

are you sure it’s even a person, not a bot? because this all screams either bot or seeking internet fame as the “hero to kids”.
A mess of a girl, free on the internet. A spicy meatball indeed :3


are you sure it’s even a person, not a bot? because this all screams either bot or seeking internet fame as the “hero to kids”.


because it’s all part of a larger project to collect usable data. you can’t force standards, but you can force laws.
if you build a standard and no one follows it. then it’s wasted time and money. Meta, Google and Microsoft all have a vested interest in user data. more so with law enforcement buying it in bulk to build identity profiles of /individuals/.
if tomorrow they got added to the law to store and transmit a string of your government ID, would you be more resistant?
the issue is, VPNs hide your ISPs assigned IP. till now there has been a higher difficulty in differentiating traffic from the same IP with similar metadata. the more user specific metadata that’s added, the easier it is to differentiate devices and users.
this makes targeting specific devices with malware for spying significantly easier. at the very least.
but at a bigger point of view, it gives provable cause because the way the law is written implies every user that installs the OS becomes a OS distributor and every user is a minor by definition, even if the API flag says otherwise.
I recommend you read that again and if the words “probable cause” don’t come to mind you don’t understand the risk of a “minor” identifying as a adult.


yes. every time in the history of gnu software when a function is added without a purpose its for a later feature.
otherwise there is no need for the form? since when do we leave empty forms in software that can be used to store strings, that hold no meaning…
only two uses for this. to implement the full API later or to have a string the user normally does not see that becomes a perfect place to store malware. full stop.
complying with the API is a act of absolute stupidity…


not really, the law is written that complaince makes you complicit. every user is a child. there is no adult users.
above all else, even if the API is used properly, unless it’s giving false positives, it creates a metric that can be tracked to form patterns. these are all a advanced method to identify individuals to unmask online identities…


depends on how it’s declared and transported. as there is classes for each type.
surprisingly, I believe jewelry and personal goods is the lowest tax bracket. which technically applies to alot of things even electronics.
obviously every nation is different, but you have to be careful in how things are declared, otherwise they may be just flat out rejected because it wasn’t bought inside your nation. (censorship controls apply to imported goods like media, toys, magazines, electronics goods, and household items. it’s best to treat each thing not as what it actually is but what it’s made from to avoid refusals and overtax due to poor import system that blindly denies.)


there no benifits to this. extreme bacterial contaminations and mold/fungus concerns aside, there is simply too much unprocessed food available that goes unsold and is wasted as a result to ever need to recort to this.
it’s not a ecology issue, there has never been a shortage of “food”. when people say there is a “Shortage of food”, what they mean is there is a shortage of food /given/ to them.
it’s a economic shortage of food. they do not have enough wealth to acquire food and therefore they are not getting any. greed is the reason there is so much food wasted. not at the table, but at the market.
governments should be subsidising the poor and supporting their food needs by taking excess from markets at value, not margin.


as soon as food starts the process of production, before it even hits a preparation or cooking surface it has bacteria on it. nothing is completely clean.
freezing, washing and cooking ingredients reduces these or makes them go dormant. but it does not get rid of them entirely.
when it’s plated and served, that bacteria is already stating to revive and reproduce. by the end of a meal, between all the new nutrients from the human body added to the plate from the utensils, the leftover food is a breeding ground. this is why leftovers are generally considered risky if not handled properly.
you simply cannot reliably disinfect them and the only things you can do is store it in a chilled environment to slow bacterial growth and reheat to aid in killing some but not all of that new growth off.
if you start mixing these together, the salavia, which is unavoidable as spittle occurs whether you notice it or not, and trace amounts are on your utensils from mouth contact. plus any airborne contaminants from the person are in the food.
it basically becomes a Petri dish. as it’s a perfect microcosm for bacteria and mold…
we used to grow mold, yeast and fungus by spitting on potatoes and rice. to later harvest it. we understand it well.


not op, but I assume they are vegan. many vegans have the misconception any product from a animal is violence against them. as they cannot consent…
but the truth is, no vegans live on farms… they don’t understand chickens lay unfirtalized eggs regardless.
they also see the breeding programs of chickens as violent as it’s for producing meat/eggs. so by raising chickens you are perpetuating it… but that’s stupid. that’s like seeing a hurt dog by the side of the road and saying “if we help that one we have to help all of them”. baby chicks are often given away not sold…


and a lack of companies with ethics. shipping companies often make massive profits. there is nothing stopping them from shipping donations for free…


it’s government backed, their for the government knows every time it’s used and it identifies you…
when a service requests to use it, it becomes correlation data… this is data both the government and the application developers can use to identify you on the internet.
It may mean nothing today, but I can and will if either the application switches developers to a nation who uses this information for nefarious means. or if your government changes policies to something intentionally nefarious.
blind trust is never good.


?? I’m not following. sure you can run arm based CPUs as a mobile device, but performance of large applications or x86 applications is poor.
there is also the addressable memory space issue that exists due to most arm core designs targeting phones… the bus is super limited, despite the architecture technically supporting much much more.
current RiscV cores suffer this same flaw as well.
the reason arm cores have better battery life is they are designed with phones in mind… not a desktop cpu. x86 mobile CPUs are cut down desktop CPUs with tdp restrictions. there is a massive difference as a result.
we are talking completely different design philosophies. it’s like comparing a ebike to a sports car… sure the ebike gets great energy economy when you scale the batteries. it’s half petal powered and has tiny draws on lightweight frame. it’s apples to oranges.
motorcycles would be more apt, but for arm, none really exist outside of obscenely priced workstations.


Microsoft was '81 for acquiring DOS (and that’s technically a lie, they didn’t have the source code for several years later. but it’s how they convinced IBM)
both MS and Apple were living BASIC at this time. Basic is not a operating system, it’s a pre-compiler environment. it’s designed to let you run code directly without machine code. as assembler and C was not a thing or rather licensed yet.
BSD specifically Netbsd exists as they were part of the invention of C code. BSD was ported from assembler/machine code to be portable with C.
MSdos, which Microsoft acquired by buying Qdos (aka 86dos), was written by a developer who stole most of the code and copied the rest from a existing operating system (which I cannot recall at this time). both were In negotiations with IBM. just Microsoft lied through their teeth to get the contract and won.
apple at the same time had fallen behind. the Lisa and apple II were still running a basic interpreter on top of ROMMON. Wozniak who wrote ROMMON and later large portions of apples next two OSes including OSx. kept pushing to get a actual Unix like Operating system on the device.
however Steve jobs was cruel, and demanded no new changes… it’s why Wolfenstein was nearly out before a true OS existed from Apple… Steve had a long history of trying to control advancement through forcing model version advancements with weaker hardware than the previous so you would be encouraged to upgrade.


Unix dates back to the 1960s. you have to count back to the BELL/AT&T days as it was available to educational institutions.
apple was still using BASIC on Thier first machines long after netbsd


one of the things I’ve been happy about in the last 24mo, is the HDR and NVIDIA support. until last year I was still using my old 2070 (non super) as I was waiting to upgrade.
that became more and more rock solid on the open NVIDIA driver.
when KDE put HDR into stable and then proton got HDR. now Firefox and Chrome. I’ve been in bliss. I don’t even get this good of HDR support on windows and I still have that on a secure NVME for work lol
there is 2 apps for modifying Logitech kbd controls. I don’t use either, but I would take a look at some wikis if you try again. personally I just avoid logi for anything but mice and webcams. also avoid Razr for anything, backdoors in their drivers are just plain stupid.
motherboard sensors I can get, I have a issue with mine with lmsensors, I’m a longtime Linux user so I can navigate to fix that with some dkms kernel modules… but I totally get how and why this would be a issue and full blame lmsensors for being too bloody slow mainlining sensors… license shenanigans are a pain.


?? in the past yes. but there has been lots of videos on the topic. people talking about how they filter it with firewall rules on their routers, etc.


by the first device intended to run full applications from external developers and interact with a active web.
this even puts palm, blackberry and early windows mobile devices barely outside of the cutoff sadly. they simply weren’t designed for the “extensions” people used to make them bridge into becoming a “smart phone”.
most of that list also is post-iphone/iPod too, which makes it kinda moot.
it’s kinda why windows phone, iOS and Android are treated as the “first” of their kind. as that was Thier intent from the start.


what year do you think it is?
I am using my VR headset playing half-life alyx, while using my premium Logitech mouse, Elgato stream deck and streaming to YouTube.
nothing has any issues. all of my messaging services have apps and just work “out of the box”. setup took me maybe 20 minutes. most of it was just going to my phone for 2fa.
only time this is ever a issue is obscure, windows only applications that use special hardware authentication like some old CAD software. or some silly editing software like Adobe cloud who intentionally block Linux. (also older adobe software is better anyways and works. Linux alternatives exist and work equally as good.)
I remember how it was 5 & 10 years ago. struggling at each step. but it’s not the case today. on the rare occasion I need to spend time diagnosing something, it’s usually because the company behind it did something disgusting, that makes me want to stop using their services anyways.
it’s rarely ever hardware or software that doesn’t use online services.


PDAs are not “SmartPhones”. if we want to go that route, we can trace the first “Smart Phone” to the Berkley Unix “Mobile Phone Device”.
iPhone was the first to market, but to get there required them pushing vendors into exclusivity agreements and Steve Jobs threatening to “flatten Thier companies, in court” if they backed out and refused.
Steve was very biligerent to his friends and allies. shrewd, like a dictator, not like a general. if he didn’t like your descent he would steamroll over you. he would make promises all the time to his staff, to get them to work harder on projects, just to peacemeal them and shoehorn them into weaker projects that would make customers dependent and demand more.
what Steve jobs did best, is know how to make a cult and exploit the desire for “if only it could do ‘X’ it would be perfect”.
don’t take my word for It. his business partners said the same thing… they begged him to come back as he sabotaged them externally when they tried to improve…
apple went through a period where they genuinely were improving. they sold Thier software and hardware to third parties to make Thier own versions…
but then Steve jobs went and sabotaged them, got a massive amount of bad press for apple to make them appear weak, and put the 2 final nails in the coffin.
he pushed software vendors to support m$ and next step more.
then he went to apples suppliers and made it for it was even more difficult for them to develop in-house hardware to compete with third parties…
all of this, so they would start to go bankrupt so Steve could ride in on his white horse going “See, you should of stuck with my vision”. then Steve goes and pushes for restrictive hardware with a architecture change so third party models would be obsolete, clones pc-clones from asia (mostly JVC/nec) which were exploring with transparent plastics and still tried to shovel next step to everyone…


I was playing Doom on SPARC Unix, when apple was still trying to add resizable windows…
I don’t think people realise just how much they were screwed because of apple and microsoft manipulating the market so much.
the law wouldn’t hold up in court anyway. its not practical for any ecosystem outside online sites.
accounts and users are the same thing, despite what the law says. it also doesn’t different a person from a user, meaning a compromised system that is complying with the law, its actions represent the user, and the account holder is held responsible.
its made to absolve meta/Microsoft/google from their actions in targeting kids with intentionally addictive content and making the “account holder” at fault.