Skip Navigation

User banner
Posts
9
Comments
707
Joined
2 yr. ago

  • Best to look at the actual product label. Even produce will usually have its origin on the sticker.

  • I found NetworkChuck's reasonably beginner friendly.

  • Your initial comment read like, "we shouldn't provide access to housing for anyone because some don't actually want it."

    I believe a better solution would be, "we should provide access to housing and if some don't want it, they won't be forced to use it."

    It's definitely a complex issue, but the first step should be compassion and not eliminating practical options because they might not suit a small subset of the population.

  • I'm curious then, you seem to know the thoughts and experience of unhoused people, yet you're saying you haven't conversed with them. How did you form such an opinion?

  • You have had conversations with many unhoused people and they've indicated they would much rather prefer sleeping in places with little security, a high risk of their few possessions being stolen, and little protection from the elements, to a safe, stable place of residence?

    I'm quite skeptical.

  • Youtube/Google is an advertising company, they only care if they're getting paid.

  • I'm playing this now and was going to mention it as well. It's quite fun and engaging both in the main plot and side quests.

  • There's a reason it's called Project2025. They weren't planning to wait until 2026.

  • LXC on the host for me. Make sure it never backs itself up though.

  • Makes sense...if we primarily used print still. Not so much for online articles.

  • Right, at least I think so.

    Controversial B.C. RCMP unit to police the opposition to fast-tracked resource projects

  • Arguments like, "Well, why do you have clothes on then?" are not effective, because they aren't equivalent forms of privacy.

    There are a couple pieces of media I like to recommend:

    • Targeted by Brittany Kaiser - Kaiser being intimately involved in Cambridge Analytica, it outlines how digital record of user behaviour, traits, and engagement can inform agents to which form of manipulation would be most effective on a given person (psychographic analysis), which can then be used by whomever wanted to exert influence (micro-targeting), whether it be on consumer or political preferences.
    • The Great Hack is a documentary adaptation of the above story if someone prefers film over text, but the book has more detail of the methods and examples of when it's been used in the past (alarmingly many political campaigns).
    • The Social Dilemma is another documentary that touches on how exploitation of user data drives issues like addiction, radicalization, and depression on social platforms. Just recently, Meta was found to be feeding increased beauty advertising to girls and women who had recently deleted selfies.

    Providing real examples of this exploitation is, in my opinion, a more effective argument for promoting online privacy. It nudges people to think, "maybe it would be better if advertising companies didn't know about my recent (breakup, miscarriage, job loss, promotion, unplanned pregnancy, debt, car accident, birth of a baby, death in the family, deletion of a selfie...)."

  • Well, that headline took a few reads to figure out. Is it frowned upon to use the word 'the' these days?

  • It's mentioned in the article,

    “The only power that workers have is to withdraw their labour,” [Gil McGowan] said. “If you take that away from them, the workers have no real leverage.”

    "By giving the minister the unilateral right to break strikes and send workers back to work against their will, the minister and the government are making a mockery of the collective bargaining process.”

    It's a dangerous norm if employers can just rely on the government to swoop in and block a strike with little consideration for the workers. Glad the workers took a stand in this instance and hopefully it empowers others in the future.

  • No need to apologize, but it's good to be aware of the policies of various applications you use and promote.

    I use perplexity occasionally myself, aware of the above, so I only do more general searches with it.

    I have a self-hosted Perplexica instance I use for anything more sensitive.

  • Could you edit your post to include the solution for anyone else with the same issue coming across this post in the future?

  • Since we're on c/privacy; from perplexity itself:

    What Does Perplexity Do With User Information?

    Perplexity:

    Collects: Search history, queries, device and location data, browsing activity, and navigational behavior (especially via its new AI-powered browser).

    Uses: These data points help personalize results, train their models, improve functionality, and—crucially—build detailed user profiles for targeted ads and marketing.

    Potential Risks: Privacy experts warn this data collection may turn users into marketing profiles, similar to surveillance practices seen in other big tech companies. Even actions outside the Perplexity app (via their browser) may be tracked and leveraged.

    Transparency and Privacy: Perplexity does not offer strong privacy protections (like end-to-end encryption), and isn't fully transparent about how all user information is used. Cookies, device fingerprinting, and web beacons may track even non-logged-in users.

    Enterprise risks: Businesses using Perplexity’s enterprise tools must be cautious about uploading sensitive data, as it could be used for model training and not always protected from leaks.

  • It's always interesting how they call themselves planners yet never consider how people actually get to these places they plan, at least no further than, "oh, they'll just drive".