A third party with our FPTP voting system will cause an inevitable spoiler effect, which will lead to Trump winning his inevitable third term run (if he even bothers with an electoral process and doesn’t just instill himself as king).
A third party with our FPTP voting system will cause an inevitable spoiler effect, which will lead to Trump winning his inevitable third term run (if he even bothers with an electoral process and doesn’t just instill himself as king).
Unless we have a left Tea Party. Just look at how successful the Tea Party was at forcibly taking over the RNC.
I wish parties would just die and that we can use a better voting system, but we need a path to get there.
The same Wikileaks documents also show that Hillary and the DNC rigged the primary against Bernie (very briefly mentioned in the article).
I can use dd after running “lsdvd” on CSS protected DVDs.
I have no idea why it works.
Wow. That bad, huh?
Privacytools.io actively promotes VPN services that advertise heavilly on YouTube, and have no good track record, like NordVPN (which is at the top of their list of VPNs), which leads me to believe that they are paid by NordVPN to promote their service.
Mullvad (the most trustworthy VPN IMO in terms of track record) is at the bottom of their list.
At the top of their main website, they also have Incogni as a recommendation with what looks to be a referral link. They also have a referral link for Startmail, Internxt (whatever that is), and probably others as well.
On their front page: “Sponsors can be exempted from the criteria.”
Anyone trying to recommend privacy services who also accept sponsorships are not trustworthy.
Also, on their crypto page, they recommend both AgoraDesk and LocalMonero, both of which shut down last year, which leads me to believe that some of their information is also out of date.
When I look at PrivacyGuides, I see none of these issues, so I recommend PrivacyGuides over ptio. In fact, on their VPN page, not only do they recommend relatively trustworthy VPNs, but they also have a big red warning about VPN usage and what to expect in terms of privacy that ptio does not have.
Don’t feed the troll; it’s not worth it.
Indentured servitude has a specific definition to mean working without pay under a contract.
Don’t get me wrong, this is still slavery, but we are all literal slaves to our wages in a capitalist system.
What this post is describing can better be defined as terrorism, which is the use of or threat of violence for a political or religious reason.
Since it’s a combination, maybe we can come up with a new term for it, like “slave terrorism” or something.
You also might be sent away by not showing up for work if the boss feels like sending ICE to your home.
Can we just call this what it is? Terrorism.
Hard to strike/quit in protest when you live paycheck to paycheck and unions have been demolished over the span of the past 60-ish years.
Some people take respect to mean treating other people as equals. Other people treat respect as an excuse to exploit people, like they should be treated as superiors.
I believe the quote went something like, “If you don’t treat me with respect, then you don’t deserve respect,” meaning, “If you don’t treat me as an authority, I won’t treat you as human.”
As always, the more a person wants power, the less that person deserves it.
Yeah. Embellishing the truth is a much better strategy for job seeking.
I still think PWAs are a good idea instead of needing to download an app on your phone for every website. Like, for example, PWAs can easilly replace most banking apps, which are already just PWAs with added tracking.
Looks like somebody has a case of the Mondays.
The Pentium Pro came out in 1995. This is dropping support for CPUs that came out before then. The 486 came out in 1989.
I personally think 36 years of support is long enough.
microG is an open source, reverse engineered replacement for Google Play Services on Android. It still connects to Google servers, though.
GrapheneOS doesn’t use it because they came up with an effective Sandboxing solution, and microG requires spoofing the signature to make applications believe that the service was signed by Google, which introduces a potential attack vector.
Yeah, exactly, and they know it. How else would they have been able to shift further and further right over the span of 35 (ish) years?