A mess of a girl, free on the internet. A spicy meatball indeed :3

  • 0 Posts
  • 80 Comments
Joined 9 days ago
cake
Cake day: March 16th, 2026

help-circle
  • the law wouldn’t hold up in court anyway. its not practical for any ecosystem outside online sites.

    accounts and users are the same thing, despite what the law says. it also doesn’t different a person from a user, meaning a compromised system that is complying with the law, its actions represent the user, and the account holder is held responsible.

    its made to absolve meta/Microsoft/google from their actions in targeting kids with intentionally addictive content and making the “account holder” at fault.


  • they will anyways. first person that gets found lying or disables it, they target the distro.

    the law was written to make compliance the metric for dissidence. all “users” are minors. identities flagged as not a minor is a lie, as users cannot be minors only “account holders”.

    it’s not written to support the Linux ecosystem. it’s specifically worded to exclude and target the Linux ecosystem if it tries to comply without using meta/google/Microsoft to handle accounts.



  • because it’s all part of a larger project to collect usable data. you can’t force standards, but you can force laws.

    if you build a standard and no one follows it. then it’s wasted time and money. Meta, Google and Microsoft all have a vested interest in user data. more so with law enforcement buying it in bulk to build identity profiles of /individuals/.

    if tomorrow they got added to the law to store and transmit a string of your government ID, would you be more resistant?

    the issue is, VPNs hide your ISPs assigned IP. till now there has been a higher difficulty in differentiating traffic from the same IP with similar metadata. the more user specific metadata that’s added, the easier it is to differentiate devices and users.

    this makes targeting specific devices with malware for spying significantly easier. at the very least.

    but at a bigger point of view, it gives provable cause because the way the law is written implies every user that installs the OS becomes a OS distributor and every user is a minor by definition, even if the API flag says otherwise.

    I recommend you read that again and if the words “probable cause” don’t come to mind you don’t understand the risk of a “minor” identifying as a adult.


  • yes. every time in the history of gnu software when a function is added without a purpose its for a later feature.

    otherwise there is no need for the form? since when do we leave empty forms in software that can be used to store strings, that hold no meaning…

    only two uses for this. to implement the full API later or to have a string the user normally does not see that becomes a perfect place to store malware. full stop.

    complying with the API is a act of absolute stupidity…



  • depends on how it’s declared and transported. as there is classes for each type.

    surprisingly, I believe jewelry and personal goods is the lowest tax bracket. which technically applies to alot of things even electronics.

    obviously every nation is different, but you have to be careful in how things are declared, otherwise they may be just flat out rejected because it wasn’t bought inside your nation. (censorship controls apply to imported goods like media, toys, magazines, electronics goods, and household items. it’s best to treat each thing not as what it actually is but what it’s made from to avoid refusals and overtax due to poor import system that blindly denies.)



  • as soon as food starts the process of production, before it even hits a preparation or cooking surface it has bacteria on it. nothing is completely clean.

    freezing, washing and cooking ingredients reduces these or makes them go dormant. but it does not get rid of them entirely.

    when it’s plated and served, that bacteria is already stating to revive and reproduce. by the end of a meal, between all the new nutrients from the human body added to the plate from the utensils, the leftover food is a breeding ground. this is why leftovers are generally considered risky if not handled properly.

    you simply cannot reliably disinfect them and the only things you can do is store it in a chilled environment to slow bacterial growth and reheat to aid in killing some but not all of that new growth off.

    if you start mixing these together, the salavia, which is unavoidable as spittle occurs whether you notice it or not, and trace amounts are on your utensils from mouth contact. plus any airborne contaminants from the person are in the food.

    it basically becomes a Petri dish. as it’s a perfect microcosm for bacteria and mold…

    we used to grow mold, yeast and fungus by spitting on potatoes and rice. to later harvest it. we understand it well.




  • it’s government backed, their for the government knows every time it’s used and it identifies you…

    when a service requests to use it, it becomes correlation data… this is data both the government and the application developers can use to identify you on the internet.

    It may mean nothing today, but I can and will if either the application switches developers to a nation who uses this information for nefarious means. or if your government changes policies to something intentionally nefarious.

    blind trust is never good.



  • my life partner, had a coworker suddenly die in their sleep, for no decernable reason. they were 32 and in near perfect health. exercised, are healthy, had good work/life balance and didn’t use drugs…

    reality’s is cruel, there is a reason billionaires set the retirement age so late…

    live today, tomorrow is not garuanteed. that’s why they are working you to death today.





  • ?? I’m not following. sure you can run arm based CPUs as a mobile device, but performance of large applications or x86 applications is poor.

    there is also the addressable memory space issue that exists due to most arm core designs targeting phones… the bus is super limited, despite the architecture technically supporting much much more.

    current RiscV cores suffer this same flaw as well.

    the reason arm cores have better battery life is they are designed with phones in mind… not a desktop cpu. x86 mobile CPUs are cut down desktop CPUs with tdp restrictions. there is a massive difference as a result.

    we are talking completely different design philosophies. it’s like comparing a ebike to a sports car… sure the ebike gets great energy economy when you scale the batteries. it’s half petal powered and has tiny draws on lightweight frame. it’s apples to oranges.

    motorcycles would be more apt, but for arm, none really exist outside of obscenely priced workstations.


  • Microsoft was '81 for acquiring DOS (and that’s technically a lie, they didn’t have the source code for several years later. but it’s how they convinced IBM)

    both MS and Apple were living BASIC at this time. Basic is not a operating system, it’s a pre-compiler environment. it’s designed to let you run code directly without machine code. as assembler and C was not a thing or rather licensed yet.

    BSD specifically Netbsd exists as they were part of the invention of C code. BSD was ported from assembler/machine code to be portable with C.

    MSdos, which Microsoft acquired by buying Qdos (aka 86dos), was written by a developer who stole most of the code and copied the rest from a existing operating system (which I cannot recall at this time). both were In negotiations with IBM. just Microsoft lied through their teeth to get the contract and won.


    apple at the same time had fallen behind. the Lisa and apple II were still running a basic interpreter on top of ROMMON. Wozniak who wrote ROMMON and later large portions of apples next two OSes including OSx. kept pushing to get a actual Unix like Operating system on the device.

    however Steve jobs was cruel, and demanded no new changes… it’s why Wolfenstein was nearly out before a true OS existed from Apple… Steve had a long history of trying to control advancement through forcing model version advancements with weaker hardware than the previous so you would be encouraged to upgrade.