• 0 Posts
  • 68 Comments
Joined 2 years ago
cake
Cake day: September 15th, 2022

help-circle
  • He also came with some pretty good receipts that appear to show .ml mods removing criticism of China that, whether you agree with it or not, didn’t seem to violate any rules, and was well within the bounds of what most people would consider civil discourse.

    but what he showed seems legit, and I’m not sure he could have provided more evidence without encouraging brigading.

    Based on just your link, it just kinda looks like he was posting unsourced gore. That doesn’t feel like civil discourse to me.

    I don’t really see any criticism being removed. If Katana314’s message was congruent with reality it would count, but otherwise just making accusations isn’t criticism.







  • That’s actually not true. When you cut/paste a file on your computer (for most computers), it’s much faster than copying the file. Deleting the file is also not instant, so copy and delete should be the slowest of the three operations.

    When you cut and paste a file, you’re just renaming the file or updating the file database. It’s different how that works depending on your file system, but it typically never involves rewriting much of the data of the file.

    Edit: Fixed typo.



  • ITT people claim that a Google VPN is a bad product for all use cases because Google is not a privacy-respecting company. This ignores all non-privacy use cases for using a VPN.

    And even for privacy, this would’ve been a product where the vendors interest in protecting your privacy and your interest in protecting your privacy aligned in the case where you were not hiding from Google. For example if you used a Chromebook laptop, used the Google Chrome browser, or used Google services like Google Search and Google YouTube, then Google would already know everything about you. You can’t hide your activity from them, but they can help you hide it from others.

    Similar situations exist for other privacy disrespecting companies like Microsoft and Apple, where a user might reasonably want to hide from everyone other than their vendor of choice, whose product they consider good enough to allow them to see their computer activity as part of their payment. If you already subscribe to one privacy disrespecting vendor, it makes the most sense to go all-in.


  • If a device makes an encrypted connection to a server the device makers own, there’s nothing further you can gleam from studying the DNS lookups. They can route traffic through the first server, and they can resolve any IPs through the first server. And since you insist the person you’re replying to doesn’t know what DNS is because they said it’s encrypted, I feel you might also not know that DNS can be encrypted. In that case, the network owner can see that a device makes a connection to the nameserver, but they can’t see which addresses the nameserver was asked to resolve. And similarly, the device can refuse a connection to the wrong nameserver.