Hacker News new | past | comments | ask | show | jobs | submit | eonmist's comments login

Why is it a conflict at all? Does modifying the software go against the license? They don't have to follow Matt's philosophy. If Matt want to control the use he should have encoded it in the license. Isn't this a classical case of wrongly chosen license and assuming others agree with you on unstated things.


Probably not very unique, but discovered Radicale to self-host calendars, then integrate with calendar clients (and for android, DAVx to bridge to calendar apps on Android). Selfhosting on a VPS.


> The term comes from fraudsters [where victims are subjected to] devastating financial losses as well as psychological harm. [...] INTERPOL argues that the term ‘pig butchering’ dehumanizes and shames victims of such frauds, deterring people from coming forward [...]

The term likely serves many purposes. A degradation of the victim out of ill will, but also as justification for exploitation. All of the involved perpetrator are likely not soulless and are in need of some form of rationalization to manage their conscience. While not critically instrumental, such unconscious group-language creates an ambience to aid the goal. Perhaps such language arises exactly because of an unconscious battle of conscience. Likely you will also find self-glorifying Robin Hood narratives.

Studies of language use in such environments would be interesting, and likely exists.


Could they not allow another TikTok variant to be made that doesn't have the problematic ties. (I'm no TikTok fan)


This already exists. Several Western-owned social media platforms have cloned many of TikTok's features and much of its user experience. They just haven't done as good a job of it.


The court's gave TikTok the option of changing ownership amd they declined.


I believe bytedance has a US company now


To me there was a distinct "aha" moment when the "vim language" suddenly made sense. Makes me think of when kids suddenly discover how to read.


Curious if the affected party had a plan for this situation at beforehand.

I have stopped relying on instances being secure and map out a just-in-case strategy (that I also regularly oversee or exercise) to quickly reset/restore and get back on track.


postale.io

Requires your own domain.


What would have been the lesson to learn in this case? What is a good solution?

I solved it by completely moving away from Google and services where I'm offered little control over verification settings. I remember I found the related settings in Google too restrictive at the time, and they seem to change requirements over time, thus making it too unpredictable for me. The "verify on old phone" really scared me away.


Ultimately, the lesson learned was big tech isn't your ally nor is the data you lend to them yours. Act accordingly. If they decide you no longer deserve access to the data, they can and will cut you off.

Personally, I pay for a service (email, data, password manager, etc). I also backup my data in multiple locations. It's a lot of work, but I don't really see an alternative at the moment.


Exactly this is why I moved away from Google and never use it for anything important.

When they started requiring verification from old phone it was too much. What if I lost it, it got stolen etc. Also have to account for them changing their verification requirements as they wish.


Globally half of children demonstrate reading comprehension. The 1st world at top and 3rd world at bottom.

Results hint at half of the world being underdeveloped.


Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: