• 10 Posts
  • 15 Comments
Joined 4 years ago
cake
Cake day: June 15th, 2020

help-circle
  • I understand on a current technical side why this is not possible, but the post still has some merit in that misuse of original posts can lead to legal action.

    Right now, all content posted online is generally accepted as unlicensed, free to use however one pleases, works. This was fine at the beginning, but as the internet grew, control of one’s data increasingly got more difficult to control - once social media became the dominate form of communicating, it was all over.

    Early blogs still have copyrights posted on them that, legally, can be enforced and respected. So if each user was able to indicated in meta data their choices, with most defaulting probably to a free license, then there is some level of control returned to the user, regardless of protocol and how things get replicated on servers.

    Licenses include reproduction, and the way activitypub works can make that quite murky (its being republished on servers) but that is not all it covers.

    OP, I think this is a very interesting topic to discuss, thanks for bringing it up!


  • These kinds of lists always make me laugh, because it takes a very specific world view and experience and assumes all must be like that. Atomic Habit I do agree partially on, but you know two books that have recently changed my life? Certainly not on the list here.

    4,000 Weeks by Oliver Burkeman and The Little Book of Listening by Donna Duffey et. Al.

    As someone who feels outside the domimate traits of society, Sensitive: The Hidden Power and The Power of Quiet are also books that changed my life in that I am embracing my own traits and talents, rather than struggle to adopt those more commonly sought after.


  • People love convinence nowadays, not what you are suggesting. If you have a method to easily and convinently get what they need, they don’t to own it.

    Example - Clothing subscription services. You must send the clothes back you don’t intend to purchase. It must be in good condition.

    Everything is possible if you frame it the right way



  • "Home Depot said in a recent press release that it plans to make its gas-powered tools relatively obsolete in the next several years, instead replacing them with battery and electric powered upgrades.

    Most of its gas tools are outdoor equipment; think weedwackers, lawn mowers, leaf blowers, and trimmers. It aims to replace these with battery power by the end of 2028. At that point, Home Depot wants to see 85% of its outdoor lawn equipment sales to be driven by rechargeable battery power in the U.S. and Canada."

    If this is for rentals, I gotta say that’s a big win then for the environment.




















  • Your write ups are fantastic and I refer to them quite often when talking about privacy for activist! If you have one geared towards those concerns, such as locking down communications and ensuring a phone is as secure as possible would be good. There is talk about patterns and metadata that I would love to hear your take on.

    I’m dabbling in getting rid of windows on my laptop and so far just used Debian since it seems like a safe starter distro, but with a recent OS failure (windows, not linux) I finally tried booting from a USB and kinda love that? So maybe more privacy focused linux information since I have trouble finding stuff on trusted sites and using searx to find information.

    I guess last topic I can think about is having some good points about why it matters? Most people I talk to don’t seem to care much, and of course it won’t change anyone’s mind immediately, but just having a good line of logic to get people thinking might be good? I was talking to a coworker over our frustration that our job forces us to download an app just to access our email in the name of “security” but it feels more like “invasion”, especially since it’s our personal phones.

    Oh, actually; is there anyway for people willing to learn how to tell if an app has trackers or is a breach of privacy?


  • I’ve been slowly implementing steps from this guide, but I just don’t understand changing the default SMS app to a different app…is it a case of using open source applications? I guess in Silence case, that provides some level of encryption, but wouldn’t there still be metadata? Also, I have a VPN that works on my phone always, and I noticed both Blokada and Netguard require the one port used for the VPN…should I drop the VPN on my phone and use Blokada instead? Thank you for making this guide by the way, I have a Samsung device and can’t find any open source OS that support it so I have to keep using it as is and wanted to find ways to secure it.