fnafdesktopfan111

joined 10 months ago
[–] [email protected] 5 points 2 months ago

me if i was Tails, or "The Amnesic Incognito Live System", a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity against surveillance, which connects to the Internet exclusively through the anonymity network Tor and is designed to be booted as a live DVD or live USB and never writes to the hard drive or SSD, leaving no digital footprint on the machine unless explicitly told to do so.

[–] [email protected] 5 points 4 months ago

The Warrior's bland acronym, MMI, obscures the true horror of this monstrosity. Its inventors promise a new era of genius, but meanwhile unscrupulous power brokers use its forcible installation to violate the sanctity of unwilling human minds. They are creating their own private army of demons.

[–] [email protected] 19 points 6 months ago

Greenway suggests that the Wobblies stumbled upon this modus operandi as a means of combating the street bands of the Salvation Army and the Volunteers of America, who frequently would drown out Wobbly speakers in a "cacophony of cornets and tamborines." One enterprising IWW organizer, wishing to combat the forces of obscurantist "pie in the sky" theology, "retired long enough to organize a brass band of his own.

Denisoff, R. S. (1970). The Religious Roots of the American Song of Persuasion. Western Folklore, 29(3), 175. doi:10.2307/1498356

[–] [email protected] 4 points 10 months ago (1 children)

my deepest condolences... also don't they re-open public registration on Nov 20? https://shitposter.club/notice/Aa34W1BLFyy3RuBB5M

[–] [email protected] 8 points 10 months ago (3 children)

i don't want to sound mean here, but the whole point of an invite system is that only relatively trusted people can get in. giving invites away to anyone asking for it would mostly defeat the point.

[–] [email protected] 2 points 10 months ago (1 children)

basically an agreement between 14 countries to share signals intelligence amongst one another. effectively, if your data gets captured in Sweden, all the participating states are able to get their hands on it. check out the Wikipedia article for more details on 14 eyes: https://en.wikipedia.org/wiki/Five_Eyes#Fourteen_Eyes

[–] [email protected] 3 points 10 months ago (3 children)

not to discredit what they do and what's been said, but i think it's important to keep in mind (with one's threat model in mind also) that they're based in Sweden, a 14 eyes country.