• 0 Posts
  • 35 Comments
Joined 1 year ago
cake
Cake day: June 10th, 2023

help-circle




  • I edited one word of my comment because I had another reply from someone who misunderstood what I was referring to, so i clarified so there wouldnt be further confusion, not to give myself an excuse to be snarky.

    • I’ve read the article you’ve provided a number of times previously and while yes, it does indicate that there is no scientific evidence for my claim, it is limited to the UK.

    • I don’t see what interbreed-ability has to do with invasiveness?

    I don’t care about some American publication talking about cats

    • I provided 3 sources, one was American, the others were from Oxford (also in the UK last I checked) and Tillburg (Netherlands), both discussing the EU broadly

    • Here is another study from the checks notes British Ecological Society which concludes in part

    “…It is also well established that free-ranging cats pose a significant threat to biodiversity conservation and restoration worldwide, and that remedying this threat is relatively easy when compared to other drivers of biodiversity loss…”

    If you’re not going to read the evidence I’m providing, while saying I’m only providing americentric evidence, then I’m going to respectfully abandon this thread. I apologize for the snark, that was uncalled for.

    Edit: formatting only




  • Except plastic straws aren’t actively hunting marine creatures.

    Domesticated cats are not native to north america and western Europe, and people should be more responsible in how they care for their pets, especially the ones that are invasive fucking species.

    Also, 2 things can be true. It’s possible that bird populations are being decimated by ecological destruction as well as the mass breeding and free roaming of invasive predators introduced by humans.

    Edit: clarified that I meant domesticated cats




  • MetaCubed@lemmy.worldtoLinux@lemmy.mlBtw
    link
    fedilink
    arrow-up
    1
    ·
    8 months ago

    I’m going to very sincerely disagree. You can see it as misinterpretation if you like, but I believe there’s functionally no difference between the two statements you’ve provided and as long as the right is trying to come up with any excuse to outlaw our existence, its optically beneficial to come up with ways of educating people who may be “eggs” about being trans/enby that are informative, but are less likely to fuel a deranged groomer witchhunt. I’m glad it helped you and your friends, but given the political climate, I believe we should avoid terms that endanger us more than needed.

    Continue using it, I certainly won’t stop you. But I’m not going to start.



  • MetaCubed@lemmy.worldtoLinux@lemmy.mlBtw
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    8 months ago

    Frankly idgaf about the prime directive (edit: this is perhaps an exaggeration, I meant I wasn’t necessarily referring to the prime directive) , but as an enby person, I think going around saying “doing this makes you an egg” is pretty antithetical to people not wanting to be judged for not complying with the gender roles that correspond with their assigned gender.






  • The point is that if someone really wants to get into your device, they will. It doesn’t matter if youre using open source firmware, in a custom implementation of linux, on a MIPS CPU, and you personally build every package from source and complete a compliance code review before installing it, etc.etc.etc. If government agency x is targeting you specifically, your best line of security is to lock your device in a safe, take a boat into the middle of the ocean, and then dump it at an unrecorded location and never retrieve it.

    A device is only secure as long as you are not using it, and it is not accessible physically, or by network.

    You do you dude, I’m just saying your advice is awful for the average user.



  • Does your threat model involve The Mossad? There’s no way on earth that you are genuinely remembering multiple 512 byte random passwords, let alone actually taking the time to type them in.

    Having a password manager, with MFA, a strong master password, and rule based device verification is ultimately more secure as you can have every password be randomized.

    Best practices are best practices for a reason. I recommend you follow them.