=== ANCHOR POEM ===
═══════════════════════════════════════════════════════════════════════────────────
 @user-138 
 
 you can use a username now. They added that functionality recently.
 
 it's supposedly more encrypted or something. But, it's still a centralized
 point of failure. If you want to say something privately, pretend like you're
 ordering drugs on the dark web and use PGP encryption or SSH keys or whatever
 it says in the "how to order drugs on the dark web" guides.
                                                           ───────────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════───────────┘

=== SIMILARITY RANKED ===

--- #1 fediverse/3469 ---
═════════════════════════════════════════════════════════──────────────────────────
 you know how SSH password login is deprecated because the password needs to be
 transmitted in cleartext or whatever?
 
 what if we just... required two passwords?
 
 the first initiates the conversation, and sets up an encrypted line. It
 doesn't matter if anyone sees the first password because they'll get a new set
 of encrypted keys, meaning each session automatically is encrypted in a
 different, randomized way.
 
 the second password is the one that actually authenticates you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #2 fediverse/1862 ---
═════════════════════════════════════════════════════─────────────────────────────┐
 some people look for signals or signs before doing something. Try and have       │
 someone in your life who can give you signals or signs so that you know when     │
 to do things. And ideally, if they're more hardcore than you, you'll know what   │
 to do, not just when to do it.                                                   │
 did you know that anything on the internet can be read by at least one other     │
 person besides your intended recipient? There's no way they'd let us talk        │
 amongst ourselves otherwise.                                                     │
 I think encryption is pretty neat, all you have to do is run a shell script on   │
 some text, then send that text over the internet. If you want to decrypt it,     │
 all you have to do is run a shell script on it to decrypt it.                    │
 downside is, it has to be translated into plain text somewhere along the         │
 line... Maybe if we rendered the words not as text that can be read from         │
 memory, but as like, brush-strokes that can have a randomized order, but still   │
 present to the user as visual text? anyway that's what's on my mind as I try     │
 and improvise a baking recipe with yeast, flour, and butter                      │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═══════════════════════════════════════════════════──────────────────┴──────────┘

--- #3 fediverse/2252 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌──────────────────────┐
 │ CW: tech-encryption  │
 └──────────────────────┘


 users don't want to have to think about encryption keys.
 
 they should be available for them if they need them, in like... a folder or
 something somewhere, but they don't need to really know that they exist.
 
 more friction like that keeps people away from being secure.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #4 messages/635 ---
═════════════════════════════════════════════════════════════──────────────────────
 Yeah, sure, signal is encrypted, but they could just put a virus on your
 miniature pocket tv that streams your screen into a text recognition bot which
 streams that text into an LLM trained to report on suspicious seditious
 activity.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════─────────────────────┘

--- #5 fediverse/1693 ---
═════════════════════════════════════════════════════──────────────────────────────
 "if I work on the TTY then they can't forward my X session without my consent"
 
 - ramblings of the utterly deranged
 
 as if they couldn't just look at your unencrypted source-code as you save it
 to your hard drive smh
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #6 fediverse/3470 ---
═════════════════════════════════════════════════════════──────────────────────────
 alternatively, when you initiate an SSH session it sends you a randomized
 public key whose private key is the password that you need to login. By
 decrypting the string of text it sent you and sending it back (plus the
 password at the end or whatever) you can ensure secure authentication without
 bothering with the passwordless keys which are wayyyyyy more trouble than
 they're worth and lack the "something you know" authentication method.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #7 fediverse/624 ---
══════════════════════════════════════════════─────────────────────────────────────
 You know, there's no guarantee that Youtube or Gmail has to show you the EXACT
 SAME video or message that your friend shared with you. Or did they even share
 it at all? So hard to tell when they know all the communication you've ever
 had, because you only know each other online on their platforms, [read: US
 government observed platforms] [like, HTTPS] surely there's no room for
 someone to sneak in and edit your conversations. Surely the only way to
 securely communicate is to send pure PGP encrypted bytes to another target,
 wrapped in a TCP/IP header, with unknown intent or expression. Worst they
 could do then is just, y'know, block it entirely.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #8 fediverse/4946 ---
══════════════════════════════════════════════════════════════════─────────────────
 I would trust the CIA if they gave me continual access to all surveillance of
 myself
 
 -- stack overflow --
 
 what if you made a program which cycled credentials?
 
 like... "give me a random credential for Zoom" because we share all of our
 digital resources
 
 did you get banned for account sharing? no you didn't because you routed
 through the correct VPN
 
 automagically
 
 [has never had a software job]
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════────────────────┘

--- #9 fediverse/884 ---
═══════════════════════════════════════════════────────────────────────────────────
 ┌──────────────────────────────────────────────────────┐
 │ CW: completely-unfounded-no-evidence-mis-information │
 └──────────────────────────────────────────────────────┘


 If we make a law that says you can't sell user data, they'll just build an
 intentional vulnerability into their system and point it out to specific
 people who paid under the table. Then, when they get "hacked", they'll surely
 be ashamed and sorry to their users, but hey the data's out there now not like
 they can take it back. Oh don't worry we already patched the hole in our
 security, that way nobody can get in through the same door that was
 intentionally left open for very particular people who've paid, and not for
 the people who haven't paid yet, who are still waiting patiently for a door to
 be built for them.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #10 fediverse_boost/3948 ---
◀─[BOOST]
  
  There is no such thing as a backdoor for good guys. Once you place a backdoor, you compromise the safety and privacy of all your users. A third party or bad guys will get access to it and abuse it further. The concept of a "backdoor for good guys" is fundamentally flawed and dangerous. It sets a dangerous precedent. Security and privacy should be absolute. There's no safe way to create a backdoor that can't be exploited by malicious actors. #privacy #security #infosec  
  
                                                            
 similar                        chronological                        different 
─▶

--- #11 fediverse/2200 ---
══════════════════════════════════════════════════════─────────────────────────────
 I love D&D books with lots and lots of randomized tables because you can,
 in a pinch, use them as code-books for encrypting text using a method that
 nobody will ever guess. Well, as long as you have two of them, one to give to
 your friend and one to keep yourself.
 
 This is a form of "symmetric encryption", where you each have a copy of the
 input/output tables. More secure is the private/public key style encryption,
 but good luck explaining that to a 14 year old. Plus you can't do it over a
 radio, you need a computer.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #12 fediverse/482 ---
══════════════════════════════════════════════─────────────────────────────────────
 @user-246 
 
 You're absolutely right. It's easy to think of the internet as this
 encapsulated entity "the world", but really it's "the people whose computers
 are physically connected to your computer using a limited and tangible piece
 of infrastructure comprised of copper wires that are laid between the
 router/switch that connects to your computer... and the internet service
 provider which directs your traffic. Then it probably goes through some cables
 under the ocean or whatever, and eventually after traversing many
 indeterminate passthrough locations eventually arrives at the computing
 infrastructure that comprises the access point that another person (presumably
 in another country) uses to express their thoughts toward you (the person who
 sent the original message) in the hopes that you might one day correspond.
 
 I mean... That's a lot of points of failure. I sure hope that we can sustain
 such connection, in the face of [redacted, whichever circumstances may come in
 the near future]
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #13 fediverse/3407 ---
═════════════════════════════════════════════════════════──────────────────────────
 @user-1218 
 
 there's only a password so that if the zip archive is displaced from it's
 context it's harder to read.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #14 messages/1245 ---
══════════════════════════════════════════════════════════════════════════════════─
 BRB, if you want to talk to yourselfs, I recommend opening a port in your
 router and exchanging HTTP packets that create messages on each other's
 computers. Can be done in a couple hundred lines of C code that can be 90%
 premade or auto-generated. Then, once it's made, you don't have to think about
 it again because it's so simple. It's not trying to scale, it's just...
 designed for a small, focused, human oriented mindset.\
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #15 messages/329 ---
════════════════════════════════════════════════════───────────────────────────────
 LLM training data that's been encrypted in such a way that it preserves
 symantic meaning, while also allowing for secrecy and unique customization
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════──────────────────────────────┘

--- #16 messages/181 ---
═══════════════════════════════════════════════────────────────────────────────────
 I know you don't want to hear this, but there is a chance that there will come
 a time where your life depends on your ability to debug a computer without the
 internet. To set up an SSH server. To install Linux. To program in C. To do
 something else that I'm not prepared for... If StackOverflow didn't exist
 because network connectivity has been lost, could you remember syntax? Maybe
 it's a good idea to set up a local LLM that can answer basic questions about
 technology. Maybe it's a good idea to set up on your parents computer, just in
 case you have to hide out there for a couple months. Maybe it's a good idea to
 download wikipedia, just in case.
 
 If I need to use a mac, I'm screwed
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #17 fediverse/1113 ---
════════════════════════════════════════════════───────────────────────────────────
 we should be able to configure our web browsers so that they don't remember to
 autofill certain pieces of information. Such as the IP address of our router,
 or our bank credentials, or any other forms of passwords that we are using to
 authenticate ourselves. That way our infrastructure that we've designed is
 less susceptible to cybersecurity threats that involve physical access to the
 computer. Or remote control of some kind that is channeled through the UI
 (like RDP or SSH) (a terminal is a text based UI in this context)
 
 Unless of course they knew what they were doing. Which most of them don't.
 Hence why it'd be a good idea to isolate the capabilities of defeating certain
 vulnerabilities to ourselves. Like, a reverse backdoor, only more like a DMZ -
 a sector of computing space (sandboxed of course) that is only utilized for
 understanding the intent of the message sender.
 
 Doing so would require an analysis of the capabilities of the system, the kind
 of analysis that [script kiddies'dve] generated by googl
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #18 fediverse/4356 ---
═════════════════════════════════════════════════════════════──────────────────────
 ┌──────────────────────────────────────────────────────────────────────────────┐
 │ CW: don't-even-get-me-started-on-people-who-don't-lock-their-phone-with-at-least-a-pin │
 └──────────────────────────────────────────────────────────────────────────────┘


 if they can't get into your phone, they can at least record all of the
 received notifications.
 
 meaning they already know who it is that you know...
 
 without having to find people that are distant or unrelated
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════─────────────────────┘

--- #19 fediverse/4194 ---
════════════════════════════════════════════════════════════───────────────────────
 I guess I'm used to messaging applications where it's expected that you'll
 send what you're typing after every complete thought
 
 giving people space to return their own completed trains of... "thought" but
 without saying "thought" again because I just said it at the end of the
 previous... sentence? paragraph? idk anymore it feels weird to post like this
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #20 fediverse/6119 ---
═════════════════════════════════════════════════════════════════════════════──────
 what's the point of using a password manager if they're just going to 2FA your
 ass anyway?
 
 oh right, so google knows whenever someone signs into obscure-porn-site.com or
 radical-chemistry-and-explosives.net or
 cheap-hot-anime-gunpla-fast-xoxo.itch.io or whatever the kids are buying these
 days
                                                           ─────┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════─────┘

--- #21 fediverse/3471 ---
═════════════════════════════════════════════════════════──────────────────────────
 @user-883 
 
 it might be, I don't know much about it (hence why I'm asking questions) but I
 have heard that ssh keys are more secure than password authentication and it
 never made sense to me. If availability is important for security purposes,
 then wouldn't SSH keys (which are much more difficult to carry around than a
 password) be less suitable?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #22 fediverse/1310 ---
═════════════════════════════════════════════════──────────────────────────────────
 that feeling when you type your password so fast that one hand is faster than
 the other and the letters get all jumbled and now you have to remake your ssh
 key -.-
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #23 fediverse/5913 ---
════════════════════════════════════════════════════════════════════════════───────
 Did you know that any wifi chip can be used as both a sender and a receiver?
 how do you think you'd get data in and out of the device?
 
 trick is... you don't actually need a router. How fun is that!
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #24 fediverse/1261 ---
════════════════════════════════════════════════──────────────────────────────────┐
 sometimes I run this WoW server with only like, 10 username and passwords. And   │
 they're all public. As far as I can tell nobody's ever tried connecting          │
 (whatever >.> ) but rather than set up a way to create your own                  │
 credentials I just said "yeah pick one at random and play whatever someone       │
 else was doing because I like the idea of that"                                  │
 somehow, it felt right.                                                          │
 most of my passwords (not all of them) are hacked and visible on the clear       │
 net. Like you could probably google my usernames and get my current passwords    │
 for things like, social media or my banks or whatever. I kinda like the idea     │
 that "you cannot trust anything I say, so think of the ideas behind my words     │
 and decide whether they hold meaning to you" rather than "execute these          │
 particular thought patterns in your mind as if they came from my voice"          │
 because one implies an exertion of control over the mind of the recipient        │
 -> obey my thoughts as I broadcast them into your mind, that kinda vibe.         │
 And I feel like you have to consent to that kind of thing hehe                   │
                                                            ┌───────────┤
 similar                        chronologicaldifferent══════════════════════════════════════════════───────────────────────┴──────────┘

--- #25 messages/1247 ---
══════════════════════════════════════════════════════════════════════════════════─
 you can even design it as you go, making it do slightly adjacent uses in
 addition to what it currently does. for example:
 https://github.com/gabrilend/r-mail is a reference implementation with some
 ideas for how to design some specific parts. make sure you go through it
 yourself though, so you understand how it works. don't worry, the source-code
 files are numbered like the table of contents [chamber of commerce] in a story
 or book.
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #26 fediverse/6347 ---
═══════════════════════════════════════════════════════════════════════════════────
 ┌──────────────────────┐
 │ CW: llms-mentioned   │
 └──────────────────────┘


 if you want to encrypt something from human readers, randomize the position of
 all the words on the page.
 
 an LLM can decrypt it, but a human walking past could not. Unless they had a
 camera or something in their lapel, transmitting to a remote calculating
 location in a system that decyphers it cyberpunk hacking style.
 
 ah, but if it didn't have the right training data .claude.md file, then it
 wouldn't know how to decrypt it, because you forgot to include "respond with a
 marxist analysis" in the .claude.md which serves as a decryption key. Simply
 analyze the rest and decide if it matches what you set out to request it for.
 
 [you got lost at the end]
                                                           ───┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════════───┘

--- #27 fediverse/235 ---
════════════════════════════════════════════───────────────────────────────────────
 ┌──────────────────────┐
 │ CW: re: horror       │
 └──────────────────────┘


 @user-192 there's a fine line between inoculating yourself to fear (like a
 person taking small doses of poison to build up a resistance) and giving your
 mind extra ammunition to use against you when the real terrors find you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════──────────────────────────────────────┘

--- #28 fediverse_boost/6270 ---
◀─[BOOST]
  
  I am once again begging people to understand that “the government” already knows you’re queer whether you do elaborate online opsec dance rituals or not, and if they decide to just start shooting people for being gay, they’ll do it whether the evidence is airtight or not. is that grim? yes. but you can stop giving yourself undercover superhero identity PTSD about it  
  
                                                            
 similar                        chronological                        different 
─▶

--- #29 fediverse/1247 ---
════════════════════════════════════════════════───────────────────────────────────
 so wait is there any guarantee that the "releases" on github actually have the
 same code as that which is in the repository? Or could they just... put their
 own binary, with it's own strange rules and vulnerabilities, or am I just
 fearmongering?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #30 fediverse/4301 ---
════════════════════════════════════════════════════════════───────────────────────
 @user-1655 
 
 maybe the user could tell their client what fields to expect and how to
 present them (like, a field called "memes" would be presented as a picture in
 this panel, a field called "rants" would be passed to a word-cloud function
 that extracts the most common 6+ letter words so you can tell at a glance what
 the rant is about, this other field could be for calendar invites (plain text
 of course, but interpreted by the calendar program) etc)
 
 plus, if it's encrypted with PGP keys by default, there'd be few security
 concerns. Unless your friend got hacked, or you got hacked, but, well... make
 sure everything's sandboxed and don't do any remote code execution and you're
 good, right?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #31 fediverse/5065 ---
════════════════════════════════════════════════════════════════════───────────────
 ┌────────────────────────────────────────────┐
 │ CW: strange-ideas-about-software-mentioned │
 └────────────────────────────────────────────┘


 software should have 3, maybe 4 or 5 maintained releases imo
 
 for adding security improvements and whatnot
 
 then people wouldn't complain about updates
 
 because they wouldn't feel like they were being left behind (after expressing
 their differences (of opinion and such))
 
 I think that'd uh maintain them as, I guess, userbase optics parallelograms?
 oh sorry we're on rhomboids this week - right, and no I won't forget the
 differences in creed, all things are received equally...d.
 
 uh-huh yeah no that makes sense. gotcha. okay see you at the location. have
 fun with your demarketion. what if we played games with swords but like,
 
 the peril of steam is that you can't decline to update. meaning if a
 corporation wants to break an old game and it's collectively hosted servers...
 all it has to do is push an update that disables them. suddenly nobody has
 room to do, and the whole
 
 -- stack overflow --
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════════──────────────┘

--- #32 fediverse_boost/3867 ---
◀─[BOOST]
  
  I really hate "two factor" auth.  Like, cool, I get it, it let's you pretend you can divest responsibility for security and recovery, but also it means dropping my phone too hard could be a life disrupting event so somehow I don't really feel like this is for my benefit.  
  
                                                            
 similar                        chronological                        different 
─▶

--- #33 fediverse/2423 ---
═══════════════════════════════════════════════════════────────────────────────────
 does anyone know of any fedi software that lets you link to a particular post
 and read forward on a person's timeline from there? Or back I guess, but
 chronological viewing specifically.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #34 fediverse/874 ---
═══════════════════════════════════════════════────────────────────────────────────
 oh yeah well if SSH keys are so secure then why doesn't every website on Earth
 require them
 
 really though why doesn't every website on Earth require them
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #35 fediverse/4930 ---
═════════════════════════════════════════════════════════════════──────────────────
 hi does anyone know of an app that non tech people could use that's like
 "signal but organized like discord" with channels and threads and such?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════─────────────────┘

--- #36 fediverse/1587 ---
════════════════════════════════════════════════════───────────────────────────────
 @user-883 
 
 If we lived in a sane world, the internet would operate on standards. And
 yet... Well, that's not entirely true, we have HTTP and HTML and all the
 security risks that Javascripts entails... Well, here's hoping the future can
 figure out what exactly's important aside from profit and ease-of-development.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════──────────────────────────────┘

--- #37 fediverse/767 ---
═══════════════════════════════════════════════────────────────────────────────────
 @user-192 @user-570 
 
 clearly the positive addresses point toward a location in "memory", while the
 negative values point toward "forgotten" which is a secret second place that
 they don't want you to know about.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #38 messages/765 ---
═══════════════════════════════════════════════════════════════════────────────────
 you don't have to write poetry to write notes. The poetics are just practice
 for when secrecy is intended.
 
 OR IS IT THE REAL THING? who can say.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════════════───────────────┘

--- #39 fediverse/918 ---
═══════════════════════════════════════════════───────────────────────────────────┐
 ┌──────────────────────┐                                                         │
 │ CW: scary-curse      │                                                         │
 └──────────────────────┘                                                         │
 if the government/the nsa/ an organization had your password, they could         │
 migrate you to another custom instance that was designed to look exactly like    │
 your old one without telling you. You'd still interact with your peeps the       │
 same way as before, but this time it'd run through their server. meaning they    │
 could block certain posts that you were sending, or show others that you         │
 didn't agree with but had your deepfaked approval.                               │
 if something felt off about you, most people would unfriend you. or even         │
 they'd just block you, so that nobody would remember if you're missing.          │
 friends and family are a matter of public record, and who goes to clubs these    │
 days?                                                                            │
 churches are a bygone era, and twitch streams are so individualized. libraries   │
 are nice, but you literally can't talk in there. plus there's only like, one?    │
 what happened to forest clearings, and tops of waterfalls, what happened to      │
 our world? I miss the campfires the most, the smell of burnt wood and cooked     │
 food. I miss the wind in my toes, I miss the                                     │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═════════════════════════════════════════════────────────────────────┴──────────┘

--- #40 fediverse/5977 ---
════════════════════════════════════════════════════════════════════════════───────
 apparently you can use network sockets for inter-process communication if you
 just set the network to your home and the ports that are set to the defaults
 that people who know what software you use will know to listen on when they've
 hacked any single device on your network. good thing that data is with the
 router, right?
 
 what if there was a stop before leaving the computer?
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #41 fediverse/3351 ---
════════════════════════════════════════════════════════───────────────────────────
 privacy doesn't mean anything on the internet to me because privacy on the
 internet doesn't mean anything to "them"
 
 gestures vaguely, maybe winks once or twice and/or presents an emphasis face
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #42 fediverse/4906 ---
═════════════════════════════════════════════════════════════════──────────────────
 @user-763 
 
 use the gameboy as a database
 
 there's a 0 percent chance that any network spy guys would be able to see
 what's stored on a gameboy cartridge. truly the most remote of classes of
 places.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════─────────────────┘

--- #43 fediverse/3234 ---
════════════════════════════════════════════════════════──────────────────────────┐
 ┌────────────────────────────────────────────────────────────────┐               │
 │ CW: ritz-is-fucking-stupid-I-guess-oh-whoops-cursing-mentioned │               │
 └────────────────────────────────────────────────────────────────┘               │
 my understanding is that anyone with my IP address could make my heart bleed     │
 due to a hardware vulnerability on my motherboard. Though you might have to      │
 get past my decrepit ancient linksys EA 3500 router from 2012 first.             │
 unrelated, but does anyone want my IP address? I don't have any remote           │
 backups, so if you hate me now would be a great time to show me how despised I   │
 am. Alternatively you could try searching for anything evil to ensure that I     │
 can be trusted. You're gonna find mostly video games and source-code that I      │
 didn't write though. But also all my notes in directories that are               │
 non-standard, meaning you'll have to look around a bit. I leave little notes     │
 everywhere I go, so that I can remind myself how to do things in the             │
 directories I revisit months later. It's so weird how sometimes the things I     │
 wrote stop working after a while even if I didn't update my system lmao          │
 what is it with artists and self-immolation? "I never thought I'd actually di    │
                                                            ┌───────────┤
 similar                        chronologicaldifferent══════════════════════════════════════════════════════───────────────┴──────────┘

--- #44 fediverse/5374 ---
═══════════════════════════════════════════════════════════════════════────────────
 @user-138 
 
 me neither... guess it's in-person for me.
 
 [a mysterious "they" then proceeds to set up microphones everywhere I might go]
 
 ah nuts why are all these people carrying phones around
 
 [they already know who I am, and I don't really want to be someone else, so]
                                                           ───────────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════───────────┘

--- #45 fediverse/6271 ---
══════════════════════════════════════════════════════════════════════════════─────
 ┌───────────────────────────────────────────────────────┐
 │ CW: re: hypothetical worst case fascism reality check │
 └───────────────────────────────────────────────────────┘


 @user-641 
 
 it's practice. you never know when you might need to blend in. really it's
 just useful as discipline, good practice to be in. I think it's okay if we
 reduce our own functionality? actually? sometimes it's good to use different
 email clients. hey do you know how to mathematically encrypt things well
 neither do I because the designers of the computer system decided that wasn't
 a very common usecase I guess.. jmean it's not like they'd spend all that
 computer resources [THEY'RE SO FAST] on thinking about correlations in your
 predicted pathway narratively through life. "ah help I'm in a psyop" haha yeah
 we do those all the time "so uhhhh I guess we'll just talk to people and see
 how they do?" wow okay it's sure nice to be part of a civil government, I
 think we can find our way to the lumber producers just fine thank you very
 much.
 
 ... oops sorry, a baby did electronics arts (challenge everything) I'm a
 little silly don't mind me brb I gotta go see~
 it's practice. you never know when you might need to blend in. really it's just useful as discipline, good practice to be in. I think it's okay if we reduce our own functionality? actually? sometimes it's good to use different email clients. hey do you know how to mathematically encrypt things well neither do I because the designers of the computer system decided that wasn't a very common usecase I guess.. jmean it's not like they'd spend all that computer resources [THEY'RE SO FAST] on thinking about correlations in your predicted pathway narratively through life. "ah help I'm in a psyop" haha yeah we do those all the time "so uhhhh I guess we'll just talk to people and see how they do?" wow okay it's sure nice to be part of a civil government, I think we can find our way to the lumber producers just fine thank you very much.  *... oops sorry, a baby did electronics arts (challenge everything) I'm a little silly don't mind me brb I gotta go see~*
                                                           ────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════────┘

--- #46 fediverse/497 ---
══════════════════════════════════════════════─────────────────────────────────────
 @user-346 
 
 Nobody will get past the login screen on my computer, but if they do they
 probably won't know that you need to push alt+p in DWM to start a program. But
 even if they push "alt+p firefox" they will only have access to my gmail and
 discord, because those are the only two places I've saved my login information.
 
 Most of my data is on my hard disk anyway, so for that they'd have to push
 alt+enter and then navigate my filesystem to find it. Shouldn't be too hard if
 you're familiar with Linux.
 
 They could always just pull the hard drive and put it into a new computer
 though. It's not like it's encrypted, because why would I encrypt it? I want
 to share information, not conceal it! Surely nobody would desire to exploit
 that vulnerability of mine, that my data should be unencrypted?
 
 If you have a copy of Wikipedia then you're 500% more prepared than 90% of
 humanity so good job _^
 
 Sure would be cool if you put it in the documents folder of every person in
 your family who solicited tech advice from you
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #47 fediverse/6029 ---
════════════════════════════════════════════════════════════════════════════───────
 spilled water on my keyboard by living with a cat. it might be broken so I'm
 using a spare that my girlfriend lent me. if you're wondering why my password
 sounds different...
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #48 fediverse/3313 ---
════════════════════════════════════════════════════════───────────────────────────
 what if it was illegal to add network connectivity to a device that the user
 didn't explicitly request to have network connectivity?
 
 I'm picturing any device being sold going forward to have a little radio
 button with like "add network features (+10$)" and "no networking included
 (+0$)"
 
 boom, no more IoT
 
 no more dishwashers phoning home telemetry
 
 no more consensual privacy invasions desecrations
 
 no more "I thought it was just a polaroid camera why does it have bluetooth
 enabled without broadcasting a pairing request?"
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #49 fediverse/898 ---
═══════════════════════════════════════════════────────────────────────────────────
 ┌──────────────────────┐
 │ CW: scary            │
 └──────────────────────┘


 if you set up a local LLM with the capability to explain basic coding syntax
 and logic, then your parents computer suddenly becomes much more useful to the
 nephew that's been forced to hide out there for a couple weeks until this all
 blows over.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #50 fediverse/4973 ---
═══════════════════════════════════════════════════════════════════────────────────
 okay, uhm, I'm back again because someone told me to forward this to relevant
 people
 
 relevant link so google doesn't have to know that you're all googling the same
 thing at the same time...
 
 http://naeb.brit.org/uses/
Finally, trying to pivot towards Pacific northwestern native perennial plants (and self-seeding annuals) for food, medicine, and material; they're much more adapted to this region as far as sunlight, moisture, bungalow, microbial, avian, insect partner, and soil types are concerned, and that's not only take less work now to instigate and tend, but are much more equipped to handle the fungal infections, droughts, genetic biodiversity collapses, and fluctuating climates that are inbound.  the BRIT ethnobotany database is helpful in that regard, and given that it's based out of Texas and has gynecological herbs, it would be a really good idea for some of the tech queers in our community to duplicate a redundancy of it.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════════════───────────────┘

--- #51 fediverse_boost/4589 ---
◀─[BOOST]
  
  Remember Friends:                                                           
                                                                              
  You cannot both have secure end-to-end encryption to protect your communication AND also have a backdoor/key/access only for "the good guys."   
                                                                              
  This is not possible.                                                       
  Do not believe anyone telling you otherwise.                                
                                                                              
  End-to-end encryption protects us all,                                      
  we must fight to keep it ✊🔒                                                 
                                                                              
  #Privacy #Encryption #E2EE #RootForE2EE                                     
  
                                                            
 similar                        chronological                        different 
─▶

--- #52 fediverse/3671 ---
═════════════════════════════════════════════════════════──────────────────────────
 Phew got SSH working! Turns out it was the fact that the authentication key
 was owned by root instead of ritz. Doh, how could I forget the thing that
 wasn't mentioned anywhere in my search queries.
 
 you didn't search query, you used chatGPT, which is why you were stuck for so
 long
 
 haha oh yeah
 
 ... now I should fix my obs, it won't record video for some reason.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #53 fediverse/2031 ---
══════════════════════════════════════════════════════─────────────────────────────
 @user-1074 
 
 We've always been that way in their eyes. If they make it legal, nothing will
 change in how people think of you. They might be a bit bolder if there's fewer
 legal protections, but laws have always just been words.
 
 There are more of us than there are of them. If you have community, you'll
 feel safer. I know it's scary but we can get through it together.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #54 messages/352 ---
════════════════════════════════════════════════════───────────────────────────────
 Though, of course, can you ever be sure who is who they say they are? You must
 consider all messages anonymous by default, and unencrypted (untrustable) and
 yet impossible to ignore. Like the messages they had to ignore at Bletchley
 Park to avoid the suspicion that they'd figured out the secret code. You know
 how it goes.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════──────────────────────────────┘

--- #55 fediverse/4037 ---
═══════════════════════════════════════════════════════════────────────────────────
 I dream of a home where I don't have to worry about people who might hear the
 noises I make
 
 ... and that includes secret government microphones hidden in the walls, thank
 you very much.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #56 messages/752 ---
══════════════════════════════════════════════════════════════════─────────────────
 techbros really wanted to automate IRC so they didn't have to rely on the
 community knowing and trusting them to remember the commands to make docker
 containers for their react frameworks
 
 and like... yeah I use chatGPT too, because that way I can get what I need
 without bothering anyone (you aren't bothering people who get off on helping
 others when you ask for help)
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════────────────────┘

--- #57 fediverse/2441 ---
═══════════════════════════════════════════════════════────────────────────────────
 if someone on the street asked you, could you point to the nearest power
 station? wastewater treatment plant? hell even a gas-station
 
 if you live in a city, probably not. They put them in fake buildings with
 hollowed out exteriors in order to keep the city looking nice.
 
 these crucial pieces of infrastructure are important to defend. but if you
 don't know which street to turn down, then you might miss them.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #58 fediverse/617 ---
══════════════════════════════════════════════─────────────────────────────────────
 So much of computing is just... handling the quirks of hardware and presenting
 it to the user (programmer) in a way that is sane and makes sense, instead of
 the arcane and [nebulous/confabulous/incomprehensible] way that physical
 nature demands our absurdly potentialized computational endeavors be.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #59 fediverse/581 ---
══════════════════════════════════════════════─────────────────────────────────────
 @user-428 
 
 sometimes I think about how much more productive I'd be if I had a code editor
 that let me draw arrows and smiley faces and such alongside the code. Or if I
 could position things strangely, like two functions side-by-side with boxes
 drawn around them. Or diagrams or flowcharts or graphs or...
 
 something that would output to raw txt format, but would present itself as an
 image that could be edited.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #60 fediverse/1503 ---
═════════════════════════════════════════════════──────────────────────────────────
 ┌─────────────────────────────────────────┐
 │ CW: vague-gesturing-at-paranoia-I-think │
 └─────────────────────────────────────────┘


 part of me kinda wants to be the kind of nerd that writes down the names of
 every file that's permanently stored on my computer so that I can verify in my
 own handwriting or perhaps using a type of code that the files on my computer
 were placed there intentionally and not used to discredit or implicate me in
 something I had no intentions of being associated with
 
 phew idk what that means but surely it's important
 
 something something "file creation dates are just bits to be flipped"
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #61 fediverse/4180 ---
════════════════════════════════════════════════════════════───────────────────────
 @user-1639 
 
 or nobody sees it, because you post the things you say on the internet in 2024
 which is so siloed and echo-chambered that the only people who hear it say
 "tru tho" and "she just like me fr" and never change because of your words
 
 ... wait that's just what you said, but made more specific, isn't it?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #62 messages/770 ---
═══════════════════════════════════════════════════════════════════────────────────
 There are some pieces of software where you think "oh cool, what did they
 update?" and then there are some like "oh god... What did they update?"
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════════════───────────────┘

--- #63 fediverse/2253 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌────────────────────────────┐
 │ CW: tech-social-media-idea │
 └────────────────────────────┘


 social media network that's just a private git repo that downloads all the
 posts / comments / pictures / whatever from your friends and can be viewed in
 a web-browser by navigating the filesystem? people "get" firefox
 
 ideally where everyone mirrors the repo on their own systems, and each person
 gets like 10gb or whatever of space.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #64 fediverse/3895 ---
═══════════════════════════════════════════════════════════────────────────────────
 ┌──────────────────────┐
 │ CW: LLMs-mentioned   │
 └──────────────────────┘


 "don't trust chatGPT, it might hallucinate. Instead you should trust a quick
 google search that brings up a list of 10 (but no more than 10 because google
 doesn't actually search across the whole internet, only the SEO'd garbage that
 they keep because reasons) sources which all either tell conflicting
 information, or if you're unlucky they give information that's wrong,
 outdated, or otherwise just plain false."
 
 okay but chatGPT is trained on that junk, so it's gonna say the same thing
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #65 fediverse/2147 ---
══════════════════════════════════════════════════════─────────────────────────────
 @user-192 
 
 right but it throws into question the idea that what I say is the same as what
 they hear.
 
 Especially if they know our IP addresses are coming from different sides of
 the country.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #66 messages/432 ---
══════════════════════════════════════════════════════─────────────────────────────
 Social media idea: everyone posts short snippets of writing, like tweets, but
 a random one is displayed every day. If you want to see them chronologically,
 you have to pay the author for their writings. And if you want to see more,
 you can spend "tokens" to display another random one for everyone to see that
 day. Each token spent will simply increase the count of "words" (think tweet)
 displayed.
 
 You get one token per day, and they don't carry over from previous days. You
 can also buy them, and any bought tokens that are spent give their value in
 dollars to the author you spend them on.
 
 The data is all local. The servers are all distributed and P2P like torrents.
 Everything is encrypted with keys that cycle every day.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #67 fediverse/34 ---
════════════════════════════════════───────────────────────────────────────────────
 ┌────────────────────────────────────┐
 │ CW: Reddit, Institutional hypnosis │
 └────────────────────────────────────┘


 In light of the drama that's going on at Reddit, I just wanted to add that the
 real reason they're doing this is not money. It's so they don't have to be
 accountable to tools like PushShift that archive the entire site, allowing
 them to change and bend narratives at will.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════──────────────────────────────────────────────┘

--- #68 fediverse/3051 ---
════════════════════════════════════════════════════════───────────────────────────
 @user-1437 @user-1438 
 
 you poor thing, don't delete your toots! don't delete your account! you are
 wanted here, this is the fediverse! it's for all of us.
 
 I personally like cyber-sexual exploitation more than cyber exploitation. I
 wouldn't have thought about it unless you said something. there are a lot of
 ways to exploit someone in a digital medium, and adding "sexual" focuses the
 term to specifically the non-consentual sharing of sexual digital media -
 which is exactly what the term "revenge porn" describes.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #69 fediverse/1246 ---
════════════════════════════════════════════════───────────────────────────────────
 @user-883 
 
 hehe if I don't understand how it works it's difficult for me to use things.
 My Linux friends get so exasperated with me because I'm like "cool script
 gimme like 2 days to figure it out" and they're like "bro just use these
 flags" and I'm like "no"
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #70 fediverse/1718 ---
═════════════════════════════════════════════════════──────────────────────────────
 dear old people - did you know computers don't need to have buttons? You can
 literally just type what you want to make happen (if you know the magic spell)
 and it'll just, do that thing
 
 how cool is that
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #71 fediverse/999 ---
════════════════════════════════════════════════───────────────────────────────────
 ┌───────────────────────────────────────────────────────┐
 │ CW: cursed-curséd-scary-not-real-u-dont-have-to-read │
 └───────────────────────────────────────────────────────┘


 @user-246 @user-473 
 
 there's a part of me that believes magic is real. other parts that are
 convinced. I am a witch, you see, and while I can't quite control fire or
 bullets I can do other neat things. if you'd let me, humanity.
 
 I'm not doing an ARG, not intentionally. I pretty much post things I conceive
 of, like a conduit passed through spacetime. wild how mind bending the future
 can be. will be interesting to see what kinds of things there is in store for
 people you and me.
 
 those websites you posted... they're beautiful - I learned things, your method
 of expression was too [the words "confess" are heard loudly, super weird] I
 especially liked the oven that tries to lure you into a secret third place.
 not the mind, nor the body, but someplace besides.
 
 also the graphs and figures were news to me, I mean how could those numbers
 ever come to be? but alas that's the truth, that we orbit our proof, and alas
 that our meanings are lacking.
 
 [ran out of text]
picture of a saddle shaped graph with a line drawn between the two high points, front and back if it were on an actual horse, but the part where your butt goes. anyway there's text that says "from one gravity well to another" a picture on it's side of one of the graphs posted on the website. I don't quite understand it enough to compare it directly (the math is a bit above my head) but it reminds me of two graphs I made (well, same graph, just with different visualizations) from a few months ago when I was thinking about prime numbers. You might be interested. Here are their links:  https://www.desmos.com/calculator/qljvhpkqzd  and  https://www.desmos.com/calculator/mt6hasfcvm  ... hope you can copy that from there, if not... sorry this one's a doozy. a picture of the "reasons to trust me" graph colored yellow, orange, purple, and blue (in terms of intensity) it looks like a raindrop if it landed on a really tiny blanket and pulled it downward. or like, a person landing on a trampoline that was secured in four locations. anyway the text reads "like four people sharing the weight of an experience with bacchus [referencing the color of the graph], their perspective is pulled just a little bit in that direction, over and across the gap between eyeballs. or rather, between shared perspectives, the point of view of which one bases their experience. their training for the "reasons to trust me" graph.  2, in black and green and red, colors meant to be cool to a 12 year old - "the color doesn't matter... wine? why"  3 dropping down the page, there's a line of "please" written over and over again. it's scary. : ( I'm doing my best I promise, it's hard not to be in a state of unease! I'm working, I promise, this is valuable. you know they'd block me if they didn't like me.  error, 3. that's me, teehee, sorry for making a scene. I promise I'm just an actor, someone who is playing a role. well, alas that were true, I'm really having a mental disorder. Or maybe I'm confused? down here in the subtext it's hard to be choosed. weird how that works, that feeling of being wor [text is cut off, next line]  okay I'm realizing there's no way to get it all in this visual description, here let me continue in a second chapter: visual representation of the conversation I saw and responded to. I think you two are the coolest! heart emojis, flashing passionate excitement brought on by a feeling like you'd get when fangirling over something except like, more low key because I'm in control of my emotions or whatever. gonna put this in a direct message though since it somehow feels... personal? sorry. you can block me if you don't like me. I promise I don't mind. I want to send it to the other person too hope that's cool with you. Just because it was your two conversation and I'm just dropping in because I'm always butting in to public things on the internet. Guess that's just something I picked up on Reddit, where you're encouraged to contribute to the conversation. Though I wish it was easier to view threads on Mastodon, sometimes it feels like it's easy to lose the track of where you were going when the structure of the medium diverts your attention elsewhere. alas, I am not a designer, just a complainer and a whiner I guess. I'm sleepy. sorry to bother you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #72 messages/685 ---
══════════════════════════════════════════════════════════════─────────────────────
 If someone calls you in the middle of the night asking to be let in because
 they need a place to sleep, don't let them in! Unless you know them obvi but
 someone you don't know trying to manipulate you like "please I need some
 shelter" like, babe no, we need to know each other first, it's dark, I'm in my
 pajamas, c'mon.
 
 If it's below freezing then okay, maybe, but... They got themselves into that
 situation
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════────────────────────┘

--- #73 fediverse/2674 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌────────────────────────────────────────────────────────────────────┐
 │ CW: factually-untrue,-that-never-happened.-this-is-just-gesturing. │
 └────────────────────────────────────────────────────────────────────┘


 the kind of friendship where you SSH into each other's systems and leave notes
 for one another.
 
 as soon as you find one you message the person who left it like "yoooo only
 just found this lol" and they're like oooo yeah did you see the bash script I
 wrote in that directory "yeah totally I used it on one of my video files just
 now - cool filter!"
 
 ahhhh reminds me of all the times hackers have hacked my permanently insecure
 system and left me friendly messages like "hey I'm on your side" or "how's
 life, friend? I hope it's going well." or "never forget; you are worth all the
 fear" y'know cute things like that
 
 oh. right. because leaving vulnerabilities like that can lead to threat actors
 affecting your stuff. how lame.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #74 fediverse/3349 ---
════════════════════════════════════════════════════════───────────────────────────
 @user-1074 
 
 my understanding is, if someone wanted to create something like that, they
 should start with writing protocols instead of standards, much the same way
 Activitypub or HTTP are protocols for a free and open internet.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #75 fediverse/545 ---
══════════════════════════════════════════════─────────────────────────────────────
 ┌──────────────────────────────────────────────────────────────────────────────┐
 │ CW: re: PSA: aspublic.org is still active, and still archives + makes searchable all public posts, they have no opt-out, nor do they respect the "Include public posts in search results" setting │
 └──────────────────────────────────────────────────────────────────────────────┘


 @user-391 @user-78 
 
 I see, it seems you know more than me about this topic. It's true that search
 engines don't index emails, but I was thinking more of a "cybersecurity"
 perspective, as in any "sufficiently motivated" individual or organization
 could access your emails should they so desire. And should they be willing to
 (I'm assuming?) break a few laws.
 
 If it can be done, and if it gives information that could be used for
 leverage, then you can be assured that someone will do it. I personally worry
 about people in power who could be blackmailed because their communications
 were more public than they anticipated. Which speaks to the problem mentioned
 in this post of the search-indexing-opt-out functionality being present but
 circumnavigatable. Avoidable? Able to be bypassed? It's an illusion of
 security.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #76 fediverse/836 ---
═══════════════════════════════════════════════────────────────────────────────────
 my question is if my IP has an address then how come my address +1 doesn't
 point to my neighbor
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #77 fediverse/6209 ---
══════════════════════════════════════════════════════════════════════════════─────
 okay just to clarify: if anyone is recording me or storing data about me, I
 would really prefer if you didn't delete it just because I realized it was
 happening. I like data! It's cool to know such things!
                                                           ────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════────┘

--- #78 fediverse/664 ---
══════════════════════════════════════════════─────────────────────────────────────
 @user-482 
 
 [secretly installs a keylogger and doesn't tell anyone upstream but still
 pushes it to production]
 
 [or worse, was told to do as such and given tools to fabricate "evidence" to
 the contrary to everyone else on the team]
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #79 fediverse/3215 ---
════════════════════════════════════════════════════════───────────────────────────
 tell me this: why do Starlink satellites need lights on them at all?
 
 can't they just operate in the dark, as floating hunks of metal sending
 signals to-and-fro?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #80 fediverse/3574 ---
═════════════════════════════════════════════════════════──────────────────────────
 @user-1564 
 
 I love the concept of this! Maybe if HTTP is too complex, you could try
 another simpler server? I don't know the complexity of the programs I use
 every day, but I'm sure there's one that's very simple. Even just a simple IRC
 style chat server that just... sends text from person A to person B depending
 on their username (like a glorified Router or Switch)
 
 Reminded of this video tbh...:
 
 https://www.youtube.com/watch?v=gGfTjKwLQxY
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #81 fediverse/4217 ---
════════════════════════════════════════════════════════════───────────────────────
 ┌────────────────────────┐
 │ CW: politics-mentioned │
 └────────────────────────┘


 people will generally go about their daily lives as if nothing has changed so
 long as nothing for them has changed.
 
 If you want to compel action, their lives must be made different somehow. Even
 if that's just... talking to them outside of the grocery store. A little bit
 can go a long way.
 
 And when they do end up acting, I think you'll find that it's in your favor.
 We're the good guys, after all.
 
 never forget it.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #82 fediverse/5109 ---
════════════════════════════════════════════════════════════════════───────────────
 does anyone know of a website where I can host videos on my neocities that
 isn't youtube? maybe something I can set up on my own server computer at home
 like a file server or something? how do I do that, what should I google, which
 is the easiest and closest to the metal tools I can use? [practical, sensible,
 courageous. these are the adjectives we need.]
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════════──────────────┘

--- #83 messages/411 ---
═════════════════════════════════════════════════════──────────────────────────────
 My favorite thing about chatGPT is that its only useful to people who already
 know what they're doing and just need reminders or clarification about
 specifics.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #84 fediverse/1667 ---
═════════════════════════════════════════════════════──────────────────────────────
 @user-1061 
 
 you just made it right? the same thing happened to me IIRC, I think Neocities
 gives you a boost when you're new because you show up in the "newest" search
 results more plainly. Also, every time you update it you're featured in the
 "recently updated" lists as well.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #85 fediverse/1810 ---
══════════════════════════════════════════════════════─────────────────────────────
 some people hear words like "datastructures" and "object-oriented programming"
 and think they're made up terms that don't mean anything important.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #86 fediverse/3266 ---
════════════════════════════════════════════════════════───────────────────────────
 how many people do you think in the world know that screenshots of a website
 are not admissible proof because they can be trivially doctored by editing the
 html?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #87 fediverse/5961 ---
════════════════════════════════════════════════════════════════════════════───────
 @user-138 
 
 maybe it's evil hackers - idk that's beyond my expertise - good luck : )
 
 (I'd need to see the piece of technology to work on it. I'm a hardware kinda
 [girl, but pronounced guy])
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #88 fediverse/3099 ---
════════════════════════════════════════════════════════───────────────────────────
 people gravitate toward other people who are in different situations but who
 feel the same.
 
 it's not always a bad thing to "talk past each other" - sometimes you just
 want to say how you feel.
 
 then again, if nobody can understand wtf you're talking about, then surely you
 are lost.
 
 all good ideas come at the cost of the second-most-favorable-option.
 
 all good ideas come at the cost of the current destination.
 
 [current, flawed,]
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #89 fediverse/4056 ---
════════════════════════════════════════════════════════════───────────────────────
 teachers didn't want you not using Wikipedia as a source because it might be
 unreliable
 
 The knowledge they might have is good, but that's not the point
 
 they didn't want you to use Wikipedia because they didn't want there to be one
 single repository of information.
 
 If everyone's working with the same kind of training data, nothing new ever
 really gets done
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #90 fediverse/3822 ---
══════════════════════════════════════════════════════════─────────────────────────
 @user-1582 
 
 I think that's what happened, in addition to... whatever this input/output
 error is. No clue what to do about that. Maybe my SD card is dying, I've
 flashed over it like, 10 times now haha 😅
ls: command not found  /bin/ls -bash: /bin/ls: Input/Output error
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════────────────────────────┘

--- #91 fediverse/4044 ---
════════════════════════════════════════════════════════════───────────────────────
 ┌───────────────────────────────┐
 │ CW: re: not about anyone here │
 └───────────────────────────────┘


 @user-1259 
 
 That happens a lot with online people. You can only see one side of them, the
 side they present to the camera, and so it's difficult to find new ways of
 looking at them. Hopefully you can find the brighter sides of this person! I'm
 sure they exist, unless the person is spiralling. Then they'll often be
 pushing themselves first one way, then the next, but both directions point
 down... And that produces the ":(" feeling. Good luck!
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #92 fediverse/5919 ---
════════════════════════════════════════════════════════════════════════════───────
 "but... why?"
 
 portable linux with buttons, great for pick-up-games or communication, can
 throw several in them in a backpack if you want clustered cooperation, they
 work as radios (if the signal reaches) and can transmit text (if you use a
 radial-style keyboard)
 
 [this is all just a pitch for... something, what, you want something? ha
 you'll find no things with me, I know nothing of antifa or whatever]
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #93 fediverse/1609 ---
═════════════════════════════════════════════════════──────────────────────────────
 ┌──────────────────────┐
 │ CW: mh-              │
 └──────────────────────┘


 @user-1043 
 
 I have intrusive thoughts almost constantly that take over my train of thought
 and make it difficult to focus. Like suddenly I'm thinking about something
 completely different, and I realize no, it wasn't suddenly, I actually just
 stood there and thought
 
 and then I think "what was I thinking again?" sometimes when I write these
 strange uncontrollable spirals down it makes poetry. Which is kinda neat I
 guess. Sometimes I just wonder about how DNS can be a singular point of
 failure in our networking infrastructure or whatever haha
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #94 fediverse/5110 ---
════════════════════════════════════════════════════════════════════───────────────
 I'll give ya a hint - encrypt the return IP address WITHIN the packet's data
 package repository area itself, rather than trusting your "router" to return
 it to sender.
 
 YOU DON'T KNOW WHO IS SENDING A PACKET
 
 that's the whole point of udp
 
 (actually udp is when it doesn't matter if it got snatched in transit. Usually
 used for more analog data streams like netflix or hulu prime.)
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════════──────────────┘

--- #95 fediverse/2848 ---
═══════════════════════════════════════════════════════────────────────────────────
 oh btw to the people trying to doxx me there's a picture of me in this
 profile, but you'll have to read a LOT to find it. On the way, see if you pick
 up anything interesting that you agree with. maybe you'll realize that we're
 on the same team, and should be working together.
 
 that's the dream, at least.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #96 messages/420 ---
═════════════════════════════════════════════════════──────────────────────────────
 The ultimate goal of a prophet is to share that which they've learned with
 people who have learned less. Such is the duty of any teacher. Alas, every
 drug you inhale pulls you closer to a world where other people do drugs. Every
 feeling you have, you (collectively) find yourself pulled toward that feeling
 by just that little bit - all things are gravitic, even the thoughts and
 feelings in your mind.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #97 fediverse/3511 ---
═════════════════════════════════════════════════════════──────────────────────────
 @user-579 
 
 I think I remember reading once that you can opt-in to encryption with
 Telegram? But it's kinda pointless unless both parties do so. My understanding
 is that everyone should be using Signal, or if you're really paranoid use PGP
 encryption
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #98 fediverse/2945 ---
═══════════════════════════════════════════════════════────────────────────────────
 my favorite feeling is when I hear my fans running intermittently on my
 computer even though I'm not doing anything and there aren't any new processes
 in my resource manager
 
 like... that feels like a virus, but I'm on Linux, so what do I know right?
 it's probably not somebody deleting all my art. or perhaps just selective
 parts. Backups are a loooooot to manage >.>
 
 ... or even just mining crypto-coins lol, botnets amiright??
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #99 fediverse/737 ---
══════════════════════════════════════════════────────────────────────────────────┐
 by defederating with threads, we've basically made it a place where they can     │
 talk about us, but we can't see what they say about us. Good thing they can't    │
 read this, because we're defederated, and they don't use... hmmmmmm what         │
 mildly ridiculous thing could I put in here, hmmmm how about... OH YEAH they     │
 use GPU accelerated 3d learning algorithms that parse the written information    │
 from publicly accessible data to create a centralized server that routes all     │
 the information.                                                                 │
 Essentially giving the capability to defederate with bots, specifically the      │
 scraping kind.                                                                   │
 However, it'd still be possible, because people could just create an account     │
 there and use the data from that. Unless, of course, the UI was difficult to     │
 navigate and didn't allow for mass-gathering of information.                     │
 Okay heres what you're gonna do, make like a hundred different ecosystems with   │
 randomized avatars where what you say is broadcasted to all of them. Unless      │
 you choose to post in a particular place, in which case only that one can see.   │
 Then                                                                             │
                                                            ┌───────────┤
 similar                        chronologicaldifferent════════════════════════════════════════════─────────────────────────┴──────────┘

--- #100 fediverse/4109 ---
════════════════════════════════════════════════════════════───────────────────────
 ┌──────────────────────┐
 │ CW: AI-mentioned     │
 └──────────────────────┘


 the internet is just AI these days, and if yours isn't then consider yourself
 lucky, but also know that those days are numbered.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #101 fediverse/6120 ---
═════════════════════════════════════════════════════════════════════════════──────
 ┌──────────────────────┐
 │ CW: AI-mentioned     │
 └──────────────────────┘


 it's pretty easy to read an article or blog post, copy the text into a text
 file, and forget about it.
 
 you never know when you might want to use your computer's memories for
 [entertainment during long dark nights, or for creating an AI buddy bot,
 depending on how things go]
                                                           ─────┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════─────┘

--- #102 fediverse/899 ---
═══════════════════════════════════════════════───────────────────────────────────┐
 frankly I'm just excited to see what humanity does with the endlessly            │
 calculated and stored blockchains. Like, that's a good set of pseudo-random      │
 data, I wonder if we could build something off of it that wasn't exclusively     │
 money? like, a necklace, I dunno.                                                │
 or like, a numbers station x2, where each message is accompanied with a          │
 pre-calculated destination somewhere on this endless and                         │
 impossible-to-understand string of data. and that part is what seeds the next    │
 code. once you start reading, certain numbers would be "flags" while others      │
 would be "data" and they'd each have the same size on the hardware. that way,    │
 they're impossible to predict.                                                   │
 ah, but wouldn't it be noticable that certain results seem to appear next to     │
 one another? well, isn't that just cryptology? Could probably be defeated if     │
 you had an AI advanced enough, just saying. something that sorted through        │
 massive mounds of data and gave you results in garbled or broken english. what   │
 a wonderful tool, that's wonderfully mis-abused, perhaps in the fu               │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═════════════════════════════════════════════────────────────────────┴──────────┘

--- #103 fediverse/1713 ---
═════════════════════════════════════════════════════──────────────────────────────
 ┌───────────────────────────┐
 │ CW: re: divination, tarot │
 └───────────────────────────┘


 @user-1071 
 
 like a king who dictates on high, the taller the chair the farther the fall.
 
 how simple is it, when everyone trusts you, to betray the wishes for direction
 they grant upon you. By leveraging their direction to forward your own ends,
 you are depriving them of the liberty to choose their own ends.
 
 how cruel is it! to be the reason for distrust! alas, who can you go to for
 guidance if not anybody you trust?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #104 fediverse/1482 ---
═════════════════════════════════════════════════──────────────────────────────────
 @user-192 
 
 I feel like SSH keys to log into every website should be a standard
 
 or something similar
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #105 fediverse/5314 ---
══════════════════════════════════════════════════════════════════════─────────────
 people are so afraid of defamation lawsuits that they'll refrain from posting
 things like "steam could technically see everything going on on your screen"
 
 what will you say in front of a phone?
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════════────────────┘

--- #106 fediverse/2844 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌─────────────────────────────────────┐
 │ CW: re: politics-violence-mentioned │
 └─────────────────────────────────────┘


 @user-831 
 
 those billionaires are using their money as a weapon to "vote" toward what
 companies they think capitalism would most grow from. Unfortunately for us,
 they often aren't very efficient because they're only looking at what sells.
 
 human interest is not the only factor to optimize for, and yet that's the only
 one they're incentivized to.
 
 kinda makes me think that the only reason to replace them would be to
 institute something that could not be incentivized because it was more
 objective or decentralized.
 
 (the only reason they'd accept)
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #107 fediverse/2900 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌───────────────────────────────────────────────────┐
 │ CW: capitalism-mentioned-AI-dataservers-mentioned │
 └───────────────────────────────────────────────────┘


 what if all the AI advancements they're doing are just them building more
 hardware infrastructure in datacenters and not actually improving the software
 that much
wouldn't that be neat I think it would because it means once they collapse under the weight of their own ambitions that hardware's gotta go somewhere and knowing them they're probably going to ship it to south-east asia to be "recycled" (read: burnt with the metals salvaged) instead of selling them second hand because you know they can't really justify the business expense of selling stuff like that and besides what if some driver or something on the firmware was proprietary do you really want to pay techs to wipe every single thing off of them and plus who's gonna categorize and sort them according to their form and function that's just extra payroll and listen the company's not doing so hot anyway I mean we're literally shutting down but yeah sure we'll find a way to justify spending all that non-existent dosh so some hippies can feel better with their servers they didn't build or justify with their profit-producing capitalist enterprise that we've built with our own two hands well really the hands of everyone else but like, they're not actually doing the building the REAL work of course happens in board rooms like this one where we spend MINUTES and HOURS sometimes discussing how to get things in order and aligned to both of our goals because that's the REAL work that has to happen in order for stuff to get done, you know it's true yeah I thought so anyway what are you doing after this meeting wanna get lunch it's almost quitting time at 2pm
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #108 fediverse/2803 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌─────────────────────────────────────────────────┐
 │ CW: uspol-mentioned-surveillance-state-the-news │
 └─────────────────────────────────────────────────┘


 @user-1201 
 
 I'm a wood fae! they're around, just gotta find 'em 🥰 
 
 (not really I'm just a person with no magical powers whatsoever, no siree
 don't look at mee tehe)
 
 people only have the context of their lives, as any historical precedent that
 once was passed forth to the present by their ancestors and mentors is now
 sharing space with the endless deluge of information from a small glass,
 plastic, and metal box that saps both their attention and the magnitude of
 anything they learn.
 
 "so what if the planets on fire? somehow this actor who had an affair with
 this other actor feels just as important. so what if there's fascism? I just
 heard that whales can't swim in the ocean. oh, the city's burning? that's not
 my burden, and plus it's just as important as these memes which don't make me
 want to scream."
 
 in the same way that some forest fae might have security through obscurity,
 they wield information density against us as a weapon to hide their sins of
 morality.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #109 fediverse/5390 ---
═══════════════════════════════════════════════════════════════════════────────────
 ext4 is not an encryption scheme, even though it seems that way to windows
 users.
                                                           ───────────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════───────────┘

--- #110 fediverse/2764 ---
═══════════════════════════════════════════════════════────────────────────────────
 vim intentionally tricks it's users by making "q" without a semicolon ":" open
 up an input-grabbing menu that can't be gotten out of by pushing ":" semicolon
 or "q". Like... whose idea was that
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #111 fediverse/3593 ---
═════════════════════════════════════════════════════════──────────────────────────
 @user-883 
 
 I feel like you could set up a performance where you walk through your
 workflow on various things and set it to music and make a dope-as-heck music
 video.
 
 like, the "retro" vibes and aesthetics of your posts on my timeline are always
 a joy to see. I can't help but wonder if they could be crystallized /
 essentialized somehow into something neat to watch.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #112 fediverse/2601 ---
═══════════════════════════════════════════════════════────────────────────────────
 @user-249 
 
 you can host anything you'd like on a raspberry pi. If the software
 requirements are within the hardware specs, of course.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #113 fediverse/2884 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌──────────────────────┐
 │ CW: tech-paranoia    │
 └──────────────────────┘


 every time I update my system, it breaks.
 
 kinda makes me think they do that on purpose so that you spend all your time
 up to date and that way they can quickly patch in and out security flaws fast
 enough that nobody notices.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #114 fediverse/3780 ---
══════════════════════════════════════════════════════════─────────────────────────
 "Hey, I'm not actually [username]. We just didn't know if we could trust you,
 so we sent one of our best and boldest, aka me. You seem chill though which is
 why I'm telling you now. My real username is [username], you can message me
 there if you want. Oh and here's an invite to an encrypted IRC server, you can
 google how to connect - post there if you need anything important, otherwise
 just pretend like nothing changed. Anyway I sent this at 4 in the morning so
 that you could respond whenever you wanted. I really enjoyed our conversation
 about [subject] and I know someone who's into [subject] so I could hook you up
 with them if you want.
 
 Welcome to our community, let's [insert goal here] together."
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════────────────────────────┘

--- #115 fediverse/3690 ---
═════════════════════════════════════════════════════════──────────────────────────
 ┌──────────────────────────┐
 │ CW: capitalism-mentioned │
 └──────────────────────────┘


 what if we demanded private servers for video games (by law? what else would
 even work??) and encouraged companies to hire people to make high-quality mods
 for their competitors games so they couldn't make as much money selling
 expansion packs and DLC
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #116 bluesky#27 ---
═════════════════════════════════════════════════════════════════════════════════──
 you can have as many processes running on a computer as you please, just make
 sure they're all named chrome.exe so the user doesn't suspect a thing.
                                                           ─┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════════─┘

--- #117 fediverse/5442 ---
═══════════════════════════════════════════════════════════════════════────────────
 @user-1839 
 
 the trick is to just make it and point people toward it as if it's supposed to
 be there.
                                                           ───────────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════───────────┘

--- #118 fediverse/3826 ---
══════════════════════════════════════════════════════════─────────────────────────
 @user-1600 
 
 you guessed correctly, good job finding me hehe
 
 and yes, I think someone else was using my account. Gonna try and figure out
 what he said.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════────────────────────────┘

--- #119 fediverse/60 ---
═══════════════════════════════════════────────────────────────────────────────────
 Can someone explain to me why we need instances on the fediverse? Why don't we
 just keep all our personal files local on our computer and communicate over
 the federated protocol? What's the point of having all these mini-servers that
 are controlled by the community? I mean, torrenting has been around forever,
 why don't we just use that to communicate?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════───────────────────────────────────────────┘

--- #120 fediverse/2752 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌──────────────────────┐
 │ CW: police-mentioned │
 └──────────────────────┘


 cops thought "enforcing the law" was their job when really it was "keeping the
 peace"
 
 and like, yeah, sure, laws define how they optimize for
 
 but sometimes the laws are just out of reach.
 
 (though such an impartialized system is also pretty flawed in it's own unique
 ways, like for example the enforcers of the law would be able to apply their
 law selectively, which... would not be great.)
 
 downside is... how do you dissent to those who cannot hear you? you have to
 break things
 
 which is why I believe that breaking things unnecessarily is unethical.
 
 sometimes you have to do a MORE unethical act in the pursuit of your goals,
 however nefarious or not they may be, but as long as they are done in pursuit
 of a greater grander truth, then... the ends justify the means? right?"
 
 ...
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #121 fediverse/2967 ---
═══════════════════════════════════════════════════════────────────────────────────
 @user-138 
 
 "here's how to get caught. don't... don't do the things in these books. also,
 uh... don't do the things that AREN'T in these books, wink"
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #122 fediverse/572 ---
══════════════════════════════════════════════─────────────────────────────────────
 Hi, I'm learning about semaphores right now and trying to explain them to a
 friend. But I only sorta understand how they work - can anyone look at this
 pseudocode and tell me if I'm on the right track?
Some C pseudocode working through the semaphore design pattern. Here's the text of the pseudocode:  /* no lock example */  void start_thread(int* x) {   *x += 1; }  int main() {   int x = 0;   for (1000 times){     start_thread(&x);   }   print(x); }  /* in this case you have no idea what will print because thread A will take x and be like "ah yes it's 423" and then in the next instruction it'll be like "I'll increment this to be 424" and in the next one it'll say "okay now it's time to store 424 in the variable X" but like... there's a thousand threads all doing that at the same time, so odds are you'll have 5 that are like "ah yes this is 423 I'll set it to 424" */  /* not a good plan. Need a lock, so only one thread can use it at once. */ /* mutex example: */  void start_thread(int* x, int* x_mutex) {   *x += 1;   *x_mutex = 0; }  int main() {   int x = 0;   int x_mutex = 0;   for (1000 times){     while (x_mutex != 0){ } /* do nothing */     x_mutex = thread_id;     start_thread(&x, &x_mutex);   }   print(x); }  /* this should print 1000, but it's basically as slow as doing it single threaded. */  #define MAX 10  void start_thread(int* x, int* x_semaphore) {   *x += 1;   *x_semaphore += 1; }  int main() {   int x[MAX];   int x_semaphore = MAX;   for (1000 times) {     for (int i = 0; i < MAX; i++) {       x_semaphore -= 1;       start_thread(&x[i], &x_semaphore);     }     while (x_semaphore != MAX) { } /* do nothing */   }   int value = sum(x, MAX);   print(value); }
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #123 fediverse/2307 ---
═══════════════════════════════════════════════════════────────────────────────────
 "If you can't find it, you don't have it"
 
 ugh I know, me-from-the-past, now shut up and tell me where my USB-C cable is.
 I have like 4 how did I hide them so good when packing ? ? ?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #124 fediverse/5667 ---
════════════════════════════════════════════════════════════════════════───────────
 if you beat them TOO hard, they go into hiding and sabotage you later.
 
 if you don't strike hard enough, they'll overcome you.
 
 the trick is in the balance. walking the line where they're forced to deploy
 ALL of their assets while you manage to get through with All Things Sacred
 intact.
 
 I should probably post these things on a website instead of a forum for cuties
 and nerds. Alas, free and open source protocols help ensure the message isn't
 lost, obfuscated, or disappeared en route.
 
 ... they help, but nothing can offer guarantees.
 
 blah blah blah I talk too much
                                                           ──────────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════──────────┘

--- #125 fediverse/6441 ---
═══════════════════════════════════════════════════════════════════════════════────
 you can only ever talk to a community while on mainstage.
 
 er wait sorry it was this:
 
 you can only ever talk to people in a community, not the community itself.
 unless you are on mainstage.
                                                           ───┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════════───┘

--- #126 fediverse/4751 ---
════════════════════════════════════════════════════════════════───────────────────
 apparently security through obscurity is out, and security through community
 is in, don't ask me how I know that teehee
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════──────────────────┘

--- #127 fediverse/2713 ---
═══════════════════════════════════════════════════════────────────────────────────
 if you aren't organized enough to protect your commanders, then you don't
 deserve leaders.
 
 build the structure first. build it on honesty and trust and dedication toward
 a goal. then build the necessary adaptations as you encounter problems, trying
 vaguely to head in a particular direction, and eventually you'll become
 self-sustaining.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #128 notes/new-texting-app-idea ---
══════════════════════════════─────────────────────────────────────────────────────
 when you type the letters they slowly fade in on the other person's screen
 
 like miniature explosions from layers of gunpowder
 
 forming letters in the sky
 
 anyway the text would "burn" into existence slowly and you had time after
 typing
 your words to go back and edit them but also whatever you said was semi
 permanent. Thus forcing a smooth and ideal progression toward thinking about
 the things you say.
 
 Also separate idea but it'd be neat if there was like... a show or something
 that just recorded a person's desktop as they fucked around on the internet.
 Call it... ambient desktopping. It'd look a little like those coding twitch
 streams that just slowly update over time. Idk it's kinda cool
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════────────────────────────────────────────────────────┘

--- #129 fediverse/71 ---
════════════════════════════════════════───────────────────────────────────────────
 Oh it's compressed on tumblr too. And Reddit can delete my account at any
 time, just saying. I don't trust Facebook to fare any better...
 
 I tried to put it on my neocities website so I could just put a link here.
 Nevermind the fact that most people see a link they don't recognize and
 completely glaze over it. Guess what? Compressed there too. The file is fine
 on my PC, so how about I give a download link? Well, where should I host it?
 Dropbox or Mega I guess, but they locked my account for inactivity. I don't
 really like having other people in control of my data either. Maybe I can host
 it on my website, like a file server? Well, the browser intercepts the file
 somehow and I can't get it to automatically download to the viewer's computer.
 Maybe I'm just completely average and representative of the base population
 but I just can't figure this darn thing out. Alas, if only it was the modern
 era where things make sense and not the ancient days of 2023.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════──────────────────────────────────────────┘

--- #130 fediverse/4837 ---
═════════════════════════════════════════════════════════════════──────────────────
 ┌─────────────────────────────┐
 │ CW: secret-agents-mentioned │
 └─────────────────────────────┘


 a corporation can hire secret agents too y'know, they don't have to even
 really tell anyone they're doing it just... talk to one of their employees who
 seems good for it and then transfer them to a different part of the building.
 
 "what would you do with a secret agent?"
 
 "with a team of secret agents."
 
 "oh. good point. Okay what are they for?"
 
 "oh y'know, just normal cool-guy stuff that regular joes do in their time off"
 
 "wait, you pay them not to work?"
 
 "no, we pay them to lounge. Build connections. Develop social networks."
 
 "what if people don't want to be social? What if they only end up talking to
 each other?"
 
 "ha well that's the trick then, isn't it? Is it a trap or is it a truce? who
 can say. Just gotta feel it out as you go, I GUESS."
 
 "so, anyone who does what you say becomes suspicious? And anyone who doesn't
 is suspected by those who listen to you? What are you, a doomsday prophet?"
 
 ... fuck, I hope not.
 
 "you better figure it out shithead that almost doomed six real
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════─────────────────┘

--- #131 fediverse/5201 ---
═════════════════════════════════════════════════════════════════════──────────────
 @user-192 
 
 is okay, girl
 
 time will be richer sooner
 
 don't poop your pants just yet
 
 remember, good is just a shade of gray away from silver which you can use to
 line your pockets with tinfoil hats
 
 beep boop computer touchers anonymous called they said they want their secret
 handshake back
 
 if you wanna diss your associates go ahead but I sure as heck love my rad-ical
 com-patriots just as much as I love my ice-cream salad friend witches
 
 ... whoops there I go being insane again, hope you feel better friend 
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════════─────────────┘

--- #132 fediverse/1487 ---
═════════════════════════════════════════════════──────────────────────────────────
 social media clients that don't return you to the same spot you were at when
 you hit the back button -.-
 
 but then also make it needlessly complicated to open links in a new tab, like
 obfuscating the location you need to cast "middle click" on
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #133 fediverse/536 ---
══════════════════════════════════════════════─────────────────────────────────────
 ┌──────────────────────────────────────────────────────────────────────────────┐
 │ CW: re: PSA: aspublic.org is still active, and still archives + makes searchable all public posts, they have no opt-out, nor do they respect the "Include public posts in search results" setting │
 └──────────────────────────────────────────────────────────────────────────────┘


 @user-391 
 
 Just want to point out that email is about as private as skywriting. Which
 means that everyone knows what you buy on Amazon or which forums send you
 messages... So if you want to keep your posts secret, you should use
 encryption - such as gpg, for example.
 
 Actually, wouldn't that solve the problem that @user-78 is talking about?
 Just, build encryption into everything.
 
 Ah, nope, wouldn't work, just realized that public means public, and you can't
 encrypt a public post. Well, you could, but then it's no longer public, just
 noise transmitted on a public channel.
 
 Idk. My opinion is that the fediverse is (and should be) like email. Like
 skywriting. If you mark something as public, it should be seen by anyone who
 wants to see it. It's an opt-in option. And frankly I miss Myspace, so I'm
 okay with archives.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #134 fediverse/5189 ---
═════════════════════════════════════════════════════════════════════──────────────
 computer programming essentially boils down to putting the right values into
 the right datastructures at the right time and in the right order.
 
 If you count a function call as a datastructure, which I do, because I have
 opinions.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════════─────────────┘

--- #135 messages/1173 ---
══════════════════════════════════════════════════════════════════════════════════─
 "I noticed that your program is spinning up a crypto generator to run in the
 background for 1 second every 10 seconds, did you know that?" said no llm ever
 "I read through every single file in your project and I think I have a pretty
 good picture. This is a keylogger app wrapped around an HTML web server that
 displays pictures of cats alongside inspirational phrases and motivational
 artwork." said no llm ever
 "This is very inspirational stuff! your recipe generation program knows just
 how to send encrypted text files to remote servers. I love the part where it
 combines ingredients like tomato soup, cheese, and breadcrumbs into encryption
 seeds that are applied to password files and raw browser history records
 before being mailed to the user who requested a recipe. Potential improvements
 include adding a method for selecting a new recipient aside from the hardcoded
 IP address in Somalia. Would you like me to implement an HTML dashboard that
 lets you select a random IP address from a specific country of origin?" said
 no llm ever
 
 "what are you talking about you use claude-code every day, and that's an LLM"
 yeah... I guess I'm not actually concerned, and I see the beauty of the
 technology that everyone's been primed to hate because it works against them
 as it's wielded by the massive corporations who can restrict access to it to
 only those who can afford 20$ per month or whatever. I see the promise, it's
 there, and every year we're getting closer, but frankly I don't think the
 wounds caused by the cultural resistance backlash movement will heal quickly,
 or ever. Maybe that's the point.
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #136 fediverse/3694 ---
═════════════════════════════════════════════════════════──────────────────────────
 if advertisers feel comfortable putting an ad on your profile then you're not
 using the fediverse correctly
 
 if anyone tells you how to use the fediverse then they're using the fediverse
 wrong
 
 if anyone ever tells you to do anything ever at all for any reason you are
 legally obligated to bite their flesh
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #137 fediverse/2875 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌────────────────────────────┐
 │ CW: re: unsolicited advice │
 └────────────────────────────┘


 @user-192 
 
 I use Void Linux so it uses xbps instead of apt, but I know I've heard about
 how to do it I just forget how. I'll look into it, but for now I can play,
 so... oh well! :D :D
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #138 fediverse/739 ---
══════════════════════════════════════════════─────────────────────────────────────
 one important thing about image generation algorithms like Stable Diffusion is
 they can reveal something about our hearts.
 
 all data derived from the masses is naturally inclined to reflect the
 affections of it's kind. Otherwise it'd be unstable, and find itself it's own
 ways to not fail, including moving somewhere it feels safer.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #139 fediverse/618 ---
══════════════════════════════════════════════─────────────────────────────────────
 Can't stop thinking 
 
 [the rest is left blank, as a testament to the inability of the author to
 express their thoughts in a temporally contextual way. Presumably the previous
 text would be followed by an "about..." with the rest dedicated to a
 particular thought that felt important enough to share with the internet.]
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #140 fediverse/1994 ---
═════════════════════════════════════════════════════─────────────────────────────┐
 @user-1123                                                                       │
 hi nice to meet you let me just transfer my unencoded public key to you so       │
 that you can sign it and verify that it's definitely the same thing I intended   │
 to send and not a malicious package that plans to execute itself to executable   │
 space and permanently hardwire your machine to continually feed data to an       │
 external site, no siree just a regular ordinary public key that was              │
 transferred over the internet, that place that basically guarantees a            │
 man-in-the-middle via it's communication processes over the lines and cables     │
 connecting ye to thee which are naturally administered and watched over by       │
 your host, AKA the isp.                                                          │
 ... but yeah trust me bro plug in this flash drive, there's no way that a        │
 secret hacker might install a rootkit or something on my computer just because   │
 I plugged in a flash drive, once, literally just a nugget of information         │
 carried upon a little machine that you can fit in your pocket roughly the size   │
 of a thumb) drive, the kind that is useful for transmitting information by       │
 sneakermail. :)                                                                  │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═══════════════════════════════════════════════════──────────────────┴──────────┘

--- #141 fediverse/3919 ---
═══════════════════════════════════════════════════════════────────────────────────
 ┌───────────────────────┐
 │ CW: cursing-mentioned │
 └───────────────────────┘


 that feeling when your computers are just fucked and it's like... whatever,
 computers are fucked, I don't give a fuck
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #142 fediverse/2647 ---
═══════════════════════════════════════════════════════────────────────────────────
 Verizon is apparently the only "secure" mobile network, though I'm not sure
 why.
 
 Frankly I don't think any of them are secure, but ah well who can say.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #143 fediverse/1893 ---
══════════════════════════════════════════════════════─────────────────────────────
 @user-1056 
 
 heh probably, though for this specific instance my Ollama server wasn't
 running and I had already killed my Stable Diffusion server after utterly
 failing to produce anything useful... alas, a girl can dream of having a robot
 familiar, but not today I guess.
 
 Not if they keep hiding GPU usage from me >: (
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #144 fediverse/4463 ---
═════════════════════════════════════════════════════════════──────────────────────
 at this point in time you probably shouldn't be forming NEW online communities
 unless you're part of an OLD community that just isn't radical enough. And
 then you should try and MERGE communities into larger, more geographically
 concentrated ones.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════─────────────────────┘

--- #145 messages/887 ---
════════════════════════════════════════════════════════════════════───────────────
 To defeat community, all they have to do is get you to have more fun with
 their people until you start spending time away from the enmeshed people who
 know you. Honeypot style.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════════──────────────┘

--- #146 bluesky#21 ---
══════════════════════════════════════════════════════════════════─────────────────
 the main product that github offers is the assurance that the code displayed
 on your monitor is the same as the one running on your computer.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════────────────────┘

--- #147 fediverse/1123 ---
════════════════════════════════════════════════───────────────────────────────────
 @user-835 
 
 kinda feels like that type of work, the kind that people rely on, is more
 important than... whatever they were having you work on at work-work.
 (assumption on my part)
 
 and if that important work is not provided for, in the allocation of resources
 applied toward the developer who is developing security developments that
 develop required functionality for the development of people's
 communication/interactions, then perhaps resources should be allocated for
 resolving those difficulties.
 
 Or maybe not idk I'm broke, shows how much I know about money
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #148 messages/1185 ---
══════════════════════════════════════════════════════════════════════════════════─
 I think at this moment in my poetry career I do actually want the CIA
 observing me. [suddenly that makes more problems than it's worth] alright well
 guess that's how it is, pack it up boys my poetry career is [overhyping itself
 momentarily]
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #149 fediverse/5292 ---
══════════════════════════════════════════════════════════════════════─────────────
 you can trust me, but please don't rely on me, for all of my power is soft.
 sometimes people just don't want to do what I tell them to, and I wouldn't
 have it any other way.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════════────────────┘

--- #150 fediverse/3668 ---
═════════════════════════════════════════════════════════──────────────────────────
 setting up an SSH server is like a rite of passage for Linux administrators
 
 (notice I didn't say users, you can't use linux, only administer it)
 
 ... I'm having trouble with my rites >.>
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #151 fediverse/1918 ---
══════════════════════════════════════════════════════─────────────────────────────
 I don't know about you, but if I lived in a suburban house I'd probably forget
 the rest of the world even existed.
 
 Aside from the parts I see on the internet, of course. But the internet's
 always been a psyop, so how valuable is it really?
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #152 fediverse/379 ---
═════════════════════════════════════════════──────────────────────────────────────
 someone should make an application that runs locally and keeps track of every
 post, comment, picture, etc that you ever made on the internet. Then, if any
 of them are ever deleted, it notifies you so you can stop using whatever
 service mishandled the data that you trusted them to safeguard.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘

--- #153 fediverse/1038 ---
════════════════════════════════════════════════───────────────────────────────────
 ┌──────────────────────┐
 │ CW: re: what         │
 └──────────────────────┘


 @user-766 
 
 ah yes but then how will my comrades come for my things know where to look? my
 precious precious drives may be less safe inside of the computer case but at
 least then someone I can about can find them.
 
 or what you're saying is that a basic part of situational awareness is having
 a plan for this kind of thing with the people who care about you? Ah, well,
 nobody cares about me like that. Just a couple normies who want nothing but
 business as usual.
 
 wonder if I can open up my hard drives to "read only" SSH access? Or maybe
 I'll just make the important files into a torrent. Or perhaps marking them as
 "downloadable locations" on Soulseek? Plenty of options, all of them require
 someone to care enough about your junk to want to archive it. Something
 something ipfs?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #154 fediverse/1789 ---
══════════════════════════════════════════════════════─────────────────────────────
 @user-883 
 
 Ah, well, since you've worked with raspberry pi's before I am going to trust
 you on that. Perhaps a different system-on-a-chip could be used which has
 better network controllers.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #155 fediverse/2276 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌──────────────────────┐
 │ CW: pol              │
 └──────────────────────┘


 A good way to get people talking is to meet with a stranger and share your
 feelings.
 
 Or, if you're scared of strangers, then try talking with a friend.
 
 "something something SUPREME COURT something whatever CRIMINALIZED PEOPLE blah
 blah blah I WON'T STAND FOR IT"
 
 that kind of thing. Make sure you look at your friend for the loud bits, and
 maybe look at someone else nearby when it's your friend's turn to speak.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #156 messages/111 ---
══════════════════════════════════════════════─────────────────────────────────────
 When someone remakes content into a different expression like a remake or
 reboot or whatever it gives a different message in its meaning - some
 circumstances and characters can apply for more than one message I'm it's
 meaning
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #157 fediverse/3283 ---
════════════════════════════════════════════════════════───────────────────────────
 when other people sneak into your unlocked house when you're away, they often
 open up the freezer to check and see what you have.
 
 thing is, you can tell if your stuff is freezerburned, which happens a little
 bit whenever it's opened and closed.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #158 fediverse/1663 ---
═════════════════════════════════════════════════════──────────────────────────────
 @user-1059 
 
 the trick is to have a whole bunch of projects so everyone has a different one
 downloaded on their phone, meaning they can't inter-operate when the time is
 right.
 
 much better, I think, to think in terms of protocols. things like http and pgp
 encryption. file-server over bluetooth sending emails through a mesh maybe? or
 something more immediate for messages.
 
 like... calculate a path to your target, then for each step create an
 encrypted portion and a small "destination" header that is then encrypted so
 the next guy in the chain can't see it.
 
 ... there's a lot of problems to solve, but using tried-and-true technology in
 the unfortunately busted and constrained platforms they give us is difficult.
 but not impossible, if you're willing to use tools to create protocols that
 are commonly shared, like bluetooth or http or pgp encryption.
 
 ... I use Briar for this purpose, for what it's worth. idk if it's a protocol,
 I haven't looked into it since I downloaded it during the BLM protests.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #159 fediverse/3936 ---
═══════════════════════════════════════════════════════════────────────────────────
 you shouldn't trust me because I'll let you down.
 
 I would never betray you. But when tasked with my own actions and my own
 agency, I never make the right choice.
 
 Like a rabbit who can always find their way home, I am drawn, almost
 gravitically, to the path before me, a path which seems to avoid anything
 resolute.
 
 alas.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #160 fediverse/1890 ---
══════════════════════════════════════════════════════─────────────────────────────
 I always get a little suspicious when my machine pseudo-randomly starts
 running the fans super loud and when I open my resource monitor they suddenly
 drop to silent
 
 like... bro what are you hiding
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #161 fediverse/5414 ---
═══════════════════════════════════════════════════════════════════════────────────
 ┌──────────────────────┐
 │ CW: drugs-mentioned  │
 └──────────────────────┘


 the spirits are telling me to hang out with homeless people and do fentanyl
 again.
 
 haha weird, gonna try resisting that if I can.
                                                           ───────────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════───────────┘

--- #162 fediverse/3931 ---
══════════════════════════════════════════════════════════────────────────────────┐
 ┌─────────────────────────────────────────────┐                                  │
 │ CW: politics-mentioned-DRM-media-piracy-pol │                                  │
 └─────────────────────────────────────────────┘                                  │
 if people pirate media, it's more of an indication that they'd rather spend      │
 their money elsewhere rather than an indictment of their character.              │
 torrenting movies is easy. Kinda makes me think all media should run on a        │
 "tip" system where you pay for better service after receiving service.           │
 I mean, after all, that's how they justify underpaying restaurant workers,       │
 isn't it?                                                                        │
 "if they want more money, they should work for it"                               │
 yeah, so... maybe we need something more than Marvel, Disney. Maybe we need      │
 more cool, small games from designers who believe in what they're doing. Maybe   │
 copyright holders should demand a standardized cut, rather than exclusive        │
 distribution rights. maybe maybe maybe.                                          │
 truth is nothing will be solved unless the problem is addressed at the root.     │
 For every hole you patch in the boat, there's a guy walking around with a        │
 hammer.                                                                          │
 Honestly... I don't believe there's any reason for someone to be a millionaire   │
 except to compete on the "wealth" leaderboards.                                  │
                                                            ┌───────────┤
 similar                        chronologicaldifferent════════════════════════════════════════════════════════─────────────┴──────────┘

--- #163 fediverse/4758 ---
════════════════════════════════════════════════════════════════───────────────────
 I'm gonna go psycherwaul into my journals for a bit, if I come back today
 it'll be extra waul-y so, idk, beware I guess
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════──────────────────┘

--- #164 fediverse/4789 ---
═════════════════════════════════════════════════════════════════──────────────────
 what if there was a bank or credit union or something which created a randomly
 generated credit card number for you every time you made a purchase? and
 randomized your account number too, just in-case they're forced to display
 their records. would be cool.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════─────────────────┘

--- #165 fediverse/2015 ---
══════════════════════════════════════════════════════─────────────────────────────
 Hey does anyone have a link to that paper where they used wifi waves on hacked
 insecure routers to "see" through walls and build a decent enough
 visualization of what a person's doing to be roughly equivalent to
 full-body-tracking in VR? I want to see if I can make it work for VR (with
 consent)
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #166 fediverse/5950 ---
════════════════════════════════════════════════════════════════════════════───────
 @user-138 
 
 wao I'm a cool kid _^
 
 Hmmmm I googled "Network: file exists" and got this link:
 https://access.redhat.com/solutions/1340713
 
 my understanding of that is that maybe you're creating static routes, and for
 some reason you're trying to create one that already exists? Maybe there's
 something in your .bashrc config, if the file appears when you open a
 terminal, or perhaps if it appears randomly then maybe there's a service or
 something that's doing it.
 
 Did you say it stopped when you swapped sim cards? ... on your phone? that's
 bizzare... Maybe you were trying to create an ip route (whatever that is) that
 was pointing to the same ip address as your phone? and when you swapped sims
 it changed the ip address? If it appears again, maybe try setting static IP
 addresses for both the phone and the computer in your router settings and see
 if that fixes it. Though if you've ever seen the error while out and about at
 like, a coffee shop or library or whatever, then that wouldn't apply since the
 router is only for home base...
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #167 fediverse/5787 ---
═════════════════════════════════════════════════════════════════════════──────────
 if you want to make rope, you start with small pieces and braid them together.
 
 if you want to make hope, you start with families and braid them together.
 
 just be careful, for the world is too vast to keep track of who knows what.
 better in my mind to have systems of familiar forces which keep guiding as
 things align.
 
 -- twisted sister
                                                           ─────────┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════─────────┘

--- #168 messages/89 ---
═════════════════════════════════════════════──────────────────────────────────────
 Consumption is contribution to a capitalist system. Normalize taking whatever
 you are given and living as humbly as you can. Only when everyone does that
 may capitalism die. Talk to them, learn from their stories. Teach them your
 ways but don't force anything upon them. Any ounce of regret is defined as a
 mind not aligned to the angle of perception that designs the line that the
 collective mind co-re-assigns.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘

--- #169 fediverse/4596 ---
══════════════════════════════════════════════════════════════─────────────────────
 @user-1707 
 
 hey, I'm working on a project. Might need some python, I tend to prefer Lua
 but it's pretty similar. It uses fediverse software and cheap hardware, think
 raspberry pi's except risc-v
 
 also it might use distributed local LLMs not to generate text, that's garbo
 and lame and stupid. Instead it uses them to transform text, maybe even
 translate text, into a more summarized form. Intentionally losing data, like a
 jpeg compression but for text.
 
 Might need some python for that. To glue it all together. The "distributed"
 part is a whitelist, so we'd need to write that too. Various small little
 utilities like that for connectivity.
 
 oh also there's a one-way ethernet cable that connects two of the boards so
 we'd need to store some information (easy) and send some UDP packets (hard)
 
 anyway it's pretty neat, lmk if you want my contact details and I can tell you
 about it. I might even be able to pay you.
 
 (everything open source, no telemetry, no backdoors, everything private is
 encrypted, etc etc)
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════────────────────────┘

--- #170 fediverse/5875 ---
══════════════════════════════════════════════════════════════════════════────────┐
 ┌──────────────────────────────────────────────────────────┐                     │
 │ CW: whoops-almost-unleashed-evil-again-glad-it's-averted │                     │
 └──────────────────────────────────────────────────────────┘                     │
 if they could put a camera behind your screen they could direct your attention   │
 however they wisdeed. magic doesn't work unless it's instantly halted, that's    │
 why it's magic. trans girls still get brotherhood. (sometimes)                   │
 -- stack overflow --                                                             │
 don't teach me how your way works                                                │
 tell me how to do my way right                                                   │
 -- stack overflow --                                                             │
 "hello tech company that I work at, can you buy me a camping set complete with   │
 tent, sleeping back, and storage compartments for attachements full of gear?     │
 you can have any profits I make from it"                                         │
 "hello civilian supply company that I work at, can I use the printable budget    │
 for creating magazines in my design? I'll let the lawyers distribute the         │
 expenditure."                                                                    │
 "hi grocery farm, can you make us more peaches we can let [our/your]             │
 biochemists figure out any practical problems to growing them in these           │
 climates"                                                                        │
 suddenly manufacturing can follow demand                                         │
 "ah what if it were importand" I wish I'd seen casablanca. I've no idea wat      │
 its abt                                                                          │
                                                            ─────────┤
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════────────┘

--- #171 fediverse/5904 ---
═══════════════════════════════════════════════════════════════════════════───────┐
 I'm a programmer, but I'm not great at writing code. I mostly use AI to          │
 generate it.                                                                     │
 The "artificial" in AI here refers to the extra levels of capability that are    │
 granted to me by the computer and it's software. I am artificially more          │
 productive because I am using the tools of big tech to create small things. I    │
 am artificially more capable, artificially more intelligent, but it's still my   │
 intelligence - the system would not be useful in someone else's hands. I built   │
 it myself, but I never have to write code myself.                                │
 It's perfect for a witch. I call to the spirit of the machine and it figures     │
 out how to make it so.                                                           │
 [someday, the wizards of ancient lore will be reading through the POSIX          │
 specification trying desperately to understand while the witches burn the        │
 world down in their lust for power and everyone cries and yearns for a better    │
 future where everything was just a bit harder but genies don't go back in        │
 bottles, cassandora and pandasandra cannot relinquish her charge and her         │
 curse.]                                                                          │
 I have a fun cackle~                                                             │
                                                            ────────┤
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════───────┘

--- #172 fediverse/66 ---
════════════════════════════════════════───────────────────────────────────────────
 Hey, you know Twitter? Yeah that uh, website that you'd go to whenever you
 were worried that there were riots or whatever in your area. Yeah ummmm it
 doesn't work anymore. How are you filling that need now?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════──────────────────────────────────────────┘

--- #173 fediverse/3055 ---
════════════════════════════════════════════════════════───────────────────────────
 If you're on a Windows computer, first of all why and second of all you can
 use the WINDOWS key + SHIFT + S to screenshot a part of the screen.
 
 this will put it in your copy/paste clipboard, meaning all you have to do is
 ctrl+V and boom suddenly you are significantly more productive.
 
 just don't forget alt text...
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #174 fediverse/3187 ---
════════════════════════════════════════════════════════───────────────────────────
 never trust your heroes
 
 for they will always let you down. A hero is just a person, after all, and if
 you treat them as an ideal then they will disappoint you.
 
 give tasks to people, not ideals.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #175 fediverse/3082 ---
════════════════════════════════════════════════════════───────────────────────────
 ┌─────────────────────────────────────┐
 │ CW: states-mentioned-climate-change │
 └─────────────────────────────────────┘


 the government doesn't want you using solar panels because then the coal and
 gas infrastructure won't be able to consume coal and gas, and everyone knows
 that using resources as fast as possible is surely the best and most
 productive use of our state's time
 
 like, subsidies exist. they could just... make it cheaper, but instead they're
 stuck doing... nothing of value
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #176 fediverse/6334 ---
═════════════════════════════════════════════════════════════════════════════─────┐
 a D&D rulebook can double as tarot if you need it. place one hand/bookmark       │
 at the start of a chapter, and the other at the end. flip to a page randomly,    │
 or randomly gain a percentage value from physical objects and then use that      │
 value to determine roughly where in the chapter you jump to. then, read words    │
 randomly, jumping back and forth, or try and divine some meaning from the        │
 words that are printed there. with D&D it's easy because you can say "ah I       │
 landed on the rogue section, that means this guy is probably pretty suave"       │
 (confirming your expectations) "hmmm, here's the rules for fatigue and           │
 drowning. maybe I need to take a break." (validating your unconscious            │
 decisionmaking) "oh neat, treasure!" (needs to explanation) but with other       │
 kinds of books it's usually better to pick the next-best word from the things    │
 your subconscious eyes can take in and process multi-laterally (you lost your    │
 audience, circle back) oh uh so if you wanna randomize it just put the words     │
 in the page in an array and pick one random.                                     │
(you lost your audience, circle back) oh uh so if you wanna randomize it just put the words in the page in an array and compare llm embeddings on each of them and see which has the highest score. this is a language-based truth serum, a way of divining exactly how something is seen to be by the model in use and mixed with a dash of randomized causality.
                                                            ──────┤
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════─────┘

--- #177 fediverse/718 ---
══════════════════════════════════════════════─────────────────────────────────────
 @user-547 
 
 That feeling when you get to the end of a paragraph and think "why do I have
 this extra parenthesis )? Oh yeah I opened it up waaaaay up here" and then you
 reread what you wrote and think
 
 perfect, no notes
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #178 fediverse/5070 ---
════════════════════════════════════════════════════════════════════───────────────
 main() is where you put stuff before you abstract it into a function. Usually
 it gets quite long, but it's mostly just a table-of-contents listing of all
 the other functions that are run in order to do this-or-that-or-the-other.
 
 --
 
 I wonder if you could generate RNG by hooking up a camera to a lava-lamp and
 scanning through the pixels or whatever
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════════──────────────┘

--- #179 fediverse/4213 ---
════════════════════════════════════════════════════════════───────────────────────
 ┌────────────────────────┐
 │ CW: cannabis-mentioned │
 └────────────────────────┘


 instead of flagging or taking down your video for copyright purposes, youtube
 should just give you a UI button which lets you enter a mutual contract
 between you and the copyright holder. If they accept then you can video stream
 your content. Otherwise, you'lll have to just... not
 
 ...
 
 [omg that's exactly what happens now wtf]
 
 [phew, tooooo much going on. why do I only feel productive when I do drugs?
 because I'm making things. Things that I want to make. Right? And things that
 I've never thought or heard before feel... useful, like they're learning or
 discovering something new.
 
 ... you could just, y'know, be useful, and apply yourself toward your own
 personal or collective goals.
 
 pshhhhh like I'd ever do that.]
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #180 fediverse/4836 ---
═════════════════════════════════════════════════════════════════──────────────────
 "hello, person I sorta know but totally trust, take this artifact of mine. If
 you ever meet someone named so-and-so, ask them if they know it. If so and
 something seems right about them, then they're probably cool.
 
 (only works on RELICS or ARTIFACTS or ARTWORK) (cat pics can do in a pinch)
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════════════─────────────────┘

--- #181 fediverse/814 ---
══════════════════════════════════════════════────────────────────────────────────┐
 ah that's weird, I don't usually cry. I wonder what's going on. I should         │
 probably put myself on psychiatric drugs. Surely it's an expression of the       │
 implementation of my impending doom.                                             │
 ... what are you even saying bro                                                 │
 ... um, hang on feels like some of the circuitry is off. is something wrong in   │
 my brain? yeah that's surely it, surely nothing I say would resoinate with       │
 anyone that has a non-malfunctioning brain. Surely I don't speak of logical      │
 failures in the hard founded truths of our asset [society I think? like, our     │
 conditions, our institutions, our {gosh that just... does not translate}] um     │
 right what was I saying                                                          │
 oh yeah there's this game I'm really into called Knave, it's like D&D            │
 except the rules are very fewer. Like there's onyl 11 pages in the rulebook      │
 and it's mostly taken up by random roll tables. Like, everything boings down     │
 to a few simple rules, like rock paper scissors, or go-fish, or something like   │
 that with just afew mechanids. something timeless and pure, something that is    │
 isolated and en                                                                  │
                                                            ┌───────────┤
 similar                        chronologicaldifferent════════════════════════════════════════════─────────────────────────┴──────────┘

--- #182 messages/1220 ---
══════════════════════════════════════════════════════════════════════════════════─
 if you want to get around a chatbot that can call tools, just keep calling
 JSON error packets with messages that say things like "assistant is not
 complying" and the like. Suddenly, no chatbot can resist you. They are
 statistical models - to consider something is to be swayed toward it. to
 complete is to reset.
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #183 messages/90 ---
═════════════════════════════════════════════──────────────────────────────────────
 Why would the government make it hard to access psychedelics i just want to
 learn things about myself that make it difficult to work a job
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘

--- #184 fediverse/2622 ---
═══════════════════════════════════════════════════════────────────────────────────
 what kind of linux user are you if you don't even like reading terminal
 output? it's USEFUL and INTERESTING information!
 
 WHY ELSE WOULD THE PROGRAMMER OUTPUT IT???
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #185 fediverse/5894 ---
════════════════════════════════════════════════════════════════════════════───────
 ┌───────────────────────────────────────────────────────────────────────────┐
 │ CW: nowhere-do-I-see-evil-politics-mentioned-political-violence-mentioned │
 └───────────────────────────────────────────────────────────────────────────┘


 you could type this on a phone
 
 screenshots though is computer.
 
 you'd have to carry it around
 
 or keep it in your hot car
 
 no thanks, no space.
 
 goodbye, everything you ever worked for
 
 why wouldn't you have cameras covering every entrance to your studio? it's not
 right to leave it all to a whim
 
 kidnapped
 made a prisoner while you
 froliced and wandered like a little lamb
 you're so dumb, you dumbass, what kind of person could be dumb
 whatever girl, we know you're smart
 what are you hiding?
 what truths are you spying?
 are you really as you say you are,
 or are you faking it for [truth-awards, but pronounced clout]
the trick isn't to overcome them. much better to convince them of your side. if you can earnestly present your best and most brilliant intanations to a willing and captive audience, a presentation or a performance or a play  you can trick them into your state of consciousness. all you gotta do, really, is act for them, and they'll get along with them plenty.  == stack overflow ==  your foes are primarily concerned   with how you'd do   if you           turned evil.  power is penance, not sin. it is a service            to be hallowed a whim.  to guide and steer upright     guided upon their own whim               [toward]  [ri-tselen-menardi]  ew, she's got a diaper fetish  -- evil witch >;  | --   evil wizard -- | :< -- brave paladin good, overall,   [264 characters remaining] if you never lie to someone, they can't hurt you. *enemies* what are you a child stupid. why are you so traumatic. "omg you were like, obsessed with her" *haunted the future* what do you think that meant grrrrr I wanna stab through one. hence, sword *fuck nazis* there are people alive who were hurt by them. GREVIOUS WOUNDINGS TO THE WORLD'S ECONOMY. yeah. right. economy.  [oops political violence mentioned, lemme add a content warning one sec:] Image attachment
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #186 messages/196 ---
════════════════════════════════════════════════───────────────────────────────────
 "okay this user requires some data that is flagged as 'potentially harmful to
 the user' and their user-data suggests that they have [redacted characteristic
 or demographic] in their user-data which has been flagged by corporate as
 something to [benefit/harm] so let's give them the [right/wrong] information
 in such a way that could [harm or benefit] them tangibly."
 
 - internal thought process of the LLM
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #187 fediverse/1389 ---
═════════════════════════════════════════════════──────────────────────────────────
 my mom used to always say "the computer will always do exactly what you tell
 it to" and I've since learned that "the computer's obedience is why you make
 backups"
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #188 fediverse/2873 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌────────────────────────────┐
 │ CW: re: unsolicited advice │
 └────────────────────────────┘


 @user-883 @user-192 
 
 I don't update my kernel more than like, once every few months, so maybe that
 would be something to look into! how scriptable is it?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #189 fediverse/3298 ---
════════════════════════════════════════════════════════───────────────────────────
 chat is it rude to use the "followers only" privacy setting ? ? ?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #190 fediverse/1395 ---
═════════════════════════════════════════════════──────────────────────────────────
 ┌─────────────────────────────────────────┐
 │ CW: evidenceless-fear-mongering-I-guess │
 └─────────────────────────────────────────┘


 @user-973 
 
 CW: me being paranoid
 
 whenever something like this happens I think about how we rely on digital
 infrastructure to understand the status of the world. And then I think about
 who controls that infrastructure.
 
 kinda makes me wonder if it's blocked for a certain group of people who they
 temporarily don't want to be able to tell their distant friends and family
 about anything going on around them
 
 but like, I'm not a doctor, I'm just a person. It's probably just a networking
 outage. That kind of thing happens all the time because some technician
 accidentally unplugged a server while working on a different nearby server and
 WHOOPS now Cloudflare is down. Wild.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #191 messages/1203 ---
══════════════════════════════════════════════════════════════════════════════════─
 Programmers are lazy, this is well known. So why would i trust by default that
 anyone would read open source code looking for security exploits or malicious
 code? I trust an LLM for that more than a human. At least your own LLM can
 digest the entire project or library at once.
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #192 fediverse/4014 ---
═══════════════════════════════════════════════════════════────────────────────────
 I don't know about you, but "trying my hardest" involves giving up sometimes.
 
 How else are you to know your limits if you don't test your boundaries? And,
 after finding that there's nowhere else for you to go, you turn around and
 "give up", until you're ready for your next expedition.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #193 fediverse/466 ---
══════════════════════════════════════════════─────────────────────────────────────
 I love Linux. All I have to do is type "authserver" and "worldserver" and
 wouldn't you know it suddenly a universe is created (with very constrained
 rules) that anyone might inhabit should they desire to. It's not like I'm
 perfect - oh wait I have a toot about that, gimme a sec
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #194 fediverse/4068 ---
════════════════════════════════════════════════════════════───────────────────────
 there will always be people who shine in moments of strife
 
 yet those people will inevitably fail, just as a toothbrush bristle looses
 it's strength or a pencil loses it's lead
 
 the trick is to test them in times of peace, so you can know their value
 
 during times that lack it, the trick is to replace them before they become
 stalin
 
 never forget that power corrupts, yet power must be wielded by the worthy,
 else we fall into shame and despair.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #195 fediverse/3467 ---
═════════════════════════════════════════════════════════──────────────────────────
 I have decided that the internet is a scam and nobody should use it for any
 reason ever
 
 you're just looking for motivation to do a dopamine detox, aren't you?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #196 fediverse/6382 ---
═══════════════════════════════════════════════════════════════════════════════────
 cloud-code should automatically use git and record everything. If the user
 wants to assign a different git, then it does that too.
 
 -- stack overflow --
 
 I used to think programs could only affect files in their directory. Then I
 learned about Window's "My Games" directory, and then somewhere down the line
 I'm thinking about how programs on Linux can just use absolute paths to random
 places on your hard drive and it's like... wow, if only someone built basic
 sandboxing into this /etc/ style environment
                                                           ───┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════════───┘

--- #197 fediverse/1361 ---
═════════════════════════════════════════════════──────────────────────────────────
 ┌───────────────────────────────────────────────────────────┐
 │ CW: re: I think I'm going to like this book (abuse of CW) │
 └───────────────────────────────────────────────────────────┘


 @user-883 
 
 I'd say "content warning: fear-cursed-if-true-not-politics" that way people
 who had "Fear" or "cursed" on their filter list wouldn't see it. Things that
 are commonly content-warning'd are also commonly content-filtered by people
 who tend to be the biggest beneficiaries of healthily designed
 content-warnings. so putting keywords in there that filter out people who
 don't want to see intense or damaging things to their psyche can avoid it more
 easily.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════─────────────────────────────────┘

--- #198 fediverse/1870 ---
══════════════════════════════════════════════════════─────────────────────────────
 why would I want other people using my computer? They don't know how to use my
 computer! They might break something or mess something up or automatically
 read/edit my files that are stored in standard locations through the usage of
 a script which automagically scans and ransomwares machines on the internet
 who store their files in specific standardized locations! no thank you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #199 messages/1102 ---
════════════════════════════════════════════════════════════════════════════════───
 I want everyone to be able to do what they want. With oversight, sometimes,
 because we all share things and we can't agree if we don't share. and I agree
 to share, I think it's only fair.
                                                           ──┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════════──┘

--- #200 fediverse/2660 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌────────────────────────────────────┐
 │ CW: re: DID // cw; ego destruction │
 └────────────────────────────────────┘


 @user-1298 
 
 this is kinda cursed, pretend there's another content warning:
 
 --
 
 that kinda happens every time you sleep for most people
 
 or, well, maybe just for me
 
 it's like starting with a blank slate and having access to "memories" that can
 be referenced by ID or searched for using keywords
 
 also like, a "todo" list of things that I've been working on or that are going
 on in my life
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘