

Logs, eh? You know those are just text files, right? And how do you plan to get access to them to prove any kind of mistake or malfeasance, exactly?
Logs, eh? You know those are just text files, right? And how do you plan to get access to them to prove any kind of mistake or malfeasance, exactly?
“illegitimately” is the key word there. I’m not interested in what you think happens if everything is working as intended, or your poor reading comprehension. F-, rewrite your answer and address the question or you’ll fail the class and be held back a grade.
That’s a really weird way of looking at it. Without the database, there’s no central ledger to consult as to whether or not you’re legally a person. Like @atrielienz@lemmy.world said:
The database is the backbone of them being able to hurt or harm
Without that starting point, “the organizational structure, rules, and procedures” that rely on the data from the database are impotent.
Looking for ways the system can be abused and addressing those loopholes is basic risk assessment, so
just shut up
I strongly suggest taking a heaping helping of your own advice, mate.
What happens if someone is illegitimately removed from this database? How can you show whether it was a glitch, or deliberate? How do you know if the information they have about you is even right, or get it changed if you need to? Where’s the accountability?
See the UK Post Office accounting scandal, in which a persistent computer error went unfixed for decades and caused hundreds of post office employees to be fired and dragged through courts for corruption that never happened. A good chunk of them committed suicide. The government and the software company both knew about the bug causing the issue, too, but prosecutions continued. “If the computer says it, it must be right”, sort of danger.
That’s the “special application” I mentioned, but it seems to have been updated since I last looked at it so it now offers the same level of encryption as the webmail app.
I would prefer to see it freely available, but it doesn’t seem foundational to using the service in any scenario - free accounts have the webmail and mobile clients, which are arguably both more flexible (and maintainable) than the Bridge.
Thunderbird doesn’t have your private key to decrypt your Proton emails. The key lives in your browser and in theory there’s no way to securely provide that key to Thunderbird so it can do the decrypting. There’s a special application they built for business owners who want this functionality, but by nature it breaks Proton’s security because the email content is then stored in plaintext (or close enough) so it’s not “secure” in the same sense Proton webmail is. (edit: maybe it got updates since I last looked, because the Bridge is now as secure as the webmail)
Consider that it’s not Indian people you hate working for or with, but a particular behavior you’ve noticed and are attributing to people being of a particular race, instead of just them doing stuff you don’t like.
Don’t come back with “but why is it only them” or something. It’s definitely not. Just identify the behaviour and remember that is what you don’t like, not the person’s race specifically.
You get people and habits you don’t like from all cultures; that makes sense, as assholery knows no borders. But if you make it (the things you don’t like, whatever they may be) about race, it’s racist, so stop it. Unless you like the idea of being a racist, which it seems like you don’t.
This wasn’t “his brain matter”, these were “neuronal organoids” (clumps of neurons) grown from harvesting white blood cells and turning those into stem cells. Then the clumps were networked together with a literal wire to conduct signals between them, for timing.
Usually in organoids networks the wire delivers either regular, repeating inputs (“clean” pulses) as a reward for succeeding a task, or a random signal (“noise”) for failure; this is how they’re “trained” to play Pong for example:
In more advanced closed-loop setups, organoid cultures are embedded within simulated environments that allow them to “interact” in a game-like world. By using high-density multielectrode arrays (MEAs) to deliver patterns of electrical signals, researchers can create closed-loop feedback systems that enable organoids to process and respond to certain inputs (Kagan et al. [2022]). For instance, in one experiment, monolayer neuronal cultures were given sparse sensory feedback about the consequences of their actions within a simulated game. The organoids displayed short-term memory by organizing themselves in goal-directed ways, effectively learning to complete simple behavioural tasks. This capability, made possible by reinforcement learning, allows organoids to adapt based on feedback, akin to how a human brain might learn from trial and error.
(https://www.cell.com/neuron/fulltext/S0896-6273(22)00806-6)
These same methods are being used to train organoids as Machine Learning compute substrates, because they’re much more efficient than silicon: https://aapsopen.springeropen.com/articles/10.1186/s41120-025-00109-3
I run GrapheneOS. Stock Fairphone doesn’t fit my security requirements, but if I can put a hardened OS on it I’d consider it.
…I don’t know what that makes me, for pointing out that people who complain about snowflakes are snowflakes
Observant?
If you think about it, that was kind of a civics lesson. The Authority will brand anything they don’t like as criminal activity.
Brie, gruyere, swiss, provolone, cheddar…
I think they mean the kind that stick out of your nose. I didn’t get those until long after my childhood ended.
I know people who host content from YouTube on their servers, just in case it ever gets taken down from YouTube. Team FourStar had big problems with that, despite all their content being squarely under Fair Use, so I can’t say I blame anyone for taking the precaution. It would be a social tragedy to lose public copies of DBZ Abridged.
Sorry, I was talking about Matrix at that point. Of the issues I raised, Simplex just suffers the standards problem.
Edit: Clarity
Yeah, and one of my friends stood up a matrix server too. Getting everyone on just one like Signal though… it’s the “now there are fifteen standards” problem. I know there are bridges available for Matrix that can make it a central place for all your messaging traffic, but at least one person has to go through the effort of setting all of that up, and then maintaining it if it breaks.
I dunno, maybe I’ll be that guy. Just toss it on the pile of things I have to teach myself… Seems like it only ever keeps getting bigger no matter how much I learn, though…
Heavy sigh
Once again, I will be looking for alternatives to Signal.
Edit: If it’s just paying for cloud backups, then I don’t care at all
Instructions unclear, day-tay-boss
No, just the person in charge has to order it. People do what their bosses tell them. Rules and procedures don’t matter if the people in charge ignore them. And again, you’re not getting access to any of the data we’re talking about in the first place, because the government would have to grant that access, and you’re not a person as far as they’re concerned in this scenario. What organisations have you worked for that would just give out information to a person they can’t verify the identity of?
No, it’s happening now in the US. You seem woefully under-informed to be trying to comment on current affairs. Maybe stick to your own country until you’re up to speed.