• 8 Posts
  • 193 Comments
Joined 2 years ago
cake
Cake day: October 19th, 2023

help-circle
  • Please read the article. I hate when people upvote bullshit just because it says things they like to hear. I dislike Elon Musk as much as anyone else, but the jury’s findings were this:

    • The driver is ⅔ responsible for the crash because of his negligent driving.
    • The fact that the driver did in fact keep his foot on the accelerator was accepted by the jury.
    • The jury accepted that the driver was reaching for his cell phone at the time of the crash.
    • Evidence in court showed that the speed of the car was about 100 km/h. Keep in mind that this incident occurred in the Florida Keys where there are no high-speed expressways. I couldn’t find info on where exactly this happened, but the main road in the area is US Route 1, which close to the mainland is a large four-lane road with occasional intersections, but narrows into a two-lane road for most of the distance.
    • The jury found Tesla ⅓ liable because it deemed that it had sold a faulty product. For international readers, in the US, a company that sells a product which is defective during normal use is strictly liable for resulting damages.
    • Obviously Tesla plans to appeal but it is normal for everyone to appeal in these sorts of cases. Many appeals get shot down by the appellate court.

  • NateNate60@lemmy.worldtomemes@lemmy.worldUnpaid lunch
    link
    fedilink
    arrow-up
    10
    ·
    edit-2
    2 days ago

    Classic Europeans on the Internet trying to make fun of [bad thing that happens in the US] without realising it also happens in Europe

    Germany:

    If you work between 6 to 9 hours a day, you are entitled to a 30-minute break after no later than 6 hours. If you work more than 9 hours a day, the break is extended to 45 minutes. Labour law prohibits taking the break at the end of the day’s work in order to leave earlier.

    France:

    As soon as your daily working time reaches 6 hours immediately, you must have a break of at least 20 minutes consecutive

    The break is granted:

    • Either immediately after 6 hours of work[, or]
    • before this 6-hour period is completed

    United Kingdom:

    Employers can say when employees take rest breaks during work time as long as:

    • the break is taken in one go somewhere in the middle of the day (not at the beginning or end)
    • workers are allowed to spend it away from their desk or workstation (ie away from where they actually work)

    American states set their own labour laws, but the ones of the state where I live (Oregon) are actually far more generous than comparable ones in Europe. I am entitled by law during an eight-hour working day to one 30-minute lunch break (not paid) and two additional 10-minute breaks (counts as time worked and is paid). Meaning I get 50 minutes of breaks in a day and the employer has to pay me during 20 minutes of those breaks. My employment contract actually gives me a 1-hour lunch break in addition to the two 10-minute breaks, which isn’t required by law but is not uncommon.




  • I understand you are playing the devil’s advocate here, but this is a legally misinformed take. There is a legal doctrine in American law called the “anti-commandeering doctrine”, which states that even though federal law is supreme to state law, the federal government may not “commandeer” organs of the state government by requiring them to perform actions in furtherance of a federal policy. Hence, it would be illegal for the federal government to require states use their law enforcement resources for immigration purposes.

    The State of Colorado in particular has instead chosen to explicitly forbid its law enforcement agents from expending state resources to enforce or aid in the enforcement of federal immigration law.



  • The 19th century was a time of letter-writing, not Signal group chats. For that reason, I think that if the governor of Georgia had explicitly asked Jackson for permission to defy the Supreme Court, we would probably have a copy of that letter or at least a mention of its existence in the correspondence or journals of these men or of their secretaries. I also don’t think Jackson was so brazen as to give a go-ahead to defy the Supreme Court. Such an action would have undoubted started a major incident if the press found out about it, and may have even caused the unravelling of the federal system, and Jackson was certainly no idiot and knew this.

    With respect to the current situation, I think the current president and attorney-general are more or less just as willing to disobey the courts. Georgia officials in the Cherokee incident(s) only did so because they were politically accountable only to the white, landowning, citizens of Georgia, who were behind them every step of the way. In a similar vein, the voters seem to have delivered a message to Trump in 2024 that there is no political cost to authoritarianism and disrespect for the rule of law. Or, at least, that’s the message Trump thinks the voters sent him. In reality, such a cost does exist, and it’s why Trump lost in 2020. Though Allan Lichtman’s prediction of the 2024 presidential election outcome was definitely wrong, I still think that his overall message, that voters care more about whether the incumbent president is good or bad than whether their opponent is good or bad, makes a lot of sense to me. But I’m no expert in that.


  • Sorry, mate. You’re going to have to think for yourself instead of just repeating the catchy things you heard on YouTube or Reddit.

    You first tried to argue that these people “weren’t the customer, they were the product”, because you thought the purpose of Google Drive was to collect data from its users for advertising purposes. Google doesn’t do that, and they’d be morons if they did because they’d be quickly caught and everyone would get weirded out and stop using their shit.

    No, the purpose of Google Drive and Google’s office suite being handed out free of charge is the same reason they sell discounted Chromebooks to schools and provide Gmail for free. You are right, it isn’t out of the goodness of their hearts. These are all basically free samples to get people using the product, so when a small portion of those individuals enter into decision-making positions for organisations, they, having tried the product, think “Let’s go with Google Workspace”. Google then earns 60 USD per user per year. Ka-ching.

    This is a rare instance where the big corporation’s interests happen to be to make the best possible product.



  • I don’t know how they update their IP list. My university is an American university which I believe has no ties to China, but I can’t say for sure. According to friends who use the clandestine OpenVPN services, they pay about 20 CNY a month and every month they are issued a new OVPN configuration file. Only occasionally do their servers get blocked before this, and then they have to issue new config files to everyone.

    As for myself, I have been to China two times using the OpenVPN server that I deployed on a US-based VPS I rented from a German hosting provider. Each trip lasted about one month. So far, the IP has not been blocked. The government’s philosophy regarding the firewall and VPNs seems to be “make it as annoying as possible for the average uninformed layperson to bypass and go after people selling illegal VPNs, but otherwise, we don’t give a shit”. I do not sell access to my VPN to anyone else. It is strictly for my own use.

    Both times I was there, the firewall didn’t apply to cellular data because they do not apply the firewall to holders of foreign SIM cards using their cellular service. I purchased a SIM from a Hong Kong carrier (SoSim) with a few gigabytes of data in both Hong Kong and mainland China for 100 HKD. The firewall doesn’t apply within Hong Kong. It worked fine, though I do note that surveillance laws meant that I had to upload my passport to activate the service. I’m not a big fan of that, so I kept the VPN connected at all times, though normally-blocked websites did indeed work on cellular data even without the VPN. I checked on my cell phone’s settings, and I know it connects to China Mobile towers when in mainland China. Note that China Mobile is owned by the Chinese state.

    I also confirmed that it doesn’t apply the firewall when I have my T-Mobile (my US cell carrier) SIM in there. My carrier provides unlimited worldwide roaming at 2G speeds but I can confirm that it also connects to China Mobile towers and I could successfully access Wikipedia, a blocked site, without the VPN.


  • This is a commonly-told but not actually true version of events. Here’s what really happened between Jackson and the Cherokee case.

    The background of the case is that the State of Georgia had enacted a law forbidding the settling of Cherokee territories by whites without a licence. A man by the name of Samuel Worcester, a missionary who helped establish the first Cherokee-language newspaper (the Cherokee Phoenix or ᏣᎳᎩ ᏧᎴᎯᏌᏅᎯ), protested against this law, saying that Georgia had no power to legislate what goes on in Cherokee territory, because the Cherokee Nation was sovereign over their own territory and not subject to the law of the State. The governor of Georgia ordered the arrest of Worcester and some other dissidents who refused to apply for a licence. He was brought before a Georgia court and stood trial, was convicted, and sentenced to four years’ hard labour. Some of his fellow defendants accepted pardons from the governor, but Worcester refused the pardon in order to preserve his right to appeal his conviction.

    The case was brought before the US Supreme Court, which ruled in the case of Worcester v. Georgia that the Cherokee Nation had sovereignty which the State of Georgia could not abridge, and that the law banning whites from settling Cherokee land was void. President Jackson expressed disdain over this ruling, and contemporary news thought he was unlikely to help the Supreme Court if it asked him to enforce its ruling. However, the Court never asked Jackson to send federal marshals to enforce the decision, so there was nothing for him to “violate”.

    Georgia state officials chose to ignore the ruling and refused to release Worcester from prison. His lawyers petitioned the new governor of Georgia to offer Worcester an unconditional pardon, but the governor refused, saying that the Supreme Court had overstepped its authority. Georgia officials decided to agitate for the federal government to impose a removal treaty against the Cherokees. Then, in an unrelated incident, South Carolina started a spat with the federal government by attempting to nullify a federal law that they didn’t like, which caused the Jackson administration to change its tune towards Worcester’s situation. His government dropped hints to the governor of Georgia that if Worcester (and another person similarly situated) were released, that the Jackson administration would arrange for a removal treaty to be imposed on the Cherokees. Worcester intended to continue pursuing his case before the federal courts but feared that doing so might provoke the government of Georgia to do something like attempt to secede or otherwise bring harm to the Cherokees. The governor and Worcester’s legal representatives haggled over the wording of Worcester’s petition for a pardon, and in the end, they were released the year after the Supreme Court’s decision. Worcester gave up his case before the federal courts.

    At the same time as this was happening, gold was discovered on Cherokee lands and the State of Georgia infringed on the Cherokees’ sovereignty in other ways, including attempting to abolish the tribal government, trying to legislate away all of the Cherokees’ land rights, and raffling off plots of Cherokee territory to white settlers.

    In 1835 (three years after this ruling), a group of Cherokees not authorised by the Cherokee National Council or by their Principal Chief negotiated the Treaty of New Echota, agreeing on behalf the entire tribe to vacate their traditional homelands in exchange for five and a half million dollars and a reservation in Indian Territory (present-day Oklahoma). Despite the vast majority of Cherokee people opposing this treaty, its signatories having lacked the authority from the Cherokee council to negotiate it, and against the wishes of the Cherokee Principal Chief, the US Senate gave force to the treaty and President van Buren ordered the US Army to remove all Cherokees to Indian Territory in 1838.


  • Your idea of “distressingly often”, which you bring up a lot, I believe to be severely flawed. With respect to individuals who control their own wallets, it is in reality exceedingly rare for hackers to be able to breach a wallet’s security measures and steal coins. Most wallets implement encryption of some sort, either through the device’s keystore or using a password. Most crypto thefts take the form of people being tricked into giving away their key phrase or sending their crypto to a scammer. This is really the same type of scam as someone taking your debit card and then tricking you into giving them your PIN. According to most bank policies, you are liable for unauthorised chip-and-PIN debit transactions. “Zero liability” only applies to credit transactions proceed through the Visa or Mastercard networks. If you give someone your PIN for any reason, you are deemed to have authorised all transactions that they make with that PIN.

    But you do raise a good point that the crypto industry is very under-regulated and there needs to be some form of deposit insurance for crypto exchanges. More regulation is definitely not a bad thing (despite what crypto bros will say), especially in the post-FTX era.


  • Attached below is a Wireshark trace I obtained by sniffing my own network traffic.

    I want to draw your attention to this part in particular:

    Underneath “User Datagram Protocol”, you can see the words “OpenVPN Protocol”. So anyone who sniffs my traffic on the wire can see exactly the same thing that I can. While they can’t read the contents of the payload, they can tell that it’s OpenVPN traffic because the headers are not encrypted. So if a router wanted to block OpenVPN traffic, all they would have to do is drop this packet. It’s a similar story for Wireguard packets. An attacker can read the unencrypted headers and learn

    • The size of the transmission
    • The source and destination IP addresses by reading the IP header
    • The source and destination ports numbers by reading the TCP or UDP headers
    • The underlying layers, up until the point it hits an encrypted protocol (such as OpenVPN, TLS, or SSH)


  • The Great Firewall doesn’t block by protocol. If you set up your own OpenVPN server, you can still connect to it. I’ve done this many times in my trips to China, and it’s worked fine. That being said, they still do seem to throttle connections to international servers, though this happens to all servers, even those that are not blocked. There are many clandestine VPN operators in China who spin up their own VPN servers and sell the service. They are mostly OpenVPN-based.

    My university used Cisco AnyConnect, and I was able to successfully connect to the university VPN servers as well.

    The limited experimentation I have conducted seems to indicate that the Great Firewall blocks by IP and not by protocol.