fonix232

joined 2 years ago
[–] fonix232@fedia.io 39 points 2 weeks ago

Of course it's a losing battle. Remember what Sartre said:

Never believe that fascists are completely unaware of the absurdity of their replies. They know that their remarks are frivolous, open to challenge. But they are amusing themselves, for it is their adversary who is obliged to use words responsibly, since he believes in words. The fascists have the right to play. They even like to play with discourse for, by giving ridiculous reasons, they discredit the seriousness of their interlocutors. They delight in acting in bad faith, since they seek not to persuade by sound argument but to intimidate and disconcert. If you press them too closely, they will abruptly fall silent, loftily indicating by some phrase that the time for argument is past.

Conservatives around the world for the past ~30 years (if not longer) have been slowly adopting fascist methods and talking points. And for the past ~10 years, conservatives and fascists have formed a Venn diagram of a circle.

[–] fonix232@fedia.io 33 points 2 weeks ago (2 children)

Nobody mention the tissues or the suspicious white spots on their shirts!

[–] fonix232@fedia.io 33 points 2 weeks ago

The bridge has been closed for a while, of course there were no casualties...

[–] fonix232@fedia.io 19 points 2 weeks ago

You can be a little trans, as a treat

[–] fonix232@fedia.io -1 points 2 weeks ago (1 children)

Why do you presume that all AI advancement is purely by technofascists?

[–] fonix232@fedia.io 5 points 2 weeks ago (1 children)

Okay so admission time, that's not really why we broke up. The cadence of the story was just better that way.

In reality, we "broke up" (reduced the number of dates we had) because we were in a poly relationship and things were becoming more serious (as in, thinking about children and getting married) with her primary, which I fully support.

The books were after her recommendation, by the way, they did unlock a few new kinks (and reinforced plenty existing ones), and the sentence "I can barely recognise you (in bed)" was indeed muttered a few times, so I was mostly truthful, but you can see why the cadence came out better in the original comment.

[–] fonix232@fedia.io 18 points 2 weeks ago

Nu-uh, there's literally like 8 seasons worth of a docuseries on Nickelodeon about airbending!

[–] fonix232@fedia.io 4 points 2 weeks ago (3 children)

I did do it at one point, but the reading was more like 3-5 hours a day, and hardcore dark romance smut.

My girlfriend broke up with me because "she couldn't recognise me in bed". In hindsight, making her ride the handle of a knife might've been a smidge too far.

[–] fonix232@fedia.io 59 points 3 weeks ago (2 children)

I have an annoying neighbour. This annoying neighbour plays loud music throughout the day and sometimes the night too.

This annoying neighbour also happens to have a wireless charging stand with a built in BT speaker. A BT speaker that requires no authentication, no pairing, no nothing. You can just connect to it.

This annoying neighbour has been suffering from random bouts of Mariah Carey at the most inopportune times - such as 3am - at max volume. I've even programmed a Bluetooth controller to keep connecting to it and playing the song at random intervals if it gets paused or the volume reduced. And most recently I've been working on figuring out a way to detect when the neighbour plays loud music so I can finally connect the two events in a very obvious way so they finally stop.

You think hearing it for two months is bad? Try being my annoying neighbour. Doesn't matter if it's July, or February, or September, if it's morning, evening, or barely past midnight, he's getting his Mariah fix, Careyd over the soundwaves.

[–] fonix232@fedia.io 22 points 3 weeks ago (1 children)

Every single access is logged on such systems, regardless what kind of file hosting you use.

An employee suddenly accessing tons of files, potentially in indexing order (meaning they're either clicking through every link, every folder, every file, or are using an automated tool that does exactly the same), now that's suspicious.

Combine that with logs from their terminal, which would usually contain things like downloads, file operations, as well as external storage connection/disconnection events, and you can basically get a near perfect map of what they stole and how.

[–] fonix232@fedia.io 26 points 3 weeks ago

The illusion of choice is proudly sponsored by the New American Ruling Class.

view more: ‹ prev next ›