• 0 Posts
  • 173 Comments
Joined 9 months ago
cake
Cake day: December 13th, 2024

help-circle
  • They were complaining the blockee could write any public response even an impersonal one.

    Doxxing & other issues likely already violate rules & I don’t see how that would happen, since we don’t reveal much about ourselves. I don’t see how defamation would happen without a real identity. Harassment likely wouldn’t fit the legal definition: at most, some call being incredibly annoying harassment.

    I’ve seen threatening replies I didn’t report (because I consider online threats vacant hyperbole) result in bans.


  • I disagree that all content on lemmy should be treated as strictly public.

    Acknowledging your disagreement, it’s observable fact that it is. It’s readable to the public & open to public input. That input may be more concerned with responding to ideas (eg, as a criticism or corroboration) and presenting that to the public reader than for communicating specifically to the author of the text that inspired it. I certainly read primarily for content & ideas and respond accordingly like I’m trying to show the public something. Anyone can respond.

    Comments I release to the public I treat as the public’s & not really mine. If that’s not for you, then I don’t think you’re identifying a technical limitation but a disagreement with design goals: the design of lemmy makes much sense for public discussion.

    With private, direct messages, you may have a better argument.


  • Nah, in a public discussion, you/authorship isn’t the primary concern, the text & interest of the public is primary. Whether you want to see that text is your liberty. The liberty of the public, however, is to likewise decide for themselves whether to read the text no matter who authors it regardless of petty disagreements between authors. Your disagreements aren’t ours.

    Just like in offline public discussions, no one should decide whether the public gets to see a marvelous takedown of text you happened to write just because you disagree with the author of that spectacular takedown.










  • lmmarsano@lemmynsfw.comtoLemmy Shitpost@lemmy.worldLemmy be like
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    23 days ago

    “haha this person has sincere beliefs, what a moron!”

    It’s more like

    this person is making us sicker of them than the thing they’re telling us to be sick of, and we were already sick of that!

    Getting sanctimonious & overbearing with people who don’t even disagree with you isn’t effective advocacy. We largely avoid AI already, and a tedious circlejerk isn’t getting us anywhere or adding anything that isn’t frequently stated.

    By drawing more ire toward them than things we should be sick of, circlejerks are unjust & deserve all the derision they can get until balance is restored.


  • lmmarsano@lemmynsfw.comtolinuxmemes@lemmy.worldsiempre lo hago
    link
    fedilink
    English
    arrow-up
    8
    ·
    edit-2
    24 days ago

    As usual, that’s documented (we can RTFM).

    Before trying ctrl-s, you may want to disable software flow control: run stty -ixon & add it to your initialization files. Otherwise, you’ll pause terminal output. ctrl-q resumes terminal output.

    stty reveals terminal special characters

    $ stty -a
    ⁝
    intr = ^C; quit = ^\; erase = ^?; kill = ^U; eof = ^D; eol = <undef>; eol2 = <undef>; swtch = <undef>; start = ^Q; stop = ^S; susp = ^Z; rprnt = ^R; werase = ^W; lnext = ^V; discard = ^O; …
    ⁝
    

    These special characters/keys often perform special functions. To illustrate

    • ctrl-d on empty input typically exits/logs out of interactive terminal applications (including shells)
    • ctrl-u discards input (useful for inputs like password prompts that don’t echo input back)
    • ctrl-v inputs next character literally (such as tab)







  • It’s your system

    Evil techcorp’s servers (hosting online services I send requests containing data to) are mine? Cool! How do I sell those?

    Or are we referring to local software that gets & sends my data without authorization?

    you either accept it or don’t get to use what you bought

    Claiming that’s theft seems like (taking artistic license with the word steal to express) wanting an agreement that wasn’t offered. Like

    How dare evil techcorp make a service I want to use with voluntary conditions I don’t want? That’s stealing!

    I don’t think computer hardware typically has those types of agreements, and I can change the software & choose online services.