=== ANCHOR POEM ===
═════════════════════════════════════════════──────────────────────────────────────
 ┌──────────────────────────────────────────────────────────────────────────────┐
 │ CW: re: PSA: aspublic.org is still active, and still archives + makes searchable all public posts, they have no opt-out, nor do they respect the "Include public posts in search results" setting │
 └──────────────────────────────────────────────────────────────────────────────┘


 @user-391 @user-78 
 
 I see, it seems you know more than me about this topic. It's true that search
 engines don't index emails, but I was thinking more of a "cybersecurity"
 perspective, as in any "sufficiently motivated" individual or organization
 could access your emails should they so desire. And should they be willing to
 (I'm assuming?) break a few laws.
 
 If it can be done, and if it gives information that could be used for
 leverage, then you can be assured that someone will do it. I personally worry
 about people in power who could be blackmailed because their communications
 were more public than they anticipated. Which speaks to the problem mentioned
 in this post of the search-indexing-opt-out functionality being present but
 circumnavigatable. Avoidable? Able to be bypassed? It's an illusion of
 security.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘

=== SIMILARITY RANKED ===

--- #1 fediverse/929 ---
══════════════════════════════════════════════────────────────────────────────────┐
 @user-192                                                                        │
 oh, you didn't find what you're looking for on the first page? here let me       │
 expand the search criteria to get you increasingly less relevant results         │
 rather than displaying ALL the information I have. That way I only have to       │
 store a little bit of everything, instead of everything, and that way it's       │
 easier to direct your result.                                                    │
 what's that? you want the totality of everything so you can find something       │
 very specific that is unrelated to the top 10 posts of all time? surely you're   │
 joking, why would anyone care about anything for more than a minute. Surely      │
 that's enough time to learn everything you need to know from the top 10 google   │
 searches. surely you were looking for things that were increasingly obscure      │
 and unrelated. maybe if we just throw garbage at them they'll go away...?        │
 Honestly what's even the point of having more than one page of search, why       │
 don't we just replace it with a chatbot that has an increasingly opaque view     │
 of the data on hand. Surely that's not completely insane, surely that sol        │
                                                            ┌───────────┤
 similar                        chronologicaldifferent════════════════════════════════════════════─────────────────────────┴──────────┘

--- #2 messages/181 ---
══════════════════════════════════════════════─────────────────────────────────────
 I know you don't want to hear this, but there is a chance that there will come
 a time where your life depends on your ability to debug a computer without the
 internet. To set up an SSH server. To install Linux. To program in C. To do
 something else that I'm not prepared for... If StackOverflow didn't exist
 because network connectivity has been lost, could you remember syntax? Maybe
 it's a good idea to set up a local LLM that can answer basic questions about
 technology. Maybe it's a good idea to set up on your parents computer, just in
 case you have to hide out there for a couple months. Maybe it's a good idea to
 download wikipedia, just in case.
 
 If I need to use a mac, I'm screwed
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #3 fediverse/2252 ---
══════════════════════════════════════════════════════─────────────────────────────
 ┌──────────────────────┐
 │ CW: tech-encryption  │
 └──────────────────────┘


 users don't want to have to think about encryption keys.
 
 they should be available for them if they need them, in like... a folder or
 something somewhere, but they don't need to really know that they exist.
 
 more friction like that keeps people away from being secure.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #4 fediverse/5710 ---
═══════════════════════════════════════════════════════════════════════────────────
 society can be gamed in so many ways because it was designed to oppress you.
 
 a more connected solution would solve so many problems, and introduce vastly
 fewer more.
 
 for example. wanna disenfranchise someone? take away their vote by framing
 them for a crime. This is an example of population manipulation, and it's
 unethical in the extreme.
 
 downside is if you don't mother people they sort of forget how to breathe -.-
 
 dumb apes, who thought it was a good idea to be born without instincts? ah
 well let's raise them I guess, and try to keep the nazi cults on the
 diminished minimum.
 
 no-please-don't-walk-into-that-electric-pole it's made out of lightning juice
                                                           ───────────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════───────────┘

--- #5 fediverse/884 ---
══════════════════════════════════════════════─────────────────────────────────────
 ┌──────────────────────────────────────────────────────┐
 │ CW: completely-unfounded-no-evidence-mis-information │
 └──────────────────────────────────────────────────────┘


 If we make a law that says you can't sell user data, they'll just build an
 intentional vulnerability into their system and point it out to specific
 people who paid under the table. Then, when they get "hacked", they'll surely
 be ashamed and sorry to their users, but hey the data's out there now not like
 they can take it back. Oh don't worry we already patched the hole in our
 security, that way nobody can get in through the same door that was
 intentionally left open for very particular people who've paid, and not for
 the people who haven't paid yet, who are still waiting patiently for a door to
 be built for them.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #6 fediverse/3370 ---
════════════════════════════════════════════════════════───────────────────────────
 I know it's not like that but I'm intentionally framing it that way to make a
 point about societal exclusion.
 
 nobody should be excluded.
 
 nobody should have to harm their friends to come by making them sacrifice
 their [time/labor/paycheck] in order to bring them along.
 
 we live in a post scarcity society that insists on commodification of
 everything
 
 we don't have to. A better world is within reach. It sits there, twinkling
 like asbestos resting at the base of a snowglobe, while we search and ponder
 and endlessly analyze how society sucks.
 
 there is nothing left to analyze. all that we need is to put our hands to a
 task and our feet to grass.
 
 the rest will come, and it'll come easier with time and focused attention.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #7 fediverse/2018 ---
═════════════════════════════════════════════════════──────────────────────────────
 @user-1132 
 
 The trick is to phrase your "divine insight" into a question. Like "don't you
 think that perhaps this strange intuition you're feeling might have something
 to do with the subconscious pattern matching capability humans developed over
 long years of differentiating tree-branches and snakes or uneven terrain and
 solid footing?"
 
 then if someone says "what the heck no I never thought that because I don't
 know anything about humans"
 
 then you say "oh well that's surprising, perhaps you should look into it"
 
 and then they come back later and say "how exactly did you know that
 information? It's not public knowledge"
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #8 fediverse/1113 ---
═══════════════════════════════════════════════────────────────────────────────────
 we should be able to configure our web browsers so that they don't remember to
 autofill certain pieces of information. Such as the IP address of our router,
 or our bank credentials, or any other forms of passwords that we are using to
 authenticate ourselves. That way our infrastructure that we've designed is
 less susceptible to cybersecurity threats that involve physical access to the
 computer. Or remote control of some kind that is channeled through the UI
 (like RDP or SSH) (a terminal is a text based UI in this context)
 
 Unless of course they knew what they were doing. Which most of them don't.
 Hence why it'd be a good idea to isolate the capabilities of defeating certain
 vulnerabilities to ourselves. Like, a reverse backdoor, only more like a DMZ -
 a sector of computing space (sandboxed of course) that is only utilized for
 understanding the intent of the message sender.
 
 Doing so would require an analysis of the capabilities of the system, the kind
 of analysis that [script kiddies'dve] generated by googl
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #9 fediverse/6271 ---
═════════════════════════════════════════════════════════════════════════════──────
 ┌───────────────────────────────────────────────────────┐
 │ CW: re: hypothetical worst case fascism reality check │
 └───────────────────────────────────────────────────────┘


 @user-641 
 
 it's practice. you never know when you might need to blend in. really it's
 just useful as discipline, good practice to be in. I think it's okay if we
 reduce our own functionality? actually? sometimes it's good to use different
 email clients. hey do you know how to mathematically encrypt things well
 neither do I because the designers of the computer system decided that wasn't
 a very common usecase I guess.. jmean it's not like they'd spend all that
 computer resources [THEY'RE SO FAST] on thinking about correlations in your
 predicted pathway narratively through life. "ah help I'm in a psyop" haha yeah
 we do those all the time "so uhhhh I guess we'll just talk to people and see
 how they do?" wow okay it's sure nice to be part of a civil government, I
 think we can find our way to the lumber producers just fine thank you very
 much.
 
 ... oops sorry, a baby did electronics arts (challenge everything) I'm a
 little silly don't mind me brb I gotta go see~
 it's practice. you never know when you might need to blend in. really it's just useful as discipline, good practice to be in. I think it's okay if we reduce our own functionality? actually? sometimes it's good to use different email clients. hey do you know how to mathematically encrypt things well neither do I because the designers of the computer system decided that wasn't a very common usecase I guess.. jmean it's not like they'd spend all that computer resources [THEY'RE SO FAST] on thinking about correlations in your predicted pathway narratively through life. "ah help I'm in a psyop" haha yeah we do those all the time "so uhhhh I guess we'll just talk to people and see how they do?" wow okay it's sure nice to be part of a civil government, I think we can find our way to the lumber producers just fine thank you very much.  *... oops sorry, a baby did electronics arts (challenge everything) I'm a little silly don't mind me brb I gotta go see~*
                                                           ─────┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════─────┘

--- #10 fediverse/482 ---
═════════════════════════════════════════════──────────────────────────────────────
 @user-246 
 
 You're absolutely right. It's easy to think of the internet as this
 encapsulated entity "the world", but really it's "the people whose computers
 are physically connected to your computer using a limited and tangible piece
 of infrastructure comprised of copper wires that are laid between the
 router/switch that connects to your computer... and the internet service
 provider which directs your traffic. Then it probably goes through some cables
 under the ocean or whatever, and eventually after traversing many
 indeterminate passthrough locations eventually arrives at the computing
 infrastructure that comprises the access point that another person (presumably
 in another country) uses to express their thoughts toward you (the person who
 sent the original message) in the hopes that you might one day correspond.
 
 I mean... That's a lot of points of failure. I sure hope that we can sustain
 such connection, in the face of [redacted, whichever circumstances may come in
 the near future]
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘

--- #11 fediverse/1361 ---
════════════════════════════════════════════════───────────────────────────────────
 ┌───────────────────────────────────────────────────────────┐
 │ CW: re: I think I'm going to like this book (abuse of CW) │
 └───────────────────────────────────────────────────────────┘


 @user-883 
 
 I'd say "content warning: fear-cursed-if-true-not-politics" that way people
 who had "Fear" or "cursed" on their filter list wouldn't see it. Things that
 are commonly content-warning'd are also commonly content-filtered by people
 who tend to be the biggest beneficiaries of healthily designed
 content-warnings. so putting keywords in there that filter out people who
 don't want to see intense or damaging things to their psyche can avoid it more
 easily.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #12 fediverse/3962 ---
═════════════════════════════════════════════════════════─────────────────────────┐
 ┌─────────────────────────────────────────┐                                      │
 │ CW: re: Thoughts// anarchist //whatever │                                      │
 └─────────────────────────────────────────┘                                      │
 @user-1298                                                                       │
 hehe true.                                                                       │
 if you consent, then it's just a social structure.                               │
 there are, however, reasons when power is justified. Hence why I don't believe   │
 that power itself should be dismantled, and what few "power structures" remain   │
 should be continuously justified.                                                │
 For example, how do you prevent people from harming others? "Your rights end     │
 where another's begin" but, like, how do you stop people who toe the line and    │
 spit over the edge?                                                              │
 There must be power applied to those who harm, and they surely do not consent    │
 to being curtailed, so therefore power must be wielded by someone. And because   │
 power corrupts the one who wields it, it is inevitable that someone creates      │
 harm.                                                                            │
 ... I just re-invented the police, didn't I? Legalism only goes so far, and      │
 calling up your beefiest friends to go rough up a no-good do-gooder is           │
 basically what mobs, mafias, and gangs do. I don't think people would consent    │
 to being protected by a gang, much less governed by one.                         │
 we will think of something.                                                      │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════──────────────┴──────────┘

--- #13 fediverse/2752 ---
══════════════════════════════════════════════════════─────────────────────────────
 ┌──────────────────────┐
 │ CW: police-mentioned │
 └──────────────────────┘


 cops thought "enforcing the law" was their job when really it was "keeping the
 peace"
 
 and like, yeah, sure, laws define how they optimize for
 
 but sometimes the laws are just out of reach.
 
 (though such an impartialized system is also pretty flawed in it's own unique
 ways, like for example the enforcers of the law would be able to apply their
 law selectively, which... would not be great.)
 
 downside is... how do you dissent to those who cannot hear you? you have to
 break things
 
 which is why I believe that breaking things unnecessarily is unethical.
 
 sometimes you have to do a MORE unethical act in the pursuit of your goals,
 however nefarious or not they may be, but as long as they are done in pursuit
 of a greater grander truth, then... the ends justify the means? right?"
 
 ...
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #14 fediverse/2031 ---
═════════════════════════════════════════════════════──────────────────────────────
 @user-1074 
 
 We've always been that way in their eyes. If they make it legal, nothing will
 change in how people think of you. They might be a bit bolder if there's fewer
 legal protections, but laws have always just been words.
 
 There are more of us than there are of them. If you have community, you'll
 feel safer. I know it's scary but we can get through it together.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #15 fediverse/624 ---
═════════════════════════════════════════════──────────────────────────────────────
 You know, there's no guarantee that Youtube or Gmail has to show you the EXACT
 SAME video or message that your friend shared with you. Or did they even share
 it at all? So hard to tell when they know all the communication you've ever
 had, because you only know each other online on their platforms, [read: US
 government observed platforms] [like, HTTPS] surely there's no room for
 someone to sneak in and edit your conversations. Surely the only way to
 securely communicate is to send pure PGP encrypted bytes to another target,
 wrapped in a TCP/IP header, with unknown intent or expression. Worst they
 could do then is just, y'know, block it entirely.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘

--- #16 fediverse/1261 ---
═══════════════════════════════════════════════───────────────────────────────────┐
 sometimes I run this WoW server with only like, 10 username and passwords. And   │
 they're all public. As far as I can tell nobody's ever tried connecting          │
 (whatever >.> ) but rather than set up a way to create your own                  │
 credentials I just said "yeah pick one at random and play whatever someone       │
 else was doing because I like the idea of that"                                  │
 somehow, it felt right.                                                          │
 most of my passwords (not all of them) are hacked and visible on the clear       │
 net. Like you could probably google my usernames and get my current passwords    │
 for things like, social media or my banks or whatever. I kinda like the idea     │
 that "you cannot trust anything I say, so think of the ideas behind my words     │
 and decide whether they hold meaning to you" rather than "execute these          │
 particular thought patterns in your mind as if they came from my voice"          │
 because one implies an exertion of control over the mind of the recipient        │
 -> obey my thoughts as I broadcast them into your mind, that kinda vibe.         │
 And I feel like you have to consent to that kind of thing hehe                   │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═════════════════════════════════════════════────────────────────────┴──────────┘

--- #17 fediverse/3931 ---
═════════════════════════════════════════════════════════─────────────────────────┐
 ┌─────────────────────────────────────────────┐                                  │
 │ CW: politics-mentioned-DRM-media-piracy-pol │                                  │
 └─────────────────────────────────────────────┘                                  │
 if people pirate media, it's more of an indication that they'd rather spend      │
 their money elsewhere rather than an indictment of their character.              │
 torrenting movies is easy. Kinda makes me think all media should run on a        │
 "tip" system where you pay for better service after receiving service.           │
 I mean, after all, that's how they justify underpaying restaurant workers,       │
 isn't it?                                                                        │
 "if they want more money, they should work for it"                               │
 yeah, so... maybe we need something more than Marvel, Disney. Maybe we need      │
 more cool, small games from designers who believe in what they're doing. Maybe   │
 copyright holders should demand a standardized cut, rather than exclusive        │
 distribution rights. maybe maybe maybe.                                          │
 truth is nothing will be solved unless the problem is addressed at the root.     │
 For every hole you patch in the boat, there's a guy walking around with a        │
 hammer.                                                                          │
 Honestly... I don't believe there's any reason for someone to be a millionaire   │
 except to compete on the "wealth" leaderboards.                                  │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════──────────────┴──────────┘

--- #18 fediverse/1862 ---
════════════════════════════════════════════════════──────────────────────────────┐
 some people look for signals or signs before doing something. Try and have       │
 someone in your life who can give you signals or signs so that you know when     │
 to do things. And ideally, if they're more hardcore than you, you'll know what   │
 to do, not just when to do it.                                                   │
 did you know that anything on the internet can be read by at least one other     │
 person besides your intended recipient? There's no way they'd let us talk        │
 amongst ourselves otherwise.                                                     │
 I think encryption is pretty neat, all you have to do is run a shell script on   │
 some text, then send that text over the internet. If you want to decrypt it,     │
 all you have to do is run a shell script on it to decrypt it.                    │
 downside is, it has to be translated into plain text somewhere along the         │
 line... Maybe if we rendered the words not as text that can be read from         │
 memory, but as like, brush-strokes that can have a randomized order, but still   │
 present to the user as visual text? anyway that's what's on my mind as I try     │
 and improvise a baking recipe with yeast, flour, and butter                      │
                                                            ┌───────────┤
 similar                        chronologicaldifferent══════════════════════════════════════════════════───────────────────┴──────────┘

--- #19 fediverse/1123 ---
═══════════════════════════════════════════════────────────────────────────────────
 @user-835 
 
 kinda feels like that type of work, the kind that people rely on, is more
 important than... whatever they were having you work on at work-work.
 (assumption on my part)
 
 and if that important work is not provided for, in the allocation of resources
 applied toward the developer who is developing security developments that
 develop required functionality for the development of people's
 communication/interactions, then perhaps resources should be allocated for
 resolving those difficulties.
 
 Or maybe not idk I'm broke, shows how much I know about money
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #20 fediverse/3470 ---
════════════════════════════════════════════════════════───────────────────────────
 alternatively, when you initiate an SSH session it sends you a randomized
 public key whose private key is the password that you need to login. By
 decrypting the string of text it sent you and sending it back (plus the
 password at the end or whatever) you can ensure secure authentication without
 bothering with the passwordless keys which are wayyyyyy more trouble than
 they're worth and lack the "something you know" authentication method.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘