• 0 Posts
  • 150 Comments
Joined 2 months ago
cake
Cake day: March 20th, 2025

help-circle
  • Like corpses. And corpses don’t tend to be particularly strong or fast once they start rotting. Unless there’s some sort of magic involved to stop the decomposition process, they’ll likely all die out as they rot. The fresher zombies will take a few weeks to become inert, but that’s a blip in the radar in the grand scheme of things.

    But the bigger issue then becomes what caused it. If it was something like a prion disease, (like Mad Cow Disease) then you’re likely fucked even after the zombies all rot; Prions don’t decompose, and (if the zombie outbreak was big enough) you’re almost guaranteed to catch it via dirty soil exposure (either directly, or via tainted produce that was grown where a zombie died) eventually.




  • So there’s… Uhh… Quite a bit wrong with this.

    I have heard people use reputable VPN’s like Mullvad, Proton, etc. for daily usage to obscure their traffic/IP… protect ourselves from malware (a side benefit many VPN’s).

    A VPN won’t protect you from malware. The only thing it does is encrypt your traffic to/from the VPN server, and mask your WAN IP address. The encryption will help protect you from a hostile network, (like your work WiFi spying on what sites your phone is accessing) but it won’t stop you from downloading malware. The largest reason to use a reputable VPN is because you’re running all of your traffic through their servers. You want to know that they’re not just selling all of that data to the highest bidder; If you’re not the customer, you are the product. When searching for a VPN, you’ll want to find one that supports port forwarding, because a torrent can only connect if at least one of you has an open port. You don’t want to rely on random seeders to have open ports, so forwarding your own port ensures you can connect.

    I have also heard uploading (seeding) is where you really get in trouble with the law in many jurisdictions, as opposed to downloading (leeching), so it’s important to know the laws that apply to you.

    This part is largely correct, though it will depend on where you live. Generally speaking, uploaders are penalized more heavily than downloaders. The issue is that you can’t torrent without inevitably doing both. The torrent protocol literally doesn’t allow you to block all seeding. You can restrict it down to a tiny amount of bandwidth in your torrent client, but you can’t just outright disable it.

    Killswitches are important as well whenever using a VPN. This helps prevent leaks. I have never seen a major VPN that did not have this feature baked in.

    This is where things veer into the “dangerously untrue” territory. A VPN kill switch will not protect you from IP leaks. A VPN simply creates its own network interface, and tells programs to use it. But when that connection drops, there’s nothing stopping programs from just using your regular interface before the kill switch kicks in. You need to bind the torrent client to the VPN directly. This must be done directly in the torrent program, not from the VPN’s kill switch option. By binding the torrent program directly to the VPN’s network interface, the VPN won’t be able to connect unless the VPN is enabled.

    You can check for IP leaks using a few different websites (Google it).







  • I don’t, for a variety of reasons. Whether it’s apathy, feeling like their vote doesn’t matter, or just outright disenfranchisement, the non-voting block is pretty reliable in that they simply don’t vote.

    What changes from one election to the next is more focused on which people don’t vote. If there’s a hot topic that someone cares about, they’ll be more likely to jump through hoops in order to actually cast a ballot. The percentage of non-voters remains relatively stable, but the demographics of those non-voters tends to shift over time. So if one party can incite a particular group to vote, that’s usually considered a win.

    You see it with voting pushes all the time. Souls to the polls, the league of women voters, felon re-enfranchisement groups, etc… All focused on getting different demographics to actually vote, because those particular demographics (whatever they are) tend to align with the group’s political beliefs.


  • Yup, it’s the typical conservative playbook: If you don’t like something, redefine it as something unpopular. Then target the unpopular thing, so democrats can’t oppose it without inciting “this democrat voted against a bill to protect/stop {sympathetic demographic} from {unpopular thing}” smear campaigns.

    Step 1 was equating trans people with sexual predators. You keep that messaging consistent and constant. Find stories of trans people doing normal things, but spin it as if they’re dangerous. Invent stories if you need to, because debunking them takes a lot more time than inventing them…

    They weren’t jogging in a neighborhood; they were casing the neighborhood. They weren’t using a public restroom; they were looking for people to sexually assault. They weren’t trying on clothes to see if they fit; they were looking to assault women and children in the changing rooms. They weren’t volunteering for the local women’s shelter; They were looking for defenseless victims. They weren’t writing a book for other trans people; They were indoctrinating kids and trying to turn them trans. Et cetera, et cetera…

    Once conservative voters have started to accept that messaging, you move onto step 2:
    “This bill will protect children from sexual predators” means it bans trans people from being able to pee.
    “This bill will protect children from being exposed to dangerous sexual material” means it bans any kind of trans iconography by labeling it as porn.
    “This bill will stop sexual predators from hiding in your neighborhood” means it requires trans people to register in a public database/wear a {pink triangle} badge.
    “This bill will ensure sexual predators are kept away from the rest of the population” means it rounds trans people up into camps.

    And if anybody ever tries to point out what the bill is really doing, put them on blast with the “radical left is trying to let sexual predators steal your kids and assault your women” messaging.










  • Also, add backslashes before asterisks if you’re going to use them like that. Lemmy uses MarkDown for its markup, and asterisks or underscores around a word or section will italicize it. But a backslash will cancel any formatting for whatever special character follows it.

    So *this* turns into this, but \*this\* turns into *this*.

    (Also, I had to use three backslashes to make \*this\* appear. The first backslash cancels the second, which makes it appear. Then the third backslash cancels the asterisk, which makes it appear. So when the comment is posted, you’re actually seeing the second backslash of three, and the cancelled asterisk.)