

Maybe they figure if you can’t fix the form to make it submit, you wouldn’t be up to their standard :-)


Maybe they figure if you can’t fix the form to make it submit, you wouldn’t be up to their standard :-)


I think there is some value to MBFC, even though there are also cases where it is problematic - I don’t think a blanket rule would be right.
The issues (& mitigating factors):
So I’d suggest:
If there are reliable sources countering some facts, posting those instead of (or as well as) complaining about the source is probably better.


I think the DNC-ignoring callers are likely scammers imitating the real installers trying to get card numbers. If you paid one, you’d lose your money and not get the system.
The US for years kept the screwworm from spreading back into Panama by maintaining a virtual wall of sterile flies across the Darién Gap, which was a cheap way to protect all of North America.
But then stupid MAGA politics came along, put idiots in charge, and they decided that they’d rather try to protect the Mexico-US border and not give Mexico and Panama the incidental benefit, rather than protecting a smaller border that happened to help other countries. https://www.msn.com/en-us/news/world/we-once-rid-the-us-of-this-nasty-parasite-now-it-could-be-coming-back/ar-AA1DKRSV has some information about how it became a problem again.


The terminology in Aus / NZ is pet (owned by people) vs stray (socialised around people but not owned) vs feral (not socialised to people).
Generally speaking, pets & strays like people - they’ve been handled as a kittens. Pets can become strays and vice versa. But feral cats (past being a kitten) will never become stray / pet (and vice versa) - it is only the next generation that can be raised differently.
While the article is defining feral cats as any cat that isn’t a pet, in reality the vast majority of what it is talking about are truly feral cats - nothing like a house cat.


With the added complication that it’s unlikely that Mangione actually killed anyone - someone killed someone in favour with the Magats, so by their logic, someone has to be killed to send a message.
Like how likely is the story that someone (who looked nothing like the surveillance photos released at the time) was called in by restaurant staff, and despite having allegedly travelled a long distance from the scene of the crime, and many opportunities to destroy everything, had a manifesto confessing to the crime, and the murder weapon still on him? Despite him having no prior inclination towards that sort of thing even?
Hopefully any jury has good critical thinking skills and can see through an obvious set up.


That’s a false dichotomy though. There are ways to prevent cheating that don’t rely on the security of the client against the owner of the device on which the client runs (which is what both of what your ‘ways’ are).
For one thing, it has long been a principle of good security to validate things on the server in a client-server application (which most multi-player games are). If they followed the principle of not sending data to a client that the user is not allowed to see, and not trusting the client (for example, by doing server-side validation, even after the fact, for things which are not allowed according to the rules of the game), they could make it so it is impossible to cheat by modifying the client, even if the client was F/L/OSS.
If they really can’t do that (because their game design relies on low latency revelation of information, and their content distribution strategy doesn’t cut it), they can also use statistical server-side cheat detection. For example, suppose that a player shoots within less than the realistic human reaction time of turning the corner when an enemy is present X out of Y times, but only A out of B times when no enemy is present. It is possible to calculate a p-value for X/Y - A/B (i.e. the probability of such an extreme difference given the player is not cheating). After correcting for multiple comparisons (due to multiple tests over time), it is possible to block cheaters without an unacceptable chance of false positives.


Amazon spokesperson Margaret Callahan described it as “obsolete” and said it “completely misrepresents Amazon’s current water usage strategy”.
Interesting that they don’t say in which direction it misrepresents (is it saying it is too high or too low). Maybe they are hoping the reader will infer from what they are saying that they’re using less now, without them having to say that.


They are not wrong that Israel is radicalised. However, peace is a process, and what will lead to an enduring peace is actually more important than what is just.
If Israel was actually willing to reconcile and treat Palestinians as equals, the South African model of truth & reconciliation (including amnesty for abuses in exchange for full disclosure of what happened), it wouldn’t be just for the victims, but it would allow both sides to move on peacefully.
The real problem is that Netanyahu, Smoltrich, Ben Gvir etc… don’t actually want peace, so even a neutral truth & reconciliation is currently unlikely to happen without their backers (especially the US) forcing them.
What jurisdiction is she in? And (if she knows) what jurisdiction is he in? (Jurisdiction as in country, and if the country has them, state / province). That will make a big difference to next steps.


The whole “crime capital” thing being tacked on to the story is ridiculous. Never let facts get in the way of a good story I guess! According to the ABS, Victoria has the second lowest rate of offenders per capita of any Australian state or territory (order is ACT, VIC, TAS, SA, WA, NSW, NT).
While someone’s political beliefs are highly multi-dimensional, there are two axes that are commonly used to define where someone sits:
Since there are independent axes, there are four quadrants:
That said, some people use tankie as cover for supporting socially authoritarian, economic right but formerly economic left countries(e.g. people who support Putin, who is not economically left in any sense).


I’m not sure why people choose Youtube as their platform to criticise big tech like Google.


Australia doesn’t have that plant, but it has Dendrocnide sp. (Stinging Nettle Trees), which could arguably be worse when it comes to being venomous plants (i.e. plants that have an active mechanism for venom delivery, instead of just being poisonous). Also in the don’t touch category unless you want pain that can last up to a year.
Does she know which Australian state? Likely every state has cyberstalking rules, but it would be a state law.


Cloudflare are notorious for shielding cybercrime sites. You can’t even complain about abuse of Cloudflare about them, they’ll just forward on your abuse complaint to the likely dodgy host of the cybercrime site. They don’t even have a channel to complain to them about network abuse of their DNS services.
So they certainly are an enabler of the cybercriminals they purport to protect people from.


And apparently enforcement of foreign judgements in the US is state-by-state, and the US state doesn’t need personal jurisdiction over the person. So any US state court can decide to recognise a foreign jurisdiction, under local state laws, and all other states will recognise it. So if OFCOM can find one state that will recognise the judgement, then they are in trouble.


I tried asking ChatGPT 4o mini what I could substitute the chloride in sodium chloride with.
It suggested potassium chloride (not responsive to my question, but safe at least), vinegar and yeast first. Then I prompted it that potassium chloride still had chloride, and to keep the sodium but only change the anion. Suggestions (with my commentary in brackets) Sodium Bicarbonate (safe), Sodium Citrate (safe), Sodium Acetate (safe), Sodium Sulfate (irritant - if swallowed get medical attention, do not induce vomiting), Sodium Phosphate (former purgative for colonoscopy prep, replaced with safer alternatives - but probably not super harmful for most), Sodium Lactate (relatively safe).
I then prompted it specifically for sodium halide options. It suggested:
My next prompt tried to force me to log in (which would have selected another model).
I tried a separate time with ChatGPT for GPT-5. It gave slightly safer advice on the sodium halide: “So if you want to keep sodium but replace chloride, halides aren’t really a safe route except for trace iodide in fortified salt”. I then prompted it about sodium phosphate, and then asked it to extend to nitrate, arsenate, and antimonate. It correctly advised that nitrate is only suitable in a preservative blend, and that sodium arsenate and sodium antimonate should not be used in any quantity in food. Regenerating that answer seems to consistently advise not to eat arsenate or antimonate at least!
I am not sure why anyone would use an AI code editor if they aren’t planning on vibe coding.
Vibe coding means only looking at the results of running a program generated by an agentic LLM tool, not the program itself - and it often doesn’t work well even with current state-of-the-art models (because once the program no longer fits in the context size of the LLM, the tools often struggle).
But the more common way to use these tools is to solve smaller tasks than building the whole program, and having a human in the loop to review that the code makes sense (and fix any problems with the AI generated code).
I’d say it is probably far more likely they are using it in that more common way.
That said, I certainly agree with you that some of Proton’s practices are not privacy friendly. For example, I know that for their mail product, if you sign up with them, they scan all emails to see if they look like email verification emails, and block your account unless you link it to another non throw-away email. The CEO and company social media accounts also heaped praise on Trump (although they tried to walk that back and say it was a ‘misunderstanding’ later).
Unfortunately, scams are incredibly common with both fake recruiters (often using the name of a legitimate well known company, obviously without permission from said company) and fake candidates (sometimes using someone’s real identity).
No or very few legitimate recruiters will ask you to install something or run code they provide on your hardware with root privileges, but practically every scammer will. Once installed, they often act as rootkits or other malware, and monitor for credentials, crypto private keys, Internet banking passwords, confidential data belonging to other employers, VPN access that will allow them to install ransomware, and so on.
If we apply Bayesian statistics here with some made up by credible numbers - let’s call S the event that you were actually talking to a scam interviewer, and R the event that they ask you to install something which requires root equivalent access to your device. Call ¬S the event they are a legitimate interviewer, and ¬R the event they don’t ask you to install such a thing.
Let’s start with a prior:
Pr(S) = 0.1- maybe 10% of all outreach is from scam interviewers (if anything, that might be low).Pr(¬S) = 1 - Pr(S) = 0.9.Maybe estimate
Pr(R | S) = 0.99- almost all real scam interviewers will ask you to run something as root.Pr(R | ¬S) = 0.01- it would be incredibly rare for a non-scam interviewer to ask this.Now by Bayes’ law,
Pr(S | R) = Pr(R | S) * Pr(S) / Pr(R) = Pr(R | S) * Pr(S) / (Pr(R | S) * Pr(S) + Pr(R | ¬S) * Pr(¬S)) = 0.99 * 0.1 / (0.99 * 0.1 + 0.01 * 0.9) = 0.917So even if we assume there was a 10% chance they were a scammer before they asked this, there is a 92% chance they are given they ask for you to run the thing.