

There aren’t any, thats the point I’m making. Petitions produce sample bias that excludes the opinions of people who don’t want their legal name and home address printed on a document that might get passed around God-knows-where.
There aren’t any, thats the point I’m making. Petitions produce sample bias that excludes the opinions of people who don’t want their legal name and home address printed on a document that might get passed around God-knows-where.
Information on Personal Data:
To sign, you must provide a set of personal data, which is required by the authorities of your country for verification purposes. Specific measures are in place to ensure the protection of your data. See our privacy statement.
Perhaps if signing a petition didn’t require doxxing yourself then more people would sign.
I realize that it’s to prevent fake signatures and allow verification that the signatories are residents of the jurisdiction under petition, but this method inherently creates a sampling bias.
In the same vein as age verification, we need a solution for digital attestation that preserves anonymity and privacy. There are some initiatives in this direction, so perhaps we will get there some day.
Christine Lemmer-Webber made an excellent blog post ~6 months ago titled How Decentralized is Bluesky really?
Give that a read.
“I want you to rebuild everything around my nerds”.
Where my nerds at!?
The Vogons will demolish Earth to build a hyperspace bypass before we find out the results.
if they had access to Windows-based software (Blender, Unreal Engine, 3D slicing software, etc.,).
All of those applications that you mentioned run on Linux too. Maybe check if everything you want to use runs on Linux and then you don’t need to sell your students’ souls on their behalf.
remember Jabber?
Users voting on whether a segment is good or bad. I always give a thumbs up to the segments that were well-defined and a thumbs-down to segments that cut off half a sentence unnecessarily etc.
Most people will tell you that it’s been made obsolete now since (1) it doesn’t use behavioural analysis to detect trackers anymore, it just uses a pre-defined list of trackers to block (2) browsers (especially firefox) now have built-in tracker blocking (3) ublock origin blocks trackers by default anyway.
I don’t think it hurts to still use it, just as a belt and braces approach, but I suppose it’s possible it makes your browser fingerprint more unique.
It’s water-resistant.
thanks, unlucky Rich
It could also be a Vignere cipher
Right, but that dongle is connected to the CAN bus directly right? I was wondering what is accessible over just the smartphone integrations (CarPlay and Android Auto).
What car sensors are normally accessible to CarPlay and Android Auto, and what are they used for?
My car doesn’t expose any car features or sensors to CarPlay at all. I just use the connected display for maps and playing audio.
Could you link the RPi projects that you’ve seen? Sounds interesting.
“The proof is in the pudding” as they say.
You should probably let RealVNC know, because they don’t seem to have got your memo.
Does it link to the Google policy that they say that it violates? Are you certain the archive is clean and doesn’t actually contain an executable malware?
If you’re not sure, you could upload the book to VirusTotal and have it scanned.
God, I can’t stand this finance-bro vocabulary infiltrating people’s normal speech.