• 3 Posts
  • 45 Comments
Joined 1 year ago
cake
Cake day: May 8th, 2023

help-circle


  • I can’t find a good source for how many journalists work in Palestine, but in other countries, it is about 0.1% of the population (I couldn’t imagine it would be higher in Gaza given the oppressive conditions).

    That means there are probably about 5,428 journalists working in Palestine (based of 0.1% of 5,428,542, the best figure for Palestine’s population). 64 have been killed since October 7th, or ~1.2% of all Palestine’s journalists (under the estimate based off worldwide journalism figures). Of Palestine’s population, 19,968 have been killed since October 7th, or ~0.37% of the population.

    Doing a two-sample Z-test for proportions on those proportions gives a Z-score of 25.43, which has a P-value of << 0.001 - in other words, if the probability of journalists being killed was the same as for the general Palestinian population, it is vanishingly unlikely we would see a difference in probabilities of being killed this extreme. This is very strong statistically significant evidence that journalists are more likely to have been killed in Palestine than members of the general Palestinian population.

    The question then is why are journalists more likely to be killed? There could be an argument made that journalism is inherently a more risky occupation. However, the vast majority of journalists seem to have been killed at their home, not while filming military action or anything like that. There is a theoretical possibility journalists have stayed closer to the action and are less likely to have evacuated to another corner of Gaza since their job requires them to stay closer to the action. However, the other, probably more likely and much more disturbing possibility is that the Likud (Netanyahu) controlled IDF is intentionally targeting journalists (which is a serious war crime).


  • Probably more likely they dial more calls than they can scam on the basis that a silent hang up call costs them only the cost of connecting the call, but their scammer’s wages cost them more if not enough people answer and there is no one for the scammer to speak to.

    It’s essentially putting the cost of uncertain numbers of people answering onto the victims rather than the scammer - selfish, but so is scamming people!

    Telemarketers do the same thing, although at least they often have to fear their local regulators in many countries if they do it too much, while scammers are criminals who are going to break the law anyway, so I suspect most silent calls are probably scammers.


  • This seems extreme for the long tail of hobbyist apps. Finding 20 testers seems like a huge commitment for an unproven app, and I’m sure it would be a hurdle many apps currently in Google Play would not have gotten across if it existed then.

    I wonder if this is a deliberate attempt to shut out hobby apps from their app store for whatever reason, rather than a good faith attempt to improve app quality.

    In parallel they are also forcing people to publicly attach their real name to apps (people have long had to tell Google who they are to get in the app store, but not to make it public) - which might be another thing that is no big deal for big companies, but many smaller hobbyist app devs might think twice about doxxing themselves given how hostile people are on the Internet these days and how many crazies there are out there.


  • more is a legitimate program (it reads a file and writes it out one page at a time), if it is the real more. It is a memory hog in that (unlike the more advanced pager less) it reads the entire file into memory.

    I did an experiment to see if I could get the real more to show similar fds to you. I piped yes "" | head -n10000 >/tmp/test, then ran more &lt; /tmp/test 2>/dev/null. Then I ran ls -l /proc/`pidof more`/fd.

    Results:

    lr-x------ 1 andrew andrew 64 Nov  5 14:56 0 -> /tmp/test
    lrwx------ 1 andrew andrew 64 Nov  5 14:56 1 -> /dev/pts/2
    l-wx------ 1 andrew andrew 64 Nov  5 14:56 2 -> /dev/null
    lrwx------ 1 andrew andrew 64 Nov  5 14:56 3 -> 'anon_inode:[signalfd]'
    

    I think this suggests your open files are probably consistent with the real more when errors are piped to /dev/null. Most likely, you were running something that called more to output something to you (or someone else logged in on a PTY) that had been written to /tmp/RG3tBlTNF8. Next time, you could find the parent of the more process, or look up what else is attached to the same PTS with the fuser command.


  • The quote from the article has it right: “They are human beings. They have bad leaders, like us. We can throw away the leaders on both sides and make peace in a matter of minutes”.

    Hamas and Likud are the instigators of this, and they actually both want to entirely destroy the other side rather than a peaceful resolution. To quote Hamas’ 2017 charter: “Hamas rejects any alternative to the full and complete liberation of Palestine, from the river to the sea” (noting that means the complete destruction of Israel). To quote Netanyahu: “Anyone who wants to thwart the establishment of a Palestinian State has to support bolstering Hamas and transferring of money to Hamas… This is part of our strategy”.

    Deliberately killing civilians is never okay (which both sides are doing - see the article, and Hamas are safe in their tunnels and it has become a trope that after killing many civilians Likud people just automatically claim it was Hamas HQ, with no credibility), and neither side has a right to target civilians.




  • I read the article expecting some kind of hateful comment, and it turns out she was on the side of civilians over Likud and Hamas - which I think is a refreshingly well thought out position. I’d question whether she is really losing fans overall, or if this is just clickbait. Haters are always going to hate, but just because a few people criticise someone doesn’t mean there is a net trend against them.





  • Data being public (and privacy in general) shouldn’t be ‘all or none’. The problem is people joining the dots between individual bits of data to build a profile, not necessarily the individual bits of data.

    If you go out in public, someone might see you and recognise you, and that isn’t considered a privacy violation by most people. They might even take a photo or video which captures in the background, and that, in isolation isn’t considered a problem either (no expectation of privacy in a public place). But if someone sets out to do similar things at a mass scale (e.g. by scraping, or networking cameras, or whatever) and piece together a profile of all the places you go in public, then that is a terrible privacy violation.

    Now you could similarly say that people who want privacy should never leave home, and otherwise people are careless and get what they deserve if someone tracks their every move in public spaces. But that is not a sustainable option for the majority of the world’s population.

    So ultimately, the problem is the gathering and collating of publicly available personally identifiable information (including photos) in ways people would not expect and don’t consent to, not the existence of such photos in the first place.


  • Note that “Reclaim The Net” is very shady and unlikely to be a legitimate civil rights organisation.

    Firstly, they display bias; they only ever say positive things about Donald Trump, Mike Pence, and Ron DeSantis, and spin most things in whatever way helps the far-right in the US. They are silent on any Internet related civil rights issues that reflect poorly on the US far-right, or reflect well on central or left parties. Contrast this to more authentic organisations, which criticise things from all over the political spectrum.

    Secondly, they prioritise collecting your personally identifiable information over advocating for civil liberties. Some of their articles are behind a registration wall where you have to give at least an email address to see the content.

    Thirdly, however, they don’t tell you who they are, and go to lengths to hide it. Whois privacy, author names are likely pseudonyms, only contact is an email, no information about governance structures. There are legitimate reasons to be pseudonymous, although given how keen they are to collect data on visitors, it is a bit hypocritical!

    I believe there is a network of single-interest sites the far-right use as hooks to try to gather people with a range of different reasons for being dissatisfied, where the next step is to try to radicalise them and line them up behind Trump.




  • Not all Israelis are Likud, and not all Palestinians are Hamas. The problem is not the ‘sides’ being ‘mean’ to each other (quotes used because I think your choice of language trivialises the atrocities being committed by both sides), it is the civilians who are not part of Likud or Hamas being dragged into it.

    The entire situation in Israel / Palestine is primarily a tale of escalatory tit-for-tat, and politicisation of hate, all starting from a relatively small initial grievance. Netanyahu showed himself when he deliberately provoked conflict in 2021, causing harm to civilians on both sides - in that example, it was blatant how willing he was to cause this much suffering for such a selfish reason, but that boldness only comes because Likud has been doing the same thing only slightly more subtly for years. So when Hamas commits war crimes, it was predictable that Likud would treat it as an opportunity to commit a bigger war crime and try to genocide the Palestinians in Gaza.

    Neither Likud or Hamas want an enduring peace - their entire political relevance is through escalation. But the way to get peace is not by further escalation of violence / war crimes. The best way out of this is for the people of Israel and Palestine to say no to Likud and Hamas respectively, and pick leaders who want and know how to de-escalate.



  • Programming is the most automated career in history. Punch cards, Assembler, Compilers, Linkers, Keyboards, Garbage Collection, Type Checkers, Subroutines and Functions, Classes, Macros, Libraries (of increasingly higher-level abstractions), Build Scripts, CI/CD - those are all automation concepts that do things that theoretically a programmer could have done manually. To build all the software we build now would theoretically be possible without any automation - but it would probably require far more programmers than there are people on earth. However, because better tech leads to people doing more with the same, in practice the number of programmers has grown with time as we’ve just built more complex software.


  • Having to have a trustworthy notary interactively as part of the protocol during the TLS request seems like it shuts out a lot of applications.

    I wonder if it could be done with zk-STARKs, with the session transcript and ephemeral keys as secret inputs, and a CA certificate as a public input, to produce a proof of the property without the need for the notary. That would then mean the only roles are TLS server, prover, and verifier, with no interactive dependency between the prover and verifier (i.e. the prover could generate the proof first, that can non-interactively verified at any time later by any number of verifiers).


  • Phones have a unique equipment identifier number (IMEI) that they share with towers. Changing SIM changes the subscriber ID (IMSI) but not the IMEI (manufacturers don’t make it easy to change the IMEI). So thieves (and anyone else) with the phone could be tracked by the IMEI anyway even if they do that, while leaving the phone on.

    In practice, the bigger reason they don’t get caught every time if they have inadequate opsec practices is that in places where phone thefts are common, solving them is probably not a big priority for local police. Discarding the SIM probably doesn’t make much difference to whether they get caught.