![](https://lemmy.cringecollective.io/pictrs/image/e28e7924-e083-4a2d-bd23-9edd290033a4.png)
![](https://lemmy.world/pictrs/image/0943eca5-c4c2-4d65-acc2-7e220598f99e.png)
- They can literally keep a dead guy on the ballot. Then the vice president would take over immediately upon inauguration.
- The Democratic Party could quickly pick a different candidate and have that person run and beyond the ballot.
Who is it? Just rando or some reference?
ELI5 pls
So basically the perfect question for the internet?
So you admit that I’m the one with the correct concept of a phone?
Also the fire alarm battery was dead, and the entire thing was an analogy anyway.
Either way out of courtesy, I will retire from this battle of wits; it appears you’ve come unarmed.
Oh, so if there’s a fire in the building I should quietly slip a note under your door and assume you got it?
^^ This guy got chased out of the temple by a furious Jesus Christ /s
As I have stated I only call if it’s an emergency (I’m in an accident, im in danger, someone else is hurt) or it’s time sensitive (someone has face value Taylor Swift tickets at work, want me to get them for you?) I almost always text first, wait 5 min then try calling, I’m not a monster.
I find it pretty self important of people to cut off last resort real time communication with close friends and family because you think 2 minutes of your day is that much more important.
You can configure unknown numbers to go to voicemail. Heck you can make it so that only a certain subset of people ring.
Shame on you for blocking everyone instead of learning how to filter communication, and double shame on you if you get mad when you missed something that someone was trying every possible method to get a hold of you.
Dear Sir / Madame I am writing to inform you of a fire at 123 Carrington Road. Looking forward to meeting you. Yours Truly Morris Moss
If I’m calling it’s an emergency or extremely time sensitive. Otherwise I text. I can understand when you don’t want app or even text notifications. But understand and accept the risk that comes with it.
What pisses me right the fuck off is when I call, then call again, then text, then text again, and you, “mr/mrs im so important I can’t be bothered by notifications” are somehow offended at me because you missed out on something because you didn’t bother properly configuring two calls in a row from a known contact through your deny-by-default filter.
Those people, family or not, can fuck right off.
I don’t like telemarketing or spam calls. But I also take responsibility and check if it’s actually important. It’s nbd to me to hang up on a spam call. And to be honest I have gotten a fair share of legitimate calls from numbers I don’t recognize.
TL;DL Answer ya damn phone, you damn well know tiktok and insta still gonna be there 5 seconds from now
Charlton Heston Bonus Round:
Правда?
But this user plans to leave ping running all the time to check that their own Internet connection is working.
Either way, at any given time there’s tons of traffic leaving your network, it just means that software is active, not that a human is active. On top of that, Cloudflare probably isn’t selling the fact that an ICMP ping was received at their DNS server directly to spammers quickly enough for them to act and put an email at the top of your inbox, assuming that spam isn’t caught by a spam filter first.
FPS are an adventure/puzzle game where the only solution is “USE GUN ON MAN”
If the other traffic is already correlated to your IP, then what additional info does an ICMP echo leak?
ICMP doesn’t reveal any personal details. As opposed to say when you visit with the web browser where you can be fingerprinted, and perhaps have that tied to the rest of your browsing history or real world identity.
You make it seem like the US’s market will need to experience the same thing eventually.
You make it seem like it didn’t already: The US market didn’t reach its 1929 peak again until 1954. 25 years is a long time to hold out on withdrawing your retirement investments.
Here’s two other modern markets:
The Athens Stock Exchange had peaks in the 2000’s that haven’t recovered.
Ukraine’s stock market has ceased operations since the invasion.
These events are rare, but not unheard of.
It becomes gambling when you are going on gut feelings without researching what you’re doing.
If you have an investment strategy that financial advisors approve of, let’s say investing 70% in a US index fund, 20% bonds and 10% high risk mutual funds that you don’t touch for years or decades, that’s investing.
If you’re just randomly picking stocks, buying and selling in order to make a quick buck because of some guy screaming at you on television without any real research into a company other than a few google searches, that’s gambling.
I want to remind everyone that there is no guarantee that the market / index funds continue to go up. It hasn’t happened in the US market, but look at the Nikkei over the last 30 years - if you had invested in the 90s you would only now be getting some of your money back - that is a long time.
THIS IS THE HILL I DIE ON.
No one has ever recovered overwritten data, as far as anyone can tell. Go look it up. The technique was only a theoretical attack on ancient MFM/RLL hard drive encoding (Gutmann’s paper). Even 20 year old drives’ (post 2001, approx) magnetic encoding are so small there isn’t an ‘edge’ to read on the bits. A single pass of random data is sufficient to permanently destroy data, even against nation-state level actors. Certainly enough for personal data.
from https://en.wikipedia.org/wiki/Gutmann_method :
Most of the patterns in the Gutmann method were designed for older MFM/RLL encoded disks. Gutmann himself has noted that more modern drives no longer use these older encoding techniques, making parts of the method irrelevant. He said “In the time since this paper was published, some people have treated the 35-pass overwrite technique described in it more as a kind of voodoo incantation to banish evil spirits than the result of a technical analysis of drive encoding techniques”
More reading material:
NOW THAT BEING SAID there is no harm in doing a secure, 35-pass overwrite other than the time, energy and disk wear. If watching all the bit-patterns of a DoD-level wipe using DBAN on a magnetic disk tickles your fancy, or you think this is a CIA misinformation campaign to get people to do something insecure so they can steal your secrets, please just go ahead and do a 35-pass overwrite with alternating bit patterns followed by random data. I can tell you that I believe in my heart-of-hearts, that one pass is sufficient.