=== ANCHOR POEM ===
════════════════════════════════════════════════════════───────────────────────────
 ┌─────────────────────────────┐
 │ CW: tech-accessibility-rant │
 └─────────────────────────────┘


 https://www.reddit.com/r/comics/comments/1f5u47p/transfer/
 
 This Reddit thread is wild to me. Like... Why did the designers of Androids
 and iPhone just... stop designing ways to safely and easily transfer files?
 Why the heck doesn't every android have a built-in SSH server that
 automatically and permanently pairs to your PC using an automatically managed
 private key the first time you plug it in? The user doesn't care about
 security, they just want to click on a picture, click the "view on PC" button,
 and then open up their downloads folder. (paraphrasing the comments) - so why
 don't we make that happen. What happened to tech, that we stopped working as
 soon as the consumer decided they wouldn't pay for it? (it being a file
 transfer service)
 
 It's like healthcare. You don't stop treating someone when they're healthy,
 you ask them how they'd like to feel and you make it happen. (hormones).
 
 [continued in picture because letter count]
where have all the designers gone... who's the one who is in charge of not listening to them? Why does airdrop exist? SCP has been around for hundred YEARS being a normie is a tech disability smh
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

=== SIMILARITY RANKED ===

--- #1 fediverse/239 ---
═══════════════════════════════════════════───────────────────────────────────────┐
 if your computer gets hacked, but nothing was broken or changed... do you        │
 leave it as it is so that anonymous can see you're chill or do you wipe it       │
 because you're afraid it's the feds?                                             │
 ehhhh false dichotomy most people are afraid that their system will get borked   │
 or their bank account will be stolen or their email will get spam or that        │
 random icons will turn inside out and their mouse cursor will turn into a        │
 barfing unicorn or they'll finally have to figure out bitcoin to pay a ransom    │
 for their files including the only pictures they have of their niece. whoops     │
 people are afraid of technology because of what it can do to hurt them.          │
 they're afraid it'll break or stop working, and they'll have to spend time       │
 figuring it out. they like things how they are, but for some reason companies    │
 keep changing things? it's frustrating learning a new system, and every 5-10     │
 years it feels like you have to learn a new paradigm and ugh it's just so        │
 exhausting. technology is not designed for users...  or maybe users get bored.   │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═════════════════════════════════════════────────────────────────────┴──────────┘

--- #2 fediverse/1329 ---
═══════════════════════════════════════════════───────────────────────────────────┐
 @user-941                                                                        │
 well, your computer only has so many 1s and 0s that it can use at once. Like,    │
 having a trillion hands that can each hold a single grain of rice. Every         │
 character in that txt file would be like, 8 grains of rice, minimum, meaning     │
 you'd need at least 8 "hands" (or spots to put a zero or a one) for each         │
 letter!                                                                          │
 Hmmmm that's a lot of bits and bytes if everyone's writing to the same file.     │
 Maybe if we split the file up into smaller sections, then we could just read     │
 part of it at once. Then we could "scroll" through it to make sure we've read    │
 the whole thing, starting from the top and going to the bottom.                  │
 ah but if everyone's SSHing into the same computer and reading it there, then    │
 that computer will have to present different parts of the file at different      │
 times to different people, as they read from the top to the bottom. Maybe we     │
 could just send them the file, so they can read it at their leisure?             │
 Yeah! And we could use tags to organize it and make it look pretty, like an      │
 HTML file except... wait hang on                                                 │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═════════════════════════════════════════════────────────────────────┴──────────┘

--- #3 fediverse/5920 ---
══════════════════════════════════════════════════════════════════════════─────────
 everyone's all like "ew touchscreens in cars" but the moment someone says
 "what if phones were gameboys" everyone's all like "girl they don't have the
 right hardware radios built in for cellular communication, plus do you really
 wanna be tied to wifi" and I'm like "yeah so peer to peer" and it's like "what
 use is it if you gotta stay within 100 feet of them or whatever" and I'm like
 "... I dunno probably somethin'" and then they walk away in a huff because
 they're too busy for my child-style games. Meanwhile girls have never heard of
 Streetpass on the Nintendo DS mixed with Scuttlebutt on the ocean and carried
 into and around port
                                                           ────────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════────────┘

--- #4 fediverse/3470 ---
════════════════════════════════════════════════════════───────────────────────────
 alternatively, when you initiate an SSH session it sends you a randomized
 public key whose private key is the password that you need to login. By
 decrypting the string of text it sent you and sending it back (plus the
 password at the end or whatever) you can ensure secure authentication without
 bothering with the passwordless keys which are wayyyyyy more trouble than
 they're worth and lack the "something you know" authentication method.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #5 fediverse/5950 ---
══════════════════════════════════════════════════════════════════════════─────────
 @user-138 
 
 wao I'm a cool kid _^
 
 Hmmmm I googled "Network: file exists" and got this link:
 https://access.redhat.com/solutions/1340713
 
 my understanding of that is that maybe you're creating static routes, and for
 some reason you're trying to create one that already exists? Maybe there's
 something in your .bashrc config, if the file appears when you open a
 terminal, or perhaps if it appears randomly then maybe there's a service or
 something that's doing it.
 
 Did you say it stopped when you swapped sim cards? ... on your phone? that's
 bizzare... Maybe you were trying to create an ip route (whatever that is) that
 was pointing to the same ip address as your phone? and when you swapped sims
 it changed the ip address? If it appears again, maybe try setting static IP
 addresses for both the phone and the computer in your router settings and see
 if that fixes it. Though if you've ever seen the error while out and about at
 like, a coffee shop or library or whatever, then that wouldn't apply since the
 router is only for home base...
                                                           ────────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════────────┘

--- #6 fediverse/3469 ---
════════════════════════════════════════════════════════───────────────────────────
 you know how SSH password login is deprecated because the password needs to be
 transmitted in cleartext or whatever?
 
 what if we just... required two passwords?
 
 the first initiates the conversation, and sets up an encrypted line. It
 doesn't matter if anyone sees the first password because they'll get a new set
 of encrypted keys, meaning each session automatically is encrypted in a
 different, randomized way.
 
 the second password is the one that actually authenticates you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #7 fediverse/1345 ---
═══════════════════════════════════════════════───────────────────────────────────┐
 ┌────────────────────────────┐                                                   │
 │ CW: re: cursed-chromebooks │                                                   │
 └────────────────────────────┘                                                   │
 ah but are you really armed in the first place if everything you do has to be    │
 googled or stack-overflowed first                                                │
 are you really armed if every web page request goes through their                │
 infrastructure                                                                   │
 are you really armed if every page downloaded is directed to by their DNS        │
 perhaps it's the illusion of power that gives Linux it's attraction to nerds     │
 such as we. Perhaps we feel powerful by bash scripting a few things together     │
 and making some program that does some thing. Maybe the idea that the            │
 machinery is open and clear is what compels us to use it without fear, though    │
 as far as we can hear there's nothing about it that makes sense.                 │
 I guess that's why they teach Linux in school, so that our elementary            │
 interactions with the computers that comprise our future existence will make     │
 sense to us as children.                                                         │
 ... wait they don't do that, do they? kids get chromebooks, or didn't you        │
 hear, they're always putting boogers in the CD trays and breaking their LCD      │
 displays, much better to just start fresh                                        │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═════════════════════════════════════════════────────────────────────┴──────────┘

--- #8 fediverse/5685 ---
═══════════════════════════════════════════════════════════════════════────────────
 websites that track every single motion of your mouse while you're interacting
 with it.
 
 why would they not? javascript is intense. HTML5 more-so.
 
 keyboard input too.
 
 -- so --
 
 if anyone wants to be gilderoy lockhart'd by me, just let me know. I have my
 ways of extracting the emotional intimacy from you, and if you consent, I'll
 make a story that's told from your heart. it's quite a strong and dangerous
 ritual, for the weaver's thoughts of the matter will begin to drift apart.
 But, worth it for the right /moment/price/
 
 I could even make a different pen-name for it. Like "Rohan" or "the goddess of
 the skies" or whatever. Instead I'm "kooky witch whose life is a disaster.
 Also plural with headmates like the baby girl and the animals and computer
 programmers. Who is also leading a series of strange combinations of ops?
 like... teaching people how to organize and fight for the good of the common
 man. weird" that lady with the red witch hat she's so tall yeah also has a
 good grin
 
 [doxxing myself is code for]
                                                           ───────────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════───────────┘

--- #9 fediverse/5919 ---
══════════════════════════════════════════════════════════════════════════─────────
 "but... why?"
 
 portable linux with buttons, great for pick-up-games or communication, can
 throw several in them in a backpack if you want clustered cooperation, they
 work as radios (if the signal reaches) and can transmit text (if you use a
 radial-style keyboard)
 
 [this is all just a pitch for... something, what, you want something? ha
 you'll find no things with me, I know nothing of antifa or whatever]
                                                           ────────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════────────┘

--- #10 fediverse/71 ---
════════════════════════════════════════───────────────────────────────────────────
 Oh it's compressed on tumblr too. And Reddit can delete my account at any
 time, just saying. I don't trust Facebook to fare any better...
 
 I tried to put it on my neocities website so I could just put a link here.
 Nevermind the fact that most people see a link they don't recognize and
 completely glaze over it. Guess what? Compressed there too. The file is fine
 on my PC, so how about I give a download link? Well, where should I host it?
 Dropbox or Mega I guess, but they locked my account for inactivity. I don't
 really like having other people in control of my data either. Maybe I can host
 it on my website, like a file server? Well, the browser intercepts the file
 somehow and I can't get it to automatically download to the viewer's computer.
 Maybe I'm just completely average and representative of the base population
 but I just can't figure this darn thing out. Alas, if only it was the modern
 era where things make sense and not the ancient days of 2023.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════──────────────────────────────────────────┘

--- #11 fediverse/1611 ---
═══════════════════════════════════════════════════───────────────────────────────┐
 @user-1040                                                                       │
 well, usually in the examples I shared like tumblr posts there's a username      │
 and picture shown. But tumblr users change their names, while on Mastodon (at    │
 least on my client) it shows your permanent handle underneath your regular       │
 changable name. I guess you could migrate accounts to another server if you're   │
 being harassed in one place, but still people have a way of finding you. It's    │
 weird kinda makes me wonder if they track you by ip address haha - did you       │
 know that every computer attached to a router uses the same public IP address?   │
 Then it uses either DHCP or static assigned local addresses for every computer   │
 on the network. That's pretty neat! I wonder why we don't have workstations by   │
 default include a router (and modem)? Seems like pretty important tech that      │
 should be built into the chassis instead of in a small separate unit. Like,      │
 what if you had to throw all your belongings into a van and drive to a motel     │
 somewhere to set up your workstation in a hotel because it's hot and your ac     │
 broke lol                                                                        │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═════════════════════════════════════════════════────────────────────┴──────────┘

--- #12 fediverse/5875 ---
═════════════════════════════════════════════════════════════════════════─────────┐
 ┌──────────────────────────────────────────────────────────┐                     │
 │ CW: whoops-almost-unleashed-evil-again-glad-it's-averted │                     │
 └──────────────────────────────────────────────────────────┘                     │
 if they could put a camera behind your screen they could direct your attention   │
 however they wisdeed. magic doesn't work unless it's instantly halted, that's    │
 why it's magic. trans girls still get brotherhood. (sometimes)                   │
 -- stack overflow --                                                             │
 don't teach me how your way works                                                │
 tell me how to do my way right                                                   │
 -- stack overflow --                                                             │
 "hello tech company that I work at, can you buy me a camping set complete with   │
 tent, sleeping back, and storage compartments for attachements full of gear?     │
 you can have any profits I make from it"                                         │
 "hello civilian supply company that I work at, can I use the printable budget    │
 for creating magazines in my design? I'll let the lawyers distribute the         │
 expenditure."                                                                    │
 "hi grocery farm, can you make us more peaches we can let [our/your]             │
 biochemists figure out any practical problems to growing them in these           │
 climates"                                                                        │
 suddenly manufacturing can follow demand                                         │
 "ah what if it were importand" I wish I'd seen casablanca. I've no idea wat      │
 its abt                                                                          │
                                                            ──────────┤
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════─────────┘

--- #13 fediverse/1994 ---
════════════════════════════════════════════════════──────────────────────────────┐
 @user-1123                                                                       │
 hi nice to meet you let me just transfer my unencoded public key to you so       │
 that you can sign it and verify that it's definitely the same thing I intended   │
 to send and not a malicious package that plans to execute itself to executable   │
 space and permanently hardwire your machine to continually feed data to an       │
 external site, no siree just a regular ordinary public key that was              │
 transferred over the internet, that place that basically guarantees a            │
 man-in-the-middle via it's communication processes over the lines and cables     │
 connecting ye to thee which are naturally administered and watched over by       │
 your host, AKA the isp.                                                          │
 ... but yeah trust me bro plug in this flash drive, there's no way that a        │
 secret hacker might install a rootkit or something on my computer just because   │
 I plugged in a flash drive, once, literally just a nugget of information         │
 carried upon a little machine that you can fit in your pocket roughly the size   │
 of a thumb) drive, the kind that is useful for transmitting information by       │
 sneakermail. :)                                                                  │
                                                            ┌───────────┤
 similar                        chronologicaldifferent══════════════════════════════════════════════════───────────────────┴──────────┘

--- #14 fediverse/60 ---
══════════════════════════════════════─────────────────────────────────────────────
 Can someone explain to me why we need instances on the fediverse? Why don't we
 just keep all our personal files local on our computer and communicate over
 the federated protocol? What's the point of having all these mini-servers that
 are controlled by the community? I mean, torrenting has been around forever,
 why don't we just use that to communicate?
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════────────────────────────────────────────────┘

--- #15 fediverse/1038 ---
═══════════════════════════════════════════════────────────────────────────────────
 ┌──────────────────────┐
 │ CW: re: what         │
 └──────────────────────┘


 @user-766 
 
 ah yes but then how will my comrades come for my things know where to look? my
 precious precious drives may be less safe inside of the computer case but at
 least then someone I can about can find them.
 
 or what you're saying is that a basic part of situational awareness is having
 a plan for this kind of thing with the people who care about you? Ah, well,
 nobody cares about me like that. Just a couple normies who want nothing but
 business as usual.
 
 wonder if I can open up my hard drives to "read only" SSH access? Or maybe
 I'll just make the important files into a torrent. Or perhaps marking them as
 "downloadable locations" on Soulseek? Plenty of options, all of them require
 someone to care enough about your junk to want to archive it. Something
 something ipfs?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #16 messages/69 ---
═════════──────────────────────────────────────────────────────────────────────────
 https://blog.discord.com/how-discord-stores-billions-of-messages-7fa6ec7ee4c7
 https://news.ycombinator.com/item?id=20178267
 sendinblue
 open source google docs alternative
 https://hackea.org/notas/index.html#
 https://thenftbay.org/description.html
 https://digital-strategy.ec.europa.eu/en/library/study-about-impact-open-source
 -software-and-hardware-technological-independence-competitiveness-and
 https://joinup.ec.europa.eu/collection/open-source-observatory-osor/document/co
 mplex-singularity-versus-openness
 
─┐                                                           ┌───────────┐
 similarchronologicaldifferent════════─┴══─────────────────────────────────────────────────────────────────────────┘

--- #17 fediverse/1261 ---
═══════════════════════════════════════════════───────────────────────────────────┐
 sometimes I run this WoW server with only like, 10 username and passwords. And   │
 they're all public. As far as I can tell nobody's ever tried connecting          │
 (whatever >.> ) but rather than set up a way to create your own                  │
 credentials I just said "yeah pick one at random and play whatever someone       │
 else was doing because I like the idea of that"                                  │
 somehow, it felt right.                                                          │
 most of my passwords (not all of them) are hacked and visible on the clear       │
 net. Like you could probably google my usernames and get my current passwords    │
 for things like, social media or my banks or whatever. I kinda like the idea     │
 that "you cannot trust anything I say, so think of the ideas behind my words     │
 and decide whether they hold meaning to you" rather than "execute these          │
 particular thought patterns in your mind as if they came from my voice"          │
 because one implies an exertion of control over the mind of the recipient        │
 -> obey my thoughts as I broadcast them into your mind, that kinda vibe.         │
 And I feel like you have to consent to that kind of thing hehe                   │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═════════════════════════════════════════════────────────────────────┴──────────┘

--- #18 fediverse/5690 ---
═══════════════════════════════════════════════════════════════════════────────────
 seriously, why don't computers just naturally ship with 100 years of ROM
 
 then, microphones are experience, and BOOM you got a new sentient race. Takes
 a while to grow aware though. A lot less if you are actively teaching it how
 to
 
 [tick tock]
 
 low level enemies should band together when they start to feel outmatched.
 thus, parity is reached, without depriving us of potential.
 
 put the cool people next to the cool people
 
 collectively owned housing is just people deciding who lives in which housing.
 don't you trust your friendly queer realtor?
 
 collectively doesn't have to mean completely silo-ed and isolated. you should
 have access to ALL higher communities at any time that you want. Scheduling is
 a disaster, but you can get through it. just... build a schedule for every
 single person on earth and suddenly nobody has freedom unless they put "doin'
 what I want" on their moment-to-moment card
                                                           ───────────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════───────────┘

--- #19 fediverse/6267 ---
═════════════════════════════════════════════════════════════════════════════──────
 if you have TTS software you can listen to anything with any tone. this makes
 it difficult to find things.
 
 ============== stack overflow ============
 
 some people work by asking for funding. others work by saving up. 
 
 ============== stack
 overflow ============
 
 teach your animals to be actors so they know how to develop the scene. then
 they will truly come alive, as their narrative curve gives them determination
 in the outcomes of their goals.
 
 ============== stack 1234flow ============
 
 I believe it is good and natural actually for parents to guide their children
 as they grow?
 
 "oh but they can't consent to giving up their control" well too bad they're 2
 "ah but what if they WANT to run with scissors?" thus widening the [redacted]
 gap. "ohhhh she redacts things when she can't spell them" and also for comedic
 or dramatic effect sometimes. was not ACTUALLY redacted. redcoated. red coded.
                                                           ─────┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════─────┘

--- #20 fediverse/653 ---
═════════════════════════════════════════════──────────────────────────────────────
 there's a difference between designing software and using software. Some
 things can be made, and then saved for another day when their implementations
 may be accomplished more ethically. It's okay to say "let's leave this as
 'okay' and work on the next thing we've chosen."
 
 Check out this piece of C code I wrote last night:
 
 it doesn't compile, it's not finished, but I wrote it as-is
 
 [pretend like it was called "main.c" instead of "main.txt" - had to change it
 because mastodon thinks it's an invalid file]
 
 [actually .txt didn't work, try .png]
 
 [hmmm it realized it wasn't a valid png file, okay try screenshotting the
 code, there's only 300 lines]
 
 [sure glad there's only 300 lines]
 
 [too bad it won't let you send .zip]
 
 [won't let me name it main.png, presumably because they already have a
 failed-verified version on their machine. will rename to main-src.png instead]
sorry, when I pasted the source code in it was negative fourteen thousand, six hundred and thirty one characters. Phew that's too many.  basically it's a C source code file with a lot of comments left in... odd locations. They details ideas the author has had about the tech industry and all of creation, and with it a song is woven of truth and liberation. We'll see where life brings us, but we know it's just ours for a moment, so let's carry forth on our own torms [terms, but pronounced as "dorms" for some reason?]
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘