enabling security preview releases, you'll get patches significantly earlier than before. We'd greatly prefer 3 day embargoes over 3 month embargoes but it's not our decision.

Security preview releases currently increment the build date and build number of the regular release by 1. You can upgrade from 2025100300 to 2025100301 but not vice versa. For now, you can switch back to regular releases without reinstalling such as 2025092701 to 2025100300, but this may change.



Security preview releases currently increment the build date and build number of the regular release by 1. You can upgrade from 2025100300 to 2025100301 but not vice versa. For now, you can switch back to regular releases without reinstalling such as 2025092701 to 2025100300, but this may change.



Desktop calendar etiquette for shared teams


What simple calendar habits keep your team sane?
• Clear titles that protect privacy
• Time-blocking vs granular events
• When to use reminders vs quiet hours
• Color rules the whole team follows
• What to hide on shared views
Share your dos and don’ts that actually worked for you.



Police make almost 500 arrests at Palestine Action protest in London


Police have arrested almost 500 people in London at what organisers hoped would be the biggest demonstration so far against a ban on the proscribed organisation Palestine Action.

Officers began arresting demonstrators at the silent vigil in support of the group, which has been classed by the UK government as a terror organisation since July this year.

The first arrest took place shortly after 1pm as the seated protesters took out pens and wrote signs showing support for Palestine Action. Dozens of police were lined up to begin arresting members of the group, who were sitting silently on the pavement in the square.

in reply to geneva_convenience

"They can't arrest us all!"

Well, actually....

Where the fuck do they take 500 people? How big is the London holding cells? Jesus Christ.

Questa voce è stata modificata (4 settimane fa)