@tindall My only real problem with IKEA furniture is that particleboard is heavy and not particularly durable. When that’s not the material in use, or the use case doesn’t conflict with those properties, I’m not fussed. Oh, wait, there’s also the part where the bits of hardware are also not durable and are not standard, so replacing them when they break in three years is often not possible, as IKEA won’t make them any more. But besides that, no, it’s good.
My Gmail address is old, and it shows my sophomoric sense of humor, as it was back in 2004. This means that when someone is “testing” their email campaign with bogus email addresses, I actually get their email, since it’s not as bogus as they think. This meant that, as Uber launched in Australia, I got to hijack their test account by exercising the emailed password recovery feature. Today’s opportunity is brought to me by the Washington Post.
@tindall From what I’ve heard, she’s a good human being. Certainly her books depict real, textured human beings with some sympathy.
@angelostavrow Nay. What is a blog post? It’s an essay. How would you like to end every essay you turned in with, “Written on my bitchin’ computer?” How would you like to *read* that at the end of every essay?
You are probably more moral than I am. And probably all-around a better person. Yep. And I love that about you. I think you are amazing. Also, I should be practicing. http://lingling40hours.com/
@Amber I should have said, “threat modeling,” since I guess that’s the term of art. (See: https://www.eff.org/document/surveillance-self-defense-threat-modeling)
What that means, in summary, is that what steps you take should depend on what you’re worried about. If you’re worried about corporate resale of your demographic data, that’s a different set of concerns than, say, worrying that if the wrong government official sees your email you will go to prison.
@Amber This is really kind of an open-ended question. A huge component of the problem is your own risk and threat analysis. Be really suspicious of any advice that looks like, “Use these 5 steps to control your online privacy,” because I guarantee you they aren’t providing what you think they are.
For example: what do you think using a VPN does to protect you from Google? Also, your cleanup of old emails/calendar entries is probably not doing what you think.
@tindall The lesson Apple learned from Microsoft (well, one of many I’m sure) is that if you want to win in the marketplace, don’t try to be the best; instead, don’t suck just enough to keep competitors at bay and spend all that unused dev money on marketing.
@tindall You may be onto something with your point about ephemeral communication. I observe with hope the reframing of “cancel culture” as “consequence culture”. I’m not quite sure how to say what I mean, but I suspect that there’s a lot going into toxic / shocking comments beyond the idea of speech as performance without consequence. So I wonder if some of what you’re seeing isn’t simply the toxic discourse happening in places you aren’t looking at (anymore/yet)?
@tindall I guess my question is really around your identification of the time period, roughly a decade ago: you call out that time, from which I infer a distinction. Like, that’s a time period that’s somehow different from some other time period. And so I ask, is that what you’re suggesting? And if so, what’s the other time period, where it was different?
Bagpiper, retired programmer.
A Mastodon instance for the San Francisco Bay Area. Come on in and join us!