OneMeaningManyNames

Full time smug prick

  • 40 Posts
  • 247 Comments
Joined 9 months ago
cake
Cake day: July 2nd, 2024

help-circle


















  • This started out as a far-far-fetched construction to attack trans rights. In fact, whoever designed this hoax is Goebbels-level diabolical. If you break it down, it subconsciously re-arranges the notions of self-identification and toilet use, in a way that presents “reckless liberalism” as an immediate threat to normalcy.

    The people who eat this shit up may be stupid, but the people who design it are not. This goes beyond straw-man attack and slippery slope fallacy. It rather combines both into a powerful manipulation technique that bears resemblance to mass hypnosis. They have someone really malevolent on the propaganda payroll, folks.



  • I did not change the title as per community rules. But the title is misleading.

    The full quote was disparaging the public sector employees, suggesting it was “the public sector employees” who perpetrated the Holocaust. You want a quick debunk?

    • The Holocaust was decided by the higher echelons of the Nazi party, including Hitler.
    • Goebbels has written about it in his diaries.
    • Hoess was supervisor in Auschwitz II, and has written extensively about the daily murders in the gas chambers.
    • Himmler gave an infamous speech to raise the morale of the SS who had PTSD from the massacres in the Eastern Front.

    From Wikipedia:

    Reichsführer-SS Heinrich Himmler became the chief architect of a new plan, which came to be called The Final Solution to the Jewish question.[20] On 31 July 1941, Reichsmarschall Hermann Göring wrote to Reinhard Heydrich (Himmler’s deputy and chief of the RSHA),[21][22] authorising him to make the “necessary preparations” for a “total solution of the Jewish question” and coordinate with all affected organizations. Göring also instructed Heydrich to submit concrete proposals for the implementation of the new projected goal.[23][24]

    The plans to exterminate all the Jews of Europe were formalized at the Wannsee Conference, held at an SS guesthouse near Berlin,[28] on 20 January 1942. The conference was chaired by Heydrich and attended by 15 senior officials of the Nazi Party and the German government. Most of those attending were representatives of the Interior Ministry, the Foreign Ministry, and the Justice Ministry, including Ministers for the Eastern Territories.

    After all, I have zero fucks left for Musk: he hates blacks, women, and trans people to a degree comparable to how Hitler hated Jewish people, that his actual antisemitic sentiment would not change a thing. Whether he starts revisiting or denying the death camps tomorrow will surprise exactly zero people. We are past that point.

    There is no ongoing discussion about him being a Nazi or not. He fucking is. As a major propagandist of this despicable operation he will have the same fate as the original Nazi leaders, and that is for sure.

    The tweet in question is to interpreted as vilification of the administrative branch, and serve as positional defense at a moment where he risks being held accountable for DOGE cuts. This is how it should be interpreted.











  • There is a conceptual distinction: Encryption in transit vs. encryption at rest. You may send the packets encrypted to the server, but if they are not encrypted on the server’s file system, anyone can read them.

    The real question is, why do you think governments make such a big fuss about citizens having access to military grade encryption?

    There have been audits of e2ee implementations, and the algorithms used also have some objective properties. I don’t think that I have ever heard in cryptography discussions that backdoors are so widespread that the discussion is moot. I have only heard, time and time again, the opposite.

    Even Apple, in this very occasion, opted to ditch the service rather than backdoor it, and in fact takes the UK to court over this. I think that the opinion that this is all for show is a tad wild, and not very well supported in this occasion.

    Like every cryptology book starts with the adage “There is cryptography that prevents your little sister from reading your mail, and cryptography that prevents the government from reading your mail, and we will talk about the latter.”

    https://blog.cryptographyengineering.com/2025/02/23/three-questions-about-apple-encryption-and-the-u-k/

    On the other hand, not all implementations are created equal. Telegram was recently under fire, and there is a lot of variance in e2ee implementations in XMPP clients, IIRC.