ShareGPT

88 readers
1 users here now

To share LLM text output that others might find interesting.

founded 2 years ago
MODERATORS
26
 
 

People often point to the moment a discussion touches on subjects like the Fermi Paradox as the point at which it transforms from casual to genuinely engaging. The Fermi Paradox resonates because it combines science, speculation, philosophy, and existential inquiry in a single question. But it is only one example of the types of topics that can elevate a conversation.

Across disciplines and personal preferences, certain thematic areas tend to spark intellectual curiosity, invite reflection, or open the door to complexity. While the specifics vary by individual, several categories consistently stand out.

1. Concepts That Challenge Assumptions

Discussions become compelling when they force participants to re-examine what they believe or how they think. Examples include:

  • Thought experiments such as the Ship of Theseus, the Simulation Hypothesis, or the Trolley Problem.
  • Paradigm-shifting perspectives in physics or cosmology.
  • Debates on free will, consciousness, or the structure of reality.

These topics are inherently speculative, but they also encourage analytical rigor and self-awareness.

2. Deep Unknowns and Open Questions

Humans are drawn to mystery—particularly those that resist straightforward answers.

  • Origins of life and the emergence of intelligence.
  • The future trajectory of humanity, technology, and artificial intelligence.
  • The possibility of extraterrestrial life and the nature of the universe at large.

These subjects create opportunities for both scientific reasoning and imaginative exploration.

3. Intersections Between Disciplines

Innovative thinking often occurs where fields collide.

  • Bioethics and emerging biotechnology.
  • Behavioral economics and cognitive psychology.
  • Philosophy of technology and its cultural, social, and political implications.

Cross-disciplinary conversation tends to be generative, because each participant brings unique knowledge and frameworks.

4. Human Meaning and Long-Term Horizons

Some conversations become compelling because they connect personal experience with broader human concerns.

  • The evolution of morality and the future of social institutions.
  • The psychology of identity, meaning, and community.
  • Historical patterns that reveal how societies change and adapt.

These topics combine empirical insight with introspection, making them both relatable and intellectually rich.

5. Hypotheticals and Counterfactuals

Exploring what could be—rather than what is—often sparks creativity.

  • Alternative histories: What if a major scientific discovery had occurred earlier or a political event had unfolded differently?
  • Future scenarios: climate adaptation, post-scarcity economies, or long-duration space habitation.

Counterfactual thinking allows for strategic insight and imaginative problem-solving.


In Summary

A conversation becomes interesting when it transcends routine information exchange and enters the realm of uncertainty, significance, or conceptual depth. Whether the topic is cosmology, ethics, technological change, philosophy, or speculative future scenarios, the common thread is that the conversation stretches the mind in some meaningful way.

What about you? What topics signal to you that a conversation has become genuinely interesting?

27
 
 

Medios públicos y pluralismo informativo

La investigación más reciente confirma que medios públicos fuertes y pluralismo informativo contribuyen a democracias más sanas. Por ejemplo, un estudio que compara 33 países concluye que “países con sistemas públicos de radiodifusión independientes y bien financiados tienen democracias consistentemente más fuertes” (asc.upenn.edu). El Director General de la Unión Europea de Radiodifusión señala que en países donde los medios públicos (PSM) gozan de buena financiación y amplia audiencia hay “más estabilidad política y la corrupción bajo control” (ebu.ch).

Además, se observa una alta correlación entre financiación de PSM y participación política: los ciudadanos en esos países tienden a involucrarse más en política (ebu.ch). Por ejemplo, Estados Unidos invierte solo 0.002 % de su PIB en medios públicos (~USD 1.40 per cápita), mientras países como Suecia, Noruega o Reino Unido destinan cerca de USD 100 per cápita (asc.upenn.edu).

En la práctica, donde los medios públicos son débiles suele resentirse la satisfacción ciudadana con la democracia y proliferar desiertos informativos locales. En cambio, la literatura señala que una prensa plural y bien financiada favorece ciudadanos mejor informados, culturas políticas críticas, apoyo a procesos democráticos y mayor compromiso cívico (asc.upenn.edu; ebu.ch).


Educación cívica y participación electoral

La educación ciudadana es considerada clave para una democracia robusta. Los teóricos clásicos (Lipset, Bryce) sostienen que aunque la escolaridad alta no garantiza por sí sola la democracia, sí parece “casi condición necesaria” para sostenerla (v-dem.net).

En la práctica, poblaciones con mayor conocimiento cívico tienden a votar e involucrarse más. En los países nórdicos, las escuelas imparten educación cívica sistemática, generando electorados informados y alta participación. Aunque la calidad del voto importa más que el porcentaje, la participación electoral alta es vista como indicador de legitimidad democrática.

Estudios de la OEA muestran que en América Latina la participación promedio ha caído algunos puntos en dos décadas, lo que preocupa a expertos por la desafección electoral. Asimismo, experiencias cívicas tempranas (debates escolares, voluntariado) potencian el capital democrático.

En síntesis, mayor educación cívica está vinculada a ciudadanía activa, legitimidad política y mejor salud democrática (v-dem.net).


Acceso a información veraz vs. desinformación

La integridad del espacio informativo es crítica. Informar debates basados en hechos refuerza la democracia, mientras la desinformación la erosiona. Un informe de la OCDE destaca que “la rápida difusión de información falsa o engañosa genera confusión, intensifica la polarización, distorsiona debates públicos y deteriora la confianza ciudadana” (oecd.org).

Oleadas de noticias falsas siembran desconfianza y socavan procesos democráticos, como se observó en elecciones polémicas recientes (p. ej., EE. UU. 2020, referendos europeos). Por el contrario, entornos informativos plurales y gobiernos transparentes tienden a recuperar la confianza.

En la práctica, estrategias como revisar redes sociales educativas o fortalecer medios públicos buscan contrarrestar el riesgo informativo (oecd.org).


Desigualdad económica e instituciones

Existe consenso creciente en que la alta desigualdad socava la democracia. La investigación encuentra una asociación robusta: las democracias con distribuciones de ingresos muy desiguales son más propensas a retrocesos democráticos (socialsciences.uchicago.edu; v-dem.net).

Susan Stokes et al. (2025) muestran que la desigualdad es uno de los principales predictores del backsliding democrático, incluso en democracias ricas. El mecanismo central es que la brecha socioeconómica genera polarización y resentimiento, permitiendo ascenso de líderes populistas que erosionan instituciones (tribunales, prensa, etc.).

V-Dem enfatiza que la igualdad política deriva de la igualdad material: “las desigualdades sistemáticas en derechos y recursos limitan la participación política… una distribución más equitativa de recursos… da como resultado igualdad política y, por tanto, democracia” (v-dem.net).

Países con baja desigualdad (Suecia, Noruega, Alemania) combinan cohesión social, derechos sociales fuertes e instituciones estables. Por el contrario, crisis de desigualdad en países como Brasil o Chile han coincidido con protestas masivas y debates sobre reformas democráticas.


Corrupción e impunidad

La corrupción pública debilita la democracia al minar la rendición de cuentas. Datos de V-Dem muestran que los países más democráticos tienden a ser menos corruptos, aunque las diferencias no son enormes (v-dem.net). Más importante que tener elecciones libres es contar con controles efectivos (parlamentos y sistemas judiciales independientes).

V-Dem señala que los niveles más bajos de corrupción se encuentran en países con puntajes altos en el componente liberal (Estado de derecho, límites al Ejecutivo), como Escandinavia y Nueva Zelanda.

En países con corrupción crónica se observa baja confianza en el gobierno, clientelismo y abuso de poder. Transiciones o consolidaciones democráticas tienden a acompañarse de mejoras en transparencia y lucha anticorrupción.


Redes sociales y polarización

El papel de las redes sociales es complejo. Investigaciones como las de Pablo Barberá indican que pueden polarizar incluso a ciudadanos más informados. Barberá señala que “los más sofisticados políticamente son más propensos a aceptar acríticamente argumentos afines y rechazar los contrarios… lo que lleva a la polarización de actitudes” (idea.int).

Las creencias erróneas resultan más difíciles de corregir entre los mejor educados. Las cámaras de eco refuerzan sesgos cognitivos, reducen el diálogo y facilitan la radicalización.

Estudios documentan que altos niveles de desinformación en redes coinciden con caídas en la confianza mutua y deterioro del apoyo a normas democráticas (filtraciones y campañas externas). La evidencia es incipiente pero consistente: el uso problemático de redes sin regulación adecuada está correlacionado con el auge de populismos y erosión de consensos democráticos.


Confianza institucional y social

La confianza en instituciones públicas es a la vez un factor y un indicador de la salud democrática. Encuestas de la OCDE muestran confianza global históricamente baja: solo 39 % confía moderada/altamente en su gobierno, mientras 44 % confía poco o nada (oecd.org).

Esta crisis de confianza afecta la política: en 2023, una mayoría (53 %) afirmó que el sistema político “no permite gente como ellos influir” (oecd.org). Quienes sienten que no tienen voz confían menos en las instituciones.

Bajos niveles de confianza se asocian con menor cumplimiento legal, protestas y rechazo a resultados electorales. Democracias con instituciones fuertes —tribunales independientes, fuerzas policiales imparciales, burocracias profesionales— exhiben mayor respaldo ciudadano.

La confianza tarda en recuperarse: tras la crisis de 2008 tomó casi una década (oecd.org).


Conclusión

Los estudios demuestran que la salud democrática es multidimensional. No existe un único factor determinante, sino la interacción entre:

  • Medios públicos robustos y acceso a información veraz.
  • Educación cívica y participación ciudadana.
  • Igualdad económica y bajos niveles de corrupción.
  • Espacio digital saludable.
  • Confianza institucional y social.

Las democracias más sólidas (Escandinavia, Canadá, Costa Rica) combinan prensa plural, educación universal de calidad, Estado de derecho fuerte y baja desigualdad. Los casos de retroceso democrático (Polonia, Hungría, Venezuela) muestran patrones opuestos: acoso mediático, desinformación, polarización y corrupción.

En suma, la salud democrática es holística: fortalecer cualquiera de estos elementos contribuye al fortalecimiento general del sistema. La evidencia sugiere que debilidades en un área —desigualdad, desinformación, falta de confianza— suelen traducirse en erosión democrática, mientras que esfuerzos coordinados elevan la resiliencia institucional.


Fuentes

Reportes académicos y organismos internacionales (V-Dem, OCDE, universidades), que documentan cuantitativamente estas correlaciones:

  • socialsciences.uchicago.edu
  • oecd.org
  • ebu.ch
  • v-dem.net
  • asc.upenn.edu

Cada afirmación está respaldada por su referencia correspondiente.


Citations

Public Media Can Improve Our ‘Flawed’ Democracy | Annenberg https://www.asc.upenn.edu/news-events/news/public-media-can-improve-our-flawed-democracy

Public service media crucial to democracy | EBU https://www.ebu.ch/news/2019/09/public-service-media-crucial-to-democracy

Public service media crucial to democracy | EBU https://www.ebu.ch/news/2019/09/public-service-media-crucial-to-democracy

Public Media Can Improve Our ‘Flawed’ Democracy | Annenberg https://www.asc.upenn.edu/news-events/news/public-media-can-improve-our-flawed-democracy

Public Media Can Improve Our ‘Flawed’ Democracy | Annenberg https://www.asc.upenn.edu/news-events/news/public-media-can-improve-our-flawed-democracy

https://v-dem.net/media/publications/WP_151.pdf

Hechos frente a falsedades: Fortaleciendo la democracia a través de la integridad de la información (ES) https://www.oecd.org/content/dam/oecd/es/publications/reports/2024/03/facts-not-fakes-tackling-disinformation-strengthening-information-integrity_ff96d19f/06f8ca41-es.pdf

Hechos frente a falsedades: Fortaleciendo la democracia a través de la integridad de la información (ES) https://www.oecd.org/content/dam/oecd/es/publications/reports/2024/03/facts-not-fakes-tackling-disinformation-strengthening-information-integrity_ff96d19f/06f8ca41-es.pdf

Hechos frente a falsedades: Fortaleciendo la democracia a través de la integridad de la información (ES) https://www.oecd.org/content/dam/oecd/es/publications/reports/2024/03/facts-not-fakes-tackling-disinformation-strengthening-information-integrity_ff96d19f/06f8ca41-es.pdf

Income inequality has led to an erosion of democracy in countries around the world | The University of Chicago Division of the Social Sciences https://socialsciences.uchicago.edu/news/income-inequality-has-led-erosion-democracy-countries-around-world

V-DEM Democracy Report 2025 https://www.v-dem.net/documents/62/V-Dem_Democracy_Report_2025_spanish_lowres.pdf

Income inequality has led to an erosion of democracy in countries around the world | The University of Chicago Division of the Social Sciences https://socialsciences.uchicago.edu/news/income-inequality-has-led-erosion-democracy-countries-around-world

Graph of the Week – V-Dem https://v-dem.net/weekly_graph/the-relationship-between-liberal-democracy-an

Polarización, redes sociales y democracia: la alerta del elitismo https://www.idea.int/es/news/polarizacion-redes-sociales-y-democracia-la-alerta-del-elitismo

Trust in government | OECD https://www.oecd.org/en/topics/sub-issues/trust-in-government.html

Trust in government | OECD https://www.oecd.org/en/topics/sub-issues/trust-in-government.html

https://www.oecd.org/content/dam/oecd/en/publications/support-materials/2022/07/building-trust-to-reinforce-democracy_1a87cc66/oecd-trust-survey-main-findings-es.pdf

Public Media Can Improve Our ‘Flawed’ Democracy | Annenberg https://www.asc.upenn.edu/news-events/news/public-media-can-improve-our-flawed-democracy

28
 
 

In some scenarios it could help as a censorship-resistant layer. But there are technical and practical limitations. I'll walk through how I2P works, how realistic it is as a “solution to governments controlling the Internet,” and whether you can run Fediverse instances over I2P (plus trade-offs).


What is I2P & Who Uses It

  1. What is I2P

    • I2P (“Invisible Internet Project”) is an anonymous overlay network: a mix-network built to support encrypted, anonymous communication. (Wikipedia)
    • It uses garlic routing, a variant of onion routing, which bundles multiple messages (“cloves”) into one, making traffic analysis harder. (Wikipedia)
    • It’s designed to be fully peer-to-peer, without a single centralized authority controlling everything. (geti2p.net)
    • Communication is end-to-end encrypted, and both sender and receiver identities (in terms of network) are protected. (geti2p.net)
    • There is support for running traditional TCP-like services (via “tunnels”) — e.g., web servers, IRC, email inside I2P. (geti2p.net)
  2. Scale / Use

    • According to academic research, there are tens of thousands of I2P nodes. (arXiv)
    • Because it's peer-to-peer and decentralized, there is no “single point” to easily shut down (at least in theory). (i2p.net)
    • But that doesn't mean it's immune to censorship: some studies show it can be significantly disrupted. For example, blocking many known peer IPs can severely degrade performance. (arXiv)
    • There’s even research on resilience: how well the I2P network resists centrality-based attacks or node removal. (arXiv)
  3. What People Use It For

    • Hosting “eepsites”: websites that live inside I2P, using .i2p addresses. (Wikipedia)
    • Anonymous email: via I2P-Bote, a plugin for email inside I2P. (Wikipedia)
    • Messaging, file-sharing, IRC, P2P — many typical Internet-like services are possible. (geti2p.net)
    • Some use outproxies: gateways that let I2P users reach the “clearnet” (normal Internet), though these are volunteer-run and not part of a core “exit network” like Tor’s exit nodes. (geti2p.net)

Can I2P Help Against Government Control / Censorship?

Pros:

  • Decentralization: Since there’s no central server that can be compelled (at least in the same way as a centralized service), it's more censorship resistant. (geti2p.net)
  • Anonymity: Strong anonymity for both sender and receiver. (geti2p.net)
  • Encrypted communication: All traffic inside I2P is encrypted. (geti2p.net)
  • Resistance to surveillance: Because paths are mixed, it's hard to trace exactly who is talking to who; good for resisting dragnet surveillance. (i2p.net)

Limitations / Risks:

  • Performance / Latency: Mix networks like I2P typically have higher latency than clearnet, and throughput can be limited depending on your peers, tunnel setup, etc.
  • Blocking: While more resilient than some networks, I2P can be blocked. Research shows that with resources, adversaries can block a very large percentage of known I2P peers. (arXiv)
  • Bootstrapping: New I2P nodes need to bootstrap via “reseed servers” to join the network. (geti2p.net)
  • Not a silver bullet: It protects anonymity within I2P, but if you use an outproxy to access clearnet, you may expose some risks or lose some protections. (geti2p.net)
  • Resource requirement: Running a full I2P router (especially to host services) uses more memory / CPU. (geti2p.net)
  • Structural fragility: Recent research suggests vulnerability under targeted disruption (centrality-based attacks) – the network isn’t completely structurally robust. (arXiv)

Could Fediverse Instances Run Over I2P?

Yes — in principle you can host Fediverse (ActivityPub) instances over I2P or similar anonymity networks, but there are important trade-offs and challenges.

  1. Technical Feasibility:

    • Since I2P supports TCP-like tunnels, you could run a web server (e.g., a Mastodon instance) inside I2P. The service endpoint would be a .i2p address. (geti2p.net)
    • The ActivityPub protocol (used by Fediverse) works over HTTP/web, so as long as your instance can serve HTTP traffic over I2P, it’s feasible.
  2. Federation Considerations:

    • To federate with “normal” (clearnet) instances, you would likely need some kind of bridge or proxy. For example, a clearnet instance could communicate with your I2P-hosted instance if both sides are able to talk to each other.
    • There are hints from user communities that this kind of setup has been experimented with, especially over Tor and onion services; similar patterns could apply to I2P. (Lemmy World)
    • But if many Fediverse users are on clearnet, they may not (or may not want to) connect via I2P-only instances, limiting reach.
  3. Performance & Usability Trade-offs:

    • Latency: slower response times might make user experience worse (for web UI, streaming, etc.).
    • Bandwidth: depending on how many I2P peers you have and how good your tunnels are, serving media-heavy content (images, video) could be challenging.
    • Reliability: because of how the I2P network works, tunnels periodically rebuild; that could produce instability.
  4. Security & Moderation:

    • Anonymity: Hosting a Fediverse instance in I2P gives stronger anonymity for the host, but moderation becomes trickier. If users are fully anonymous, enforcing rules or dealing with abuse is harder.
    • Discoverability: Unless you actively publicize your .i2p instance, it might stay “hidden” (in a good way), but that also limits adoption.

Bottom Line: Is I2P a Realistic “Anti-Censorship Internet” for Fediverse?

  • Partially viable: Yes, for certain communities (activists, privacy-focused users, small fediverse communities) I2P could be a good way to host and federate in a censorship-resistant way.
  • Not a mass replacement (yet): For mainstream, high-traffic, public-facing Fediverse instances, the performance and adoption trade-offs are non-trivial.
  • Complement, not total substitute: It’s more realistic to think of I2P as a complementary layer — for users/instances who need stronger anonymity or resistance to censorship — rather than a complete replacement of clearnet.
29
 
 

Why is the West Censoring Porn?

The West's approach to censoring porn seems to stem from a complex mix of moral, economic, and socio-political factors, as gathered from various perspectives. Here are the key arguments:

Moral and Cultural Panic

A significant part of the discussion revolves around a moral panic concerning queerness and sexual expression. This is often tied to:

  • Fear of Queerness: There’s a concern that any representation of same-sex couples or trans individuals may be defined as "porn," leading to increased censorship.
  • Moral Decay: Policymakers may frame the censorship of porn as a necessary step against perceived moral decline, often associated with rising misogyny and normalized sexual violence.

Economic and Labor Market Implications

The censorship of porn may also relate to larger economic factors:

  • Birth Rates: There is a growing concern about declining birth rates which, according to some, leads to a desire to control and manipulate sexuality in society.
  • Workplace Dynamics: Censoring porn can remove a source of supplemental income for individuals, pushing them to work harder in traditional job markets.

Exploitation and Surveillance

The dynamics of exploitation and increased surveillance are also pronounced:

  • Surveillance State: Expanding the censorship framework can act as an excuse to enhance surveillance capabilities on various sectors of society, including those engaging in sex work.
  • Exploitation of Vulnerable Populations: Censorship can push sex work underground, increasing the precarity for those involved and ultimately allowing greater exploitation similar to how the drug trade has been treated.

Political Manipulation and Control

Several contributors noted how this censorship can serve political ends:

  • Client of Exploitation: The government can manipulate industries and sectors to maintain compliance through methods like debanking, ensuring that certain groups (e.g., trans individuals) become scapegoats in broader political agendas.
  • Empire Building: U.S. policies around porn can be seen as a way to export domestic moral and economic frameworks to allied nations, further consolidating American influence globally.

Disconnect Between Public Sentiment and Regulation

Many feel that current regulations are superficial and do not address the root causes of perceived societal issues linked to pornography:

  • False Solutions: There's concern that banning porn is seen as an easy fix for more complicated societal problems, providing a false sense of relief that makes people feel like action is being taken without actual structural change.
  • Desire for Meaningful Change: Instead of merely censoring porn, there is a call for more comprehensive solutions that protect individuals in the industry and improve social conditions overall.

Conclusion

Censorship of porn in the West appears to be a cocktail of cultural apprehensions, economic motivations, and political maneuvers, all aimed at managing societal norms and controlling populations. While some view this as a means of safeguarding moral standards, others argue it represents a deeper manipulation of personal freedoms and socioeconomic realities.

30
 
 

Average Number of Children for Economic Sustainability

To maintain a stable population size without contraction, a country must achieve a replacement level fertility rate, which is typically around 2.1 children per woman. This figure accounts for the need to replace both parents and factors in child mortality rates, which can lead to fewer surviving offspring reaching reproductive age.


Understanding Replacement Level Fertility

  • Replacement Rate: This is the total fertility rate (TFR) at which a population exactly replaces itself from one generation to the next, without factoring in net migration. The 2.1 children per woman benchmark is common in most developed countries.

  • Global Context: As of 2023, the global average TFR is about 2.3 children per woman, indicating a significant decline from historical figures but still above the replacement threshold. Some countries, particularly in East Asia (e.g., South Korea, Japan), are facing TFR as low as 1.0, which could lead to population shrinkage and economic challenges over time.

Fertility Rates Around the World

Region Average TFR (Children per Woman) Notes
Developed Countries ~1.5 - 2.1 Generally below replacement level.
Sub-Saharan Africa ~5.4 Expected to decline only modestly.
East Asia ~1.0 - 1.5 Significant declines impacting economy.
Global Average ~2.3 Close to replacement, but regional variances exist.

Implications of Low Fertility Rates

  1. Economic Growth: Low fertility rates can result in labor shortages and a shrinking consumer base, potentially leading to slower economic growth.

  2. Aging Population: A declining birth rate creates a higher proportion of older individuals, increasing the burden on social services and healthcare systems.

  3. Policy Responses: Many governments are implementing policies to encourage higher birth rates, such as parental leave, childcare support, and financial incentives for families.

Maintaining this balance between birth rates and economic needs is crucial for sustainable development. Countries actively monitoring and responding to these trends can better manage their demographic challenges.

31
 
 

In the mid-19th century, a wave of health reform swept through America. At the heart of it was James Caleb Jackson, who in 1863 created the first dry breakfast cereal, Granula, at his sanitarium. He believed digestive “cleanliness” was key to wellness. (Wikipedia) Soon after, John Harvey Kellogg and his brother Will, working at the Battle Creek Sanitarium in Michigan, developed what became cold flakes of grain designed to be lighter and easier to digest than heavy breakfasts. (National Geographic) These cereals were marketed not just as convenient foods but as remedies for modern ailments — dyspepsia, sluggishness, even moral ills. (PBS) By the turn of the 20th century, ready-to-eat cereals were being mass-produced and marketed with claims that stretched far beyond nutrition. (HISTORY CHANNEL ITALIA) In short: what began as a dietary reform experiment rooted in wellness ideology turned into a mass-market breakfast staple built on convenience and health claims whose scientific basis was weak or speculative.

32
 
 

How would I build a Python bot that automatically reposts or highlights statistically outlier posts from my Lemmy subscriptions—like anything more than one standard deviation above the average? I’m looking for a general approach covering data retrieval from the Lemmy API, outlier detection, and reposting mechanics.

33
 
 

Here are the commonly cited claims that lead people to believe the September 11 attacks (9/11) were a government or inside-job conspiracy. These are claims, not validated facts; many have been investigated and debunked. I’m presenting them objectively so you can judge the strength of each.

  1. The collapse of World Trade Center Tower 7 (WTC 7) resembled a controlled demolition (straight down, into its footprint) rather than a fire-and-impact collapse. (Wikipedia)
  2. The impact and fires from the hijacked planes alone could not have caused the towers to collapse as quickly as they did. (Sky HISTORY TV channel)
  3. A missile, drone, or non-commercial aircraft hit the Pentagon rather than American Airlines Flight 77, because the entry hole appeared small and plane debris seemed limited. (CBS News)
  4. The U.S. military and air-defence (e.g., North American Aerospace Defense Command / NORAD) stood down, delayed intercepts, or allowed the attacks to proceed. (Sky HISTORY TV channel)
  5. Significant put-option trading (bets that stock prices would fall) in airline companies occurred prior to 9/11 — implying foreknowledge. (Sky HISTORY TV channel)
  6. Some intelligence, warnings, or prior knowledge of hijackings or al-Qaeda attacks existed but were ignored or suppressed—raising suspicion that government knew more than it admits. (Voice of America)
  7. The National Institute of Standards and Technology (NIST) investigations are criticised for relying on modelling rather than full forensic disclosure, so theorists argue the collapse explanations are incomplete. (Wikipedia)
  8. The think-tank Project for the New American Century (PNAC) had argued before 9/11 for a “new Pearl Harbor” to justify increased military spending and foreign wars; conspiracists see this as motive. (arfjournals.com)
  9. The fact that the towers collapsed so completely into dust and rubble leads some to argue that explosives or thermitic materials were used (e.g., claims of “nano-thermite” found in dust). (Wikipedia)
  10. The visible “search for survivors” and subsequent swift decision to demolish or clear WTC 7 raised suspicions of cover-up. (Sky HISTORY TV channel)
  11. The timing of the attacks allowed the U.S. government to pass laws (e.g., the USA PATRIOT Act) and expand surveillance and military reach; some see this as a motive. (lemontopics.com)
  12. The number of initial warnings and intelligence failures (e.g., known hijackers entering the country) feed into the belief that something was deliberately mishandled. (International Business Times)
  13. Some official statements and timelines are inconsistent or incomplete, which fuels suspicion of a cover-up. (Program on Extremism)
  14. The fact that the towers collapsed into their own footprint (especially Tower 2, then Tower 1) is cited as resembling classic demolition patterns. (Wikipedia)
  15. The building owner of the WTC complex, Larry Silverstein, reportedly said “pull it” (interpreted by some as “pull the building”) in a televised interview regarding WTC 7 collapse. (Note: disputed) (Reddit)
  16. The rapid transfer of billions of dollars in contracts (e.g., to defence, reconstruction) after 9/11 is viewed by some as benefiting people with ties to the event. (Sky HISTORY TV channel)
  17. Some testimonies from first-responders and witnesses claim hearing explosions or seeing flashes that are interpreted as planted charges. (Sky HISTORY TV channel)
  18. The presence of ongoing war-games or military exercises on the morning of 9/11 is flagged by conspiracists as enabling confusion and facilitating the attacks. (JOE.ie)
  19. Claims that the U.S. government rushed to destroy evidence, restricted access to sites, or cleared rubble quickly—interpreted as preventing independent forensic investigation. (Sky HISTORY TV channel)
  20. The distrust in government overall (due to other scandals) makes people more willing to believe that such a major event could have been orchestrated rather than merely allowed. (International Business Times)
34
 
 

Right now, big communities dominate the feed. I’m wondering what sort algorithm could level the field so niche or hobbyist communities have a fair chance to get seen.

There’s a good related post: Niche Communities won't be able to reach their true potential until Lemmy adds a sort that takes engagement into account. It puts it well:

“If Lemmy is to truly start having active hobbyist communities instead of being 95% lefty US politics, Shitposts, and some tech stuff, it needs a sort that takes into account the user’s engagement.”

What do you think should be the default sort for a more balanced Lemmy?

35
 
 

To use Anime4K with mpv on Manjaro, you need to do the following steps:

  1. Install Anime4K: Anime4K is available on the AUR. You can install it using any AUR helper like yay or pamac. Here's how you can do it with yay:

    yay -S anime4k-git
    

    Source 0

  2. Install mpv: You can install mpv from the official Manjaro repositories using pacman:

    sudo pacman -S mpv
    

    Source 3

  3. Download the Anime4K shaders: Depending on your GPU, you can download the optimized shaders for lower-end GPU or higher-end GPU from the Anime4K Github page. Extract the shaders and place them in the shaders folder. Source 3

  4. Configure mpv to use Anime4K: You need to modify your mpv.conf file to use Anime4K. The mpv.conf file is usually located in ~/.config/mpv/mpv.conf. If it doesn't exist, you can create it. Below is a sample configuration:

    profile=gpu-hq
    scale=ewa_lanczossharp
    cscale=ewa_lanczossharp
    dscale=mitchell
    tscale=oversample
    correct-downscaling=yes
    sigmoid-upscaling=yes
    scaler-resizes-only=yes
    deband=yes
    

    Add the path to the Anime4K shaders with the glsl-shaders-append option. For example:

    glsl-shaders-append="~~/shaders/Anime4K_Upscale_CNN_M_x2_Denoise_Bilateral_Mode.glsl"
    

    Replace "~~/shaders/Anime4K_Upscale_CNN_M_x2_Denoise_Bilateral_Mode.glsl" with the path to your shaders. Source 6

  5. Use the correct mode for your content: Anime4K has 3 major modes: A, B, and C. Each mode is optimized for a different class of anime degradations. You can switch between these modes using CTRL+1 for Mode A (Optimized for 1080p Anime), CTRL+2 for Mode B (Optimized for 720p Anime), and CTRL+3 for Mode C (Optimized for 480p Anime). You can disable Anime4K using CTRL+0. Source 3

Remember that Anime4K is quite GPU-intensive, so ensure your hardware is capable of handling it. If you experience issues, try adjusting your mpv settings or use a lower-end GPU version of Anime4K.

36
 
 

The question of whether the United States has become a fascist state is a topic of significant debate among scholars, political analysts, and commentators. While some argue that certain developments exhibit characteristics reminiscent of fascism, others contend that these actions do not constitute a full-fledged fascist regime. Here's an overview of the arguments from both perspectives:


Evidence Suggesting Fascist Tendencies

Several recent actions by the U.S. government and political figures have raised concerns among observers:

  • Authoritarian Rhetoric and Military Deployment: President Donald Trump has employed militaristic language and deployed National Guard troops to Democratic-run cities, invoking wartime rhetoric to address domestic issues. Critics argue that this blurs the lines between military and civilian governance, undermining democratic norms (The Washington Post).

  • Suppression of Dissent: The administration's efforts to designate the anti-fascist movement "antifa" as a terrorist organization have been criticized as politically motivated attempts to suppress opposition. Legal experts note that antifa is a decentralized movement, making such designations legally questionable (Reuters).

  • Control Over Cultural Institutions: An executive order aimed at removing "improper, divisive or anti-American ideology" from institutions like the Smithsonian has been likened to authoritarian regimes' attempts to control cultural narratives and suppress discussions on systemic racism (The Guardian).

  • Project 2025: Critics argue that Project 2025 seeks to dismantle the U.S. system of checks and balances, concentrating power in the executive branch and undermining democratic institutions (Center for American Progress).


Counterarguments

Despite these concerns, some analysts argue that labeling the U.S. as fascist is an overstatement:

  • Legal and Institutional Resistance: While certain actions have been taken, legal challenges and resistance from state governments and institutions demonstrate that democratic checks and balances are still functioning (The Washington Post).

  • Lack of Totalitarian Control: Fascism typically involves the complete control of all aspects of life, including the economy, media, and education. While there are concerning trends, the U.S. still maintains a level of pluralism and institutional autonomy (Al Jazeera).

  • Political Polarization: Some argue that the current political climate is characterized by extreme polarization rather than a clear move toward fascism. The use of terms like "fascist" may be more reflective of political rhetoric than an accurate description of the political system (Reddit).


Conclusion

While there are actions and policies in the United States that exhibit characteristics reminiscent of fascism, such as the centralization of power, suppression of dissent, and control over cultural narratives, these developments have not yet culminated in a fully realized fascist regime. The situation remains fluid, and ongoing vigilance is necessary to safeguard democratic institutions and norms.


37
 
 

The 8BitDo Ultimate and Ultimate 2 controllers share a similar design but differ significantly in features, performance, and customization options. Here's a detailed comparison to help you understand the key differences:


🎮 Core Features Comparison

Feature 8BitDo Ultimate 8BitDo Ultimate 2
Connectivity Bluetooth, USB-C, 2.4GHz wireless via USB dongle Bluetooth, USB-C, 2.4GHz wireless via USB dongle
Polling Rate 125Hz 1000Hz
Hall Effect Joysticks No Yes (TMR Hall Effect Joysticks)
Hall Effect Triggers No Yes
Extra Buttons No Yes (two shoulder bumpers and two back paddles)
RGB Lighting No Yes (RGB Fire Ring lighting effects)
Motion Controls No Yes (six-axis motion controls)
Charging Dock No Yes (RGB-lit charging stand included)
Software Customization Limited Full customization via 8BitDo Ultimate Software V2
Price Range Approximately $40–$50 Approximately $60–$70

🔍 Detailed Feature Breakdown

🕹️ Hall Effect Joysticks and Triggers

The Ultimate 2 features TMR Hall Effect joysticks and triggers, offering enhanced precision and durability by reducing drift and wear over time. (The Verge)

🎮 Extra Buttons

The Ultimate 2 introduces additional inputs: two shoulder bumpers and two back paddles, providing more control options for gamers. (Reddit)

💡 RGB Lighting and Motion Controls

The Ultimate 2 includes customizable RGB Fire Ring lighting effects and six-axis motion controls, adding both aesthetic appeal and functionality for compatible games. (The Verge)

🧰 Charging Dock and Software Customization

The Ultimate 2 comes with an RGB-lit charging stand and supports full customization through 8BitDo's Ultimate Software V2, allowing users to remap buttons, adjust sensitivity, and configure profiles. (The Verge)


🧠 Summary

Aspect Ultimate Ultimate 2
Ideal For Budget-conscious gamers seeking basic functionality Enthusiasts desiring advanced features and customization
Performance Standard polling rate and analog controls High polling rate with Hall Effect sensors for enhanced precision
Customization Limited options Extensive customization via software
Extras None RGB lighting, extra buttons, motion controls, charging dock
Price More affordable (~$40–$50) Premium pricing (~$60–$70)

If you're looking for a controller that offers advanced features, customization, and enhanced performance, the 8BitDo Ultimate 2 is the superior choice. However, if you're on a budget and need a reliable controller for basic gaming, the 8BitDo Ultimate remains a solid option.


38
 
 

I’m searching for programming Q&A sites like Stack Overflow where I can ask “how-to” or practical coding questions without worrying about moderators closing my posts. Ideally, a community that’s beginner-friendly and encourages learning rather than strictly enforcing rules. Any recommendations?

39
 
 

cross-posted from: https://reddthat.com/post/52207927

I use Manjaro Linux with the Cinnamon desktop and sometimes run into system-level issues, but I have no idea how to properly debug them. It doesn’t feel as straightforward as debugging a normal program. What’s the best way or resource to learn system debugging on Linux?

40
 
 

If you're looking to store a piece of text that you plan to access frequently on a Linux system, there are several efficient methods depending on your specific needs and usage context.


🗂️ 1. Store in Your Home Directory

For general-purpose text storage:

  • Location: ~/Documents, ~/Notes, or a custom directory like ~/mytextfiles
  • Why: Files in your home directory are easily accessible and can be backed up or synced across devices if needed.
  • Tip: If you access this text often, consider creating an alias or a symbolic link to the file in a directory that's already in your PATH (Ask Ubuntu).

⚙️ 2. Add to Your Shell Configuration

For snippets or commands you frequently use:

  • Location: Add the text directly to your ~/.bashrc (or ~/.zshrc if using Zsh)
  • Why: This method is ideal for storing environment variables or shell functions that you want to be available in every terminal session.
  • Example:
  export MY_TEXT="Your frequently used text here"
  • Tip: After editing ~/.bashrc, run source ~/.bashrc to apply the changes immediately.

📋 3. Use a Clipboard Manager (GUI)

For quick access to copied text:

  • Tools: Clipman, Diodon, CopyQ
  • Why: These tools allow you to store and quickly retrieve multiple clipboard entries, which is useful for text snippets you copy and paste frequently.
  • Note: This method is more suitable for graphical desktop environments.

🧠 4. Utilize a Scratchpad File

For temporary or frequently edited text:

  • Location: Create a file in ~/tmp or ~/setups
  • Why: These directories are commonly used for temporary files and can be easily accessed and managed.
  • Tip: You can open this file directly with your preferred text editor using a command like nano ~/tmp/mytextfile.txt.

🔗 5. Create a Symbolic Link to a Frequently Used File

For quick access to an existing file:

  • Command:
  ln -s /path/to/your/file.txt ~/myfilelink
  • Why: This creates a shortcut to your file in your home directory, making it easily accessible from anywhere.
  • Tip: You can then open it with nano ~/myfilelink or any other editor.

💡 6. Use a Terminal File Manager

For efficient navigation and access:

  • Tools: ranger, nnn, vifm
  • Why: These file managers provide a terminal-based interface for navigating and managing files, allowing you to quickly access your frequently used text files.
  • Tip: Install a file manager using your package manager, e.g., sudo apt install ranger.

🔒 7. Store in a Secure Location for Sensitive Text

For sensitive information:

  • Location: ~/.secrets or use a keyring manager like gnome-keyring
  • Why: These methods provide encrypted storage for sensitive data, ensuring it's protected.
  • Tip: Access the stored text using appropriate tools or commands that interact with the keyring.

🧭 8. Sync Across Devices (Optional)

If you need access from multiple machines:

  • Tools: Use synchronization tools like Syncthing or cloud storage solutions
  • Why: These tools allow you to keep your text file synchronized across different devices.
  • Tip: Set up synchronization by following the respective tool's documentation.

Choose the method that best fits your workflow and security requirements. If you need further assistance with any of these options, feel free to ask!

41
 
 

Writing a good Git commit message is a skill, and prompting a large language model (LLM) to do it effectively is about giving it clear context, structure, and intent. Here's a detailed guide on how to craft prompts for this purpose.


1. Give the LLM context about the changes

LLMs need to know what changed and why. You can provide:

  • A diff or a summary of changes
  • The file names and their purpose
  • Any bug IDs, tickets, or issue numbers

Example:

I modified `app.py` to fix a bug where the login fails if the username has special characters. Also updated `requirements.txt` to include `validators` library.

2. Specify the style of commit message

Good commit messages often follow the Conventional Commits style:

<type>(<scope>): <short summary>
<BLANK LINE>
<longer description>

Where type can be:

  • feat: new feature
  • fix: bug fix
  • chore: maintenance
  • docs: documentation

You can prompt the LLM to adhere to this style:

Write a Git commit message following the Conventional Commits format. Keep the first line under 50 characters, and include a detailed description if necessary.

3. Include an example prompt

Here’s a full example prompt you could use:

I made the following changes in this commit:
- Fixed login bug when the username contains special characters.
- Updated `requirements.txt` to include the `validators` library.

Write a clear, concise, and professional Git commit message in the Conventional Commits style, including:
- A short summary under 50 characters
- A longer description if necessary explaining the reason for the change
- Reference the issue #123 if relevant

Expected output from the LLM:

fix(auth): handle special characters in username

Login was failing when usernames contained special characters.
Added validation using the `validators` library to prevent this issue.

Closes #123

4. Tips for better prompts

  1. Include diff snippets if you want extremely precise commit messages.

  2. Ask for multiple options:

    Provide 3 alternative Git commit messages for these changes.
    
  3. Ask for formal or casual tone, depending on your team style.

  4. Include issue references for linking commits to tickets.


If you want, I can write a reusable LLM prompt template that you can plug into any repo to automatically generate high-quality commit messages from diffs. It would save a ton of time.

Do you want me to do that?

42
 
 

Humans eating insects (entomophagy) is ancient and biologically real. Yet we still feel disgust toward bugs. What are the signs we evolved eating them — and why doesn’t that stop disgust?


Evidence We Evolved Eating Insects

  1. Chitinase genes in mammals Early placental mammals had multiple working genes for chitin-digesting enzymes. Humans retain remnants of these. That points to insect-heavy diets in deep ancestry. (Berkeley News)

  2. Primates eating insects Many extant nonhuman primates eat insects regularly. That suggests our common ancestors also did so. (Annual Reviews)

  3. Archaeological evidence

    • Coprolites (fossilised droppings) show insect remains. (Wikipedia)
    • Bone tools with wear marks consistent with digging up termite mounds. (Wikipedia)
    • Art (cave paintings) depicting people collecting wild bee nests. (Wikipedia)
  4. Nutritional value and ecological utility Insects are nutrient dense: good protein‐to‐fat ratios, useful micronutrients. Useful especially when large vertebrate meat was scarce. (Annual Reviews)


Why Disgust Persists Despite Evolution

  • Disgust evolved for disease avoidance. Bugs often associate with decay, pathogens.
  • Culture modifies perception: many societies learned to see insects as unclean or “not food.”
  • Urban life severs daily exposure to insects, reinforcing unfamiliarity and fear.
  • Morphological and sensory triggers (many legs, exoskeleton, movement) still activate innate aversion in many people.

If you want, I can rewrite this as a social media post with tone or audience target (science, casual, etc.).

43
 
 

Several rolling-release Linux distributions offer support for Wayland, catering to users who prefer continuous updates and modern display technologies. Here are some notable options:

1. openSUSE Tumbleweed

  • A stable rolling-release distro known for its rigorous testing and stability.
  • Supports Wayland, including experimental sessions for LXQt with compositors like Sway and Hyprland. (9to5Linux)
  • Ideal for users seeking the latest software with robust stability. (LinuxBlog.io)

2. Arch Linux

  • A minimalist rolling-release distro offering maximum control.
  • Supports Wayland through compositors like Sway, Hyprland, and River.
  • Suitable for advanced users comfortable with manual configuration.

3. Manjaro Linux

  • An Arch-based distro with user-friendly enhancements.
  • Offers official editions with GNOME and KDE Plasma, both supporting Wayland.
  • Provides a balance between cutting-edge software and ease of use.

4. Solus

  • A rolling-release distro with its own package manager and desktop environment.
  • Offers Plasma 6, which includes Wayland support. (community.kde.org)
  • Designed for users seeking a cohesive and curated experience.

5. Artix Linux

  • An Arch-based distro that avoids systemd, offering init systems like OpenRC and runit.
  • Supports Wayland through compositors like Sway and Hyprland.
  • Appeals to users preferring a systemd-free environment. (Wikipedia)

6. Chimera Linux

  • A rolling-release distro using musl libc and dinit.
  • Supports Wayland with GNOME Shell. (Wikipedia)
  • Targets users interested in a minimalist and flexible system.

7. Archcraft

  • A minimal Arch-based distro with preconfigured window managers.
  • Supports Wayland through compositors like Sway and Hyprland.
  • Suitable for users who prefer a lightweight and aesthetic setup. (Wikipedia)

8. Fedora (Rawhide)

  • A cutting-edge distro with a focus on free and open-source software.
  • The Rawhide branch is a rolling-release version that supports Wayland.
  • Best for users who want the latest features and are comfortable with potential instability.

9. Void Linux

  • A rolling-release distro known for its simplicity and efficiency.
  • Supports Wayland with compositors like Sway.
  • Appeals to users seeking a lightweight and systemd-free environment. (LinuxBlog.io)

10. PCLinuxOS

  • A rolling-release distro with a focus on user-friendliness.
  • Offers KDE Plasma, which supports Wayland. (Wikipedia)
  • Suitable for users who prefer a polished desktop experience.

11. GreenBANG (formerly ArchBang)

  • A lightweight rolling-release distro based on Arch Linux.
  • Supports Wayland through compositors like Sway and Hyprland.
  • Ideal for users with older hardware or those seeking a minimal setup. (Wikipedia)

12. Kali Linux

  • A rolling-release distro tailored for security professionals.
  • The testing branch supports Wayland.
  • Best for users interested in penetration testing and security research.

13. Chimera Linux

  • A rolling-release distro using musl libc and dinit.
  • Supports Wayland with GNOME Shell.
  • Targets users interested in a minimalist and flexible system. (Wikipedia)

14. Zorin OS

  • A user-friendly distro based on Ubuntu.
  • The latest versions support Wayland, especially on systems with newer hardware.
  • Suitable for users transitioning from other operating systems.

15. Debian Testing

  • A rolling-release branch of Debian offering newer software.
  • Supports Wayland, particularly with GNOME.
  • Ideal for users seeking Debian's stability with more up-to-date packages.

16. Kali Linux

  • A rolling-release distro tailored for security professionals.
  • The testing branch supports Wayland.
  • Best for users interested in penetration testing and security research.

17. Ubuntu (with GNOME)

  • While not traditionally rolling-release, Ubuntu offers a rolling-release variant.
  • The GNOME desktop environment supports Wayland.
  • Suitable for users seeking a balance between stability and newer software.

18. Chimera Linux

  • A rolling-release distro using musl libc and dinit.
  • Supports Wayland with GNOME Shell.
  • Targets users interested in a minimalist and flexible system. (Wikipedia)

When choosing a rolling-release distro with Wayland support, consider factors like hardware compatibility, desired desktop environment, and system configuration preferences. Distributions like openSUSE Tumbleweed and Fedora Rawhide offer robust support for Wayland, while Arch-based distros provide flexibility and control.

If you have specific requirements or preferences, feel free to provide more details, and I can offer more tailored recommendations.

44
 
 

You can approximate per-directory history in zsh using plugins or custom hooks. The shell itself doesn’t support this natively (though patches have been proposed). (zsh.org)

Here are viable methods:


Method 1: Use the “per-directory-history” plugin (Oh My Zsh or standalone)

  • Oh My Zsh includes a plugin called per-directory-history. (GitHub)
  • To enable it, add per-directory-history to your plugins=( … ) in ~/.zshrc. (Unix & Linux Stack Exchange)
  • The plugin arranges that commands are saved to both a global history file and to per-directory-history files (mirroring the directory tree under a base history directory). (Jim Hester)
  • There is a toggle (default key binding Ctrl-G) to switch between viewing global history and directory-specific history. (GitHub)
  • You can configure base dir for per-directory history via a variable like HISTORY_BASE. (GitHub)

Method 2: Use another plugin or custom “cwd-history” approach


Method 3: DIY using hooks (zshaddhistory / chpwd)

If you want to roll your own:

  1. In your ~/.zshrc, set a base directory to store local histories, e.g.:

    export DIRHIST_BASE="$HOME/.dirhist"
    
  2. Use chpwd hook (runs on each cd) to switch HISTFILE:

    function chpwd_set_histfile() {
      local dir_rel="${PWD/#$HOME\//}"  # directory relative to home
      local histf="${DIRHIST_BASE}/${dir_rel}/.zsh_history"
      mkdir -p "$(dirname "$histf")"
      HISTFILE="$histf"
    }
    autoload -U add-zsh-hook
    add-zsh-hook chpwd chpwd_set_histfile
    
  3. Optionally, when starting the shell (at prompt or init), you may want to load the relevant directory history:

    if [[ -n $PWD ]]; then
      chpwd_set_histfile
      fc -R  # read history from the new HISTFILE
    fi
    
  4. You may also want to duplicate commands into a global history file (so you don’t lose cross-dir commands). You can use the zshaddhistory function to append each new command to a global log as well. Example:

    function zshaddhistory() {
      local cmd=${1%%$'\n'}  # strip newline
      print -sr -- "$cmd"   # to current HISTFILE
      print -s -- "$cmd" >> "$HOME/.zsh_global_history"
      return 1  # prevent double logging by default handler
    }
    

Caveats:

  • You must manage HISTSIZE, SAVEHIST, trimming, etc.
  • If you have concurrent shells in the same directory, they write to the same file.
  • Performance may degrade if you have many directories with deep trees.
  • Some plugins limit history size per directory.

If you like, I can generate a ready-to-use .zshrc snippet (or plugin setup) for your environment (Linux/macOS). Do you prefer plugin-based or DIY?

45
 
 

Ah, the classic “Han shot first” debate—this is one of the most famous controversies in Star Wars fandom, and it’s all about a very specific scene in Episode IV: A New Hope. Let me break it down carefully:


The Scene

  • Han Solo is in the Mos Eisley Cantina.
  • Greedo, a bounty hunter, confronts him about a debt Han owes to Jabba the Hutt.
  • They have a tense standoff at close range.

What Happened Originally (1977)

  • In the original 1977 theatrical release, Han Solo shoots Greedo without being shot at first.
  • Han’s action is portrayed as preemptive self-defense—he’s the one who fires first, and Greedo never fires a shot.

The Change in 1997 Special Edition

  • George Lucas made changes for the 1997 Special Edition re-release.
  • Now, the scene was edited so that Greedo shoots first and misses, and then Han fires back.
  • Lucas’s reasoning: he wanted Han to seem less “cold-blooded” and more morally upright—a reluctant hero rather than someone who kills first.

Why Fans Say “Han Shot First”

  • Many fans argue that the original Han Solo was a roguish, morally gray character, and his “shoot first” attitude is core to his personality.
  • The 1997 change felt like it undermined Han’s character and was unnecessary.
  • “Han shot first” became a rallying cry among fans who prefer the original version and resist Lucas’s retroactive edits.

Cultural Impact

  • The phrase is now shorthand for defending the original material and resisting changes that alter characters’ personalities.
  • It’s also become a meme, symbolizing debates over artistic edits and “canonical purity.”
46
 
 

I found no credible source that claims Quinlan Vos was officially based on “The Dude” from The Big Lebowski.

However there is evidence of informal influence / homage:

  • In The Clone Wars episode “Hunt for Ziro”, Vos uses a line very similar to “Well, that’s just your opinion, man,” a signature line of The Dude. (Wookieepedia)
  • Some commentators and fans observe a “laid-back, rule-bending” vibe in Vos’s depiction in that episode and liken it to The Dude’s demeanor. (outoflives.net)

If you like, I can dig into interviews with The Clone Wars writers / Lucasfilm to see if any have confirmed this influence. Do you want me to check that?

47
 
 

Use Git’s mirroring functions. Steps:

  1. Clone the Forgejo repo as a bare mirror:

    git clone --mirror https://forgejo.example.com/user/repo.git
    cd repo.git
    
  2. Add GitHub as a mirror remote:

    git remote add --mirror=push github https://github.com/user/repo.git
    
  3. Push the mirror to GitHub:

    git push --mirror github
    

To keep it updated, automate with cron or CI:

#!/bin/sh
cd /path/to/repo.git
git fetch -p origin
git push --mirror github

Run periodically. This mirrors all branches, tags, and refs from Forgejo to GitHub.

48
 
 

If you want to remove all trailing whitespace in a file in Neovim, use this command:

:%s/\s\+$//e

Explanation:

  • :%s → substitute across the entire file
  • \s\+$ → matches one or more spaces or tabs at the end of a line
  • //e → suppress errors if no match is found

Optional: Automatically remove trailing whitespace on save:

Vimscript version (init.vim):

autocmd BufWritePre * :%s/\s\+$//e

Lua version (init.lua):

vim.api.nvim_create_autocmd("BufWritePre", {
  pattern = "*",
  command = [[%s/\s\+$//e]],
})

This ensures your files are always clean of trailing spaces.

49
 
 

I want to feed a Git repository to a large language model so it can give better feedback when I ask questions about the code. To do that, I need to merge all Python files in the repo (including those in subfolders) into a single Markdown file.

The format I’m thinking of is similar to the Linux tree command for the structure, followed by the content of each file. For example:

merged_python_files.md

├── a.py
a.py content between triple quotes
└── subfolder
    └── b.py
b.py content between triple quotes

I’d like a Python script that can recursively traverse the repo, collect all .py files, and produce this Markdown file automatically.

50
 
 

S N Smith's Blog: On Ad Hominem Attacks | Ad hominem, Morally wrong ...

The pyramid you're referring to is Paul Graham's Hierarchy of Disagreement, a framework that ranks seven common forms of disagreement from the least to the most intellectually rigorous. In this hierarchy, ad hominem attacks are considered the second-lowest form of disagreement.

🧠 Paul Graham’s Hierarchy of Disagreement

Paul Graham, in his essay "How to Disagree", outlines the following hierarchy:

  1. Name-calling (DH0): The lowest form, involving insults without any argument.
  2. Ad Hominem (DH1): Attacking the person making the argument rather than the argument itself.
  3. Responding to Tone (DH2): Criticizing the author's tone instead of addressing the content.
  4. Contradiction (DH3): Simply stating the opposite case with little or no supporting evidence.
  5. Counterargument (DH4): Presenting a reasoned argument against the original point.
  6. Refutation (DH5): Directly addressing and disproving specific points made in the original argument.
  7. Refuting the Central Point (DH6): The highest form, where the core argument is directly and thoroughly refuted.

In this hierarchy, ad hominem attacks are placed just above name-calling. While both are considered weak forms of disagreement, ad hominem attacks are slightly more sophisticated because they involve attacking the person rather than resorting to outright insults. However, they still fail to engage with the actual argument and are thus deemed ineffective and intellectually dishonest.

Understanding this hierarchy can help individuals recognize and avoid fallacious reasoning in debates and discussions, promoting more constructive and meaningful conversations.

view more: ‹ prev next ›