hungrybread [comrade/them]

  • 0 Posts
  • 14 Comments
Joined 4 years ago
cake
Cake day: January 19th, 2021

help-circle


  • I have a couple of thoughts regarding this.

    First, in America at least, we spend a significant amount of time and energy legitimizing “nonviolent, civil disobedience” actions of the past , while pointing at any group that defends itself in any other capacity as just as bad, or worse!, than the status quo/gov/cops/take your pic. There is only one valid way, outside the ballot box, to demand/make change within liberal society and it is to literally demand that the gov/cops/military/local assholes beat you so badly that other onlookers are too embarrassed to let it carry on. This method is lovely for the ruling class because they can physically squash the people with demands and, if they are few enough of them, the protest ends, and the ruling class get several more years to run things.

    As an extension of above, protest organizers, and some protectors, explicitly know that the cops are there to escalate the situation. To avoid escalation many people simply do not defend themselves or others.

    This is all vibes base analysis based on my own experiences at protests, including ones where cops escalate the situation. I wouldn’t take it too seriously.





  • You’re right about the Snopes article. It does do a decent job of pointing out that a lot of this reporting is rumor based.

    This first anecdote (also highlighted by Snopes) is amusing

    Double-hit cases" have been around for decades. I first heard of the “hit-to-kill” phenomenon in Taiwan in the mid-1990s when I was working there as an English teacher. A fellow teacher would drive us to classes. After one near-miss of a motorcyclist, he said, “If I hit someone, I’ll hit him again and make sure he’s dead.” Enjoying my shock, he explained that in Taiwan, if you cripple a man, you pay for the injured person’s care for a lifetime. But if you kill the person, you “only have to pay once, like a burial fee.” He insisted he was serious—and that this was common.

    So is it Taiwan or the mainland with these wild laws?

    Another false claim about China, it seems.






  • In addition, hardware developers reinvent old ways of doing things and only learn by making all the same mistakes that have been made before. It’s sad, but true.

    This same criticism is validly launched at software devs all the time lol.

    One thing I’ve anecdotalally seen and heard is hardware guys indicating that something is rock solid and solved because it’s old, so building on top of it isn’t a problem. Obviously we have to build on the old to get to the new, but if we just skip auditing hardware due to age we end up deploying vulnerable hardware globally. Spectre and Meltdown are an interesting example where I’ve heard from at least one distinguished professor that “everyone” believed branch prediction design/algorithms were essentially done. Was it adequately assessed from a security POV? Clearly not, but was it assessed from a security POV in general? I have no idea, but it would be nice as a tech enthusiast and software guy to see the other side of the fence take these things seriously in a more public way, in particular when it comes to assessing old hardware for new attack vectors.