• 1 Post
  • 28 Comments
Joined 1 year ago
cake
Cake day: June 26th, 2024

help-circle





  • Which of these should be contested and which should be validated?

    Identities don’t really need to be either validated or contested, especially if the person didn’t ask for it. Validation will likely win you more friends, though.

    Obv use their preferred names and pronouns to be respectful, as with any person. But beyond that, there’s really no need to get involved in their identity at all. It’s a deeply personal thing and it’s unlikely they’ll change it for anyone other than themselves.











  • In 1954, President Dwight Eisenhower signed the Communist Control Act into law. In theory, this outlawed the Communist Party of the United States and banned communists from serving in certain roles.

    WTF

    [It passed because] many opposed communism because of its explicitly declared and historically demonstrable goal to undermine liberal democracy. In the words of Ernest van den Haag, there was “no place in democracy for those who want to abolish [it] even with a peaceful vote”.

    • Wikipedia

    The irony of using it here would be palpable



  • I know the author will probably never read this, but in the off chance they or someone else working on open source accessibility reads it:

    Thank you. So much ❤️ Your hard work and dedication keeps me going when times get rough.

    And thanks for the rant. Nobody should have to suffer in silence, and that includes you. So any time you want to rant at us leeches about working in open source, please don’t hesitate to put us in our place.

    I hope that we find a way to make the internet a more positive and celebratory place for people like you who do hard work the rest of us don’t have the time or energy for.




  • Context: I worked in IAM (computer security) at a past job.

    In computer security, we don’t wait to get proof that a vulnerability was exploited. We have to operate under the assumption that any vulnerability was immediately exploited, and take immediate action to fix it and limit the impact. Doubly so when the stakes are high.

    We need popular support to get real security experts to investigate these claims. If there was even a single path that could have led to a vulnerability of this scale, we need to completely secure these systems and do an immediate recount/re-vote.

    I’ll also say, I was surprised to learn that these voting systems and their specs are not fully public and open source. That alone makes me very uncomfortable. Security through obscurity is not security at all.