Can’t answer that, but I can tell you that lemmy lets you edit p0ost titles.
Musician, mechanic, writer, dreamer, techy, green thumb, emigrant, BP2, ADHD, Father, weirdo
https://www.battleforlibraries.com/
#DigitalRightsForLibraries
Can’t answer that, but I can tell you that lemmy lets you edit p0ost titles.
And I was so loving Lina Khan’s FTC, asking
among other things…
Edit: autocorrect
has no holes/stains
Snob
/s
Some do like it, but I’m with you; I skip the logo’d clothing.
A band is not the same as a luxury fashion brand.
One is exploited by massive corporations, gets a single digit percentage of the profits they generate, gets known by word of mouth (or T-shirt) among fans, and creates a piece of culture.
The other is a (usually massive) corporation, exploits low paid workers, is a status symbol for the rich and the people who want to appear as rich, and sometimes they make an item that could technically be considered a piece of culture.
Advertising for and/or showing your support for them are very different things that imply different things, for different reasons.
Wearing band merch implies support for their musical stylings, a connection with the creative output of the band, and possibly their world view.
Wearing a logo-festooned piece of couture clothing implies wealth and status, and (often) complicity with sweat shops.
While the two previous paragraphs seem to be similar, because of the first two paragraphs, they are quite different.
I’m always hearing about enhanced privacy laws that only apply to government workers, leaving the rest of us out in the cold. In this case, even those laws are being violated, but when its us being tracked, its fine and dandy.
The Chinese owners seem to discourage all communication between writers. They did however just acknowledge the difficulties the writers face with this platform tool.
This whole operation just smells to me like Chinese work ethic (work them till they jump out the windows, then put nets under the windows) to me. There have been two “supervisors” in the past 16 months that have come and gone. They used to buffer requests and pish to open submission on time, but then they resign without word.
Ty for the reply.
Not comfortable sharing location info, and I know state laws vary. I do know that our state has a law on the books prohibiting withholding pay based on time entry, because my union rep pushed back when I kept not getting paid because a supervisor was forgetting to approve time.
This is similar, because its the final approval process, but the work has been done, taken out of her hands and finalized. Not to mention, she waits weeks sometimes for them to get off their hands and allow her to upload.
No known contacts in the field other than her coauthors. This is her second year doing this, which is her dream job, and its opening doors for her.
Definitely, it could be automated. But part of the problem is the text box that handles the pasted data inserts characters that are not present in the final work. We’ve tried dumping to plaintext several different ways and looking for hidden characters, but it still occurs. Thus, it would still require human review. Double quotes could likely be filtered, but who gets paid to develop the automation? She wouldn’t know how to debug or validate the code, and she shouldn’t have to.
She knows this isn’t her ultimate dream job, but she is getting paid to write, and getting your own stuff published is a lot of work, luck, and who you know. She’s meeting lots of insiders, but struggling with these constraints.
You can make your own decisions, but if you just grab any random arguments, you’ll find a reason to doubt everything.
Agreed. Especially if your source is Dessalines. 🙄
Can proton know what I’m browsing?
Absolutely. Your VPN provider is in a position to know what you’re browsing. It’s up to us to determine if their track record and public statements align with our values. Ideally, the VPN doesn’t log this info.
In the case of the ideal VPN, the rights holders would likely not even have access sufficient to determine if the VPN is connecting to “illegal” sites. That would require the ISP to provide this information to rights holders. In this case, it would seem the onus would be on Proton to take the report and look at their logs – which don’t exist – and then report the clients (found in their nonexistent logs) connecting to that service to Italian authorities.
My understanding is that this changes nothing for VPN users. The real question is how Italy can enforce it. It seems they would need additional legislation to block access to non-compliant providers, likely at the ISP level. Slippery slope.
Important excerpt:
“Introducing a scanning application on every mobile phone, with its associated infrastructure and management solutions, leads to an extensive and very complex system. Such a complex system grants access to a large number of mobile devices & the personal data thereon. The resulting situation is regarded by AIVD as too large a risk for our digital resilience. (…) Applying detection orders to providers of end-to-end encrypted communications entails too large a security risk for our digital resilience”.
My reading of the article is that providers are “made aware” by the rights holders, not by general monitoring of communications on their network.
It’s true that Article 15(1) of Directive 2000/31 prohibits the imposition of an obligation on an ISP to carry out general monitoring of information that it transmits on its own network.
Sounds to me that, in practice, rights holders will notify providers of suspected infringement, triggering their requirement to report to authorities, and it goes from there.
I’m not sure how this would work for a VPN provider. It seems that rights holders could only notify them of suspected piracy websites, as client traffic would be invisible to them. I also wonder how Italy can enforce their laws on the providers outside their jurisdiction, beyond compelling IP blocking to all non-compliant VPN servers in the world.
I have only performed a cursory, sleepy reading of the article, and I didn’t follow the links to the relevant legislation. Happy to be corrected.
Works fine for me on free, but I created an account separately and later logged in with proton, IIRC. Might be related to the timing, as they were in transition between being owned by proton then.
I took OP to Kean they wanted an instance that doesn’t enable downvotes. Not sure…
China=Bad
TikTok does what every other social media app does (which is 100% legal in the US, thanks to corrupt leaders and law makers), but:China, so: Bad.
Is something wrong at the well, girl?
Clonezilla runs lots of tasks after (and before) dd
that are in the log file(s) on the live environment before you reboot. I haven’t used it in a while, but I’m confident that one of the tasks is updating grub
This. They want votes. They do what they think will get them votes. And yet, often – and in the last election – the democrats that help the people (like by walking a union picket line, supporting LGBTQ+ and basic human rights, legalizing cannabis, reducing penalties petty crimes, etc.) don’t get the votes that are part of the bargain.
They vote for and enact legislation that helps the people, and the people don’t re-elect them. The incentive shifts to satisfying wealthy donors.