• 0 Posts
  • 18 Comments
Joined 1 year ago
cake
Cake day: June 10th, 2023

help-circle






  • MetaCubed@lemmy.worldtoLinux@lemmy.mlBtw
    link
    fedilink
    arrow-up
    1
    ·
    3 months ago

    I’m going to very sincerely disagree. You can see it as misinterpretation if you like, but I believe there’s functionally no difference between the two statements you’ve provided and as long as the right is trying to come up with any excuse to outlaw our existence, its optically beneficial to come up with ways of educating people who may be “eggs” about being trans/enby that are informative, but are less likely to fuel a deranged groomer witchhunt. I’m glad it helped you and your friends, but given the political climate, I believe we should avoid terms that endanger us more than needed.

    Continue using it, I certainly won’t stop you. But I’m not going to start.



  • MetaCubed@lemmy.worldtoLinux@lemmy.mlBtw
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    3 months ago

    Frankly idgaf about the prime directive (edit: this is perhaps an exaggeration, I meant I wasn’t necessarily referring to the prime directive) , but as an enby person, I think going around saying “doing this makes you an egg” is pretty antithetical to people not wanting to be judged for not complying with the gender roles that correspond with their assigned gender.



  • The point of the puberty blockers is to allow the child to explore the identity they have chosen without locking them in either way.

    Its not like kids say theyre trans and they get hormones the same day.

    • come out to their parents or guardian
    • go to therapy for months to get diagnosed with dysphoria
    • start puberty blockers for months to literal years, doing counselling/therapy the whole time
    • reach the age that further intervention is allowed,(usually 16-18) they either go forwards with further transition, or
    • stop the puberty blockers and go through a late but otherwise normal puberty.


  • The point is that if someone really wants to get into your device, they will. It doesn’t matter if youre using open source firmware, in a custom implementation of linux, on a MIPS CPU, and you personally build every package from source and complete a compliance code review before installing it, etc.etc.etc. If government agency x is targeting you specifically, your best line of security is to lock your device in a safe, take a boat into the middle of the ocean, and then dump it at an unrecorded location and never retrieve it.

    A device is only secure as long as you are not using it, and it is not accessible physically, or by network.

    You do you dude, I’m just saying your advice is awful for the average user.



  • Does your threat model involve The Mossad? There’s no way on earth that you are genuinely remembering multiple 512 byte random passwords, let alone actually taking the time to type them in.

    Having a password manager, with MFA, a strong master password, and rule based device verification is ultimately more secure as you can have every password be randomized.

    Best practices are best practices for a reason. I recommend you follow them.


  • Genuinely terrible advice. Every popularly available password manager service hashes all your passwords, if they have a data breach they have extremely strict reporting compliance and the majority of services will re-hash all your passwords. If youre so extremely concerned about that, host your own.

    But what concerns me the most is

    Unless they specify they only store the hash I refuse to sacrifice one of my strong passwords.

    … What to you mean sacrifice?