

Haven’t other countries tried DNS level site blocking, and it’s very easy to get around? Does it even make any difference? The strategy of ISP copyright letters has already trained Americans to use VPNs for this, it seems like the only difference will be that I will have to turn my VPN on before searching for torrents instead of just before actually opening my torrent client


Regardless of political labels and what makes them accurate, you’re right about war being bad


I think it would be pretty cool if this was used on leaked proprietary source codes


Yes, there is empirical evidence that giving people money directly is effective, just denying it doesn’t refute that: https://ubiadvocates.org/9-successful-ubi-pilot-programs-that-will-change-your-views-on-free-money/
As for why that is, poverty is partly about mindset and decision making, but all of that is strongly influenced by the effects of being in a financially precarious situation and being around others who are. Just knowing that you aren’t at risk of your life falling apart because of relatively minor problems makes an enormous difference and allows people practically and psychologically to think beyond the short term and not get taken advantage of financially.


UBI pilot programs give a lot of evidence to the contrary


I bet there are way more people who think their life is below average than there are below average lives


I think you are correct to identify it as a contradiction, and shouldn’t fight your feelings. For lots of people absence of durable connections inherently just hurts you and you can’t change that by pretending like it doesn’t. How you are treated is experienced as an opinion, and in a real sense it is one. Something that helps to cope with it though is realizing that the opinions about you that society expresses by being such an environment are disingenuous and deluded. So much about the way people think about and treat each other is wrong, both factually and in terms of whether it makes for a good way to live, but even if you can’t ignore it you can object to it through the way you treat yourself and others.


One option is to do this for them, and just send the link to the instance most suited to your current audience when recommending using Lemmy, rather than trying to explain what instances are, because they don’t need to know that to use it.
If the library is high level enough that it is for the communication protocol itself, of which there are lots, it will probably be fine. Even if you aren’t rolling your own code in this scenario, it would still be useful to learn because it may be hard to verify as trustworthy sources of illegal software without reading the source code yourself.
I mean, there are software libraries that handle encryption for you. I’m imagining that OP is thinking of some kind of scenario where it becomes illegal to distribute communication software without ID verification, and people must write their own client programs, which is not an impossible task.
I only really get brown lentils, the two things I tend to use them for are the main ingredient in soup (along with carrots onions potatoes etc), and for fried lentils on rice.


The imperfect answer is to diversify. If you think there is a real risk that you get screwed by the organizations you are trusting your money with, keeping some portion of your wealth in any of those things you are ridiculing is a rational choice to hedge against that risk.
Those are all also risky, but the risks are different as they are (mostly) about your personal security rather than trustworthiness of institutions, meaning you have a lot more protection from being completely wiped out in a single event.


Nice, I wasn’t doing that anyway


More corrupt and less democratic than the countries that have got it probably


An advantage of github is that its social network type features give you ways to make more educated guesses about whether a project is legitimate vs a malware trap. It’s great that it is not difficult to find alternative hosting for git repos to evade Microsoft’s censorship, but I don’t think there exists an ideal alternative solution for trust infrastructure, which is extra important for anything piracy related.


From what I’m reading it sounds like it is not per-app:
Once you confirm you understand the risks, you’re all set to install apps from unverified developers, with the option of enabling for 7 days or indefinitely. For safety, you’ll still see a warning that the app is from an unverified developer, but you can just tap “Install Anyway.”
https://android-developers.googleblog.com/2026/03/android-developer-verification.html
Not that this makes it ok, this process is still something the vast majority of users will not do in practice and will kill the viability of apps with developers unwilling to show ID to Google.
I close bathroom doors, mainly to keep in the habit of doing it