I expect Gab to (soon) federate only with preapproved instances, because many of their users will either waver in the face of contrary ideas or demand purity of timelines.
@lnxw48a1@lnxw48a1 That’s frankly why I think Facebook/Instagram/WhatsApp started failing recently. The purity/litmus tests were collapsing in on themselves to cause some self-destruction. Sometimes you can’t be “pure” enough to meet all demands by the crazies these days.
Didn’t we have a single character instance of *.status.net back in the ancient days? That might be the only pure-enough social network in times to come.
@moonman Well, real Americans think of Uncle Stupid instead as Uncle Sugar. That’s not how any of this is supposed to work. Until NFIB v. Sibelius gets overturned we are in a very perilous state with a schizophrenic federal tax collecting agency agency that also has to double as welfare benefits administrator thanks to Mr. Obama seeking Any Means Necessary to accomplish his goals.
@craigmaloney He’s speaking tonight? All I’m aware of is John Stamos hosting a July 4th concert on PBS on Capitol Hill. Gary Sinise was host last year and Joe Mantegna has hosted the event too. Carole King & Vanessa Williams are supposed to be the special guests at tonight’s concert.
@cosullivan@brandon I’ve got one maternal uncle who married a nice lady from MB. She finds it funny when I wish her a happy Canada Day yet she’ll be there for fireworks tomorrow.
>A new wave of spamming attacks on a core component of PGP's ecosystem has highlighted a fundamental weakness in the whole ecosystem. From a report: >Unknown attackers are spamming a core component of the ecosystem of the well-known encryption software PGP, breaking users' PGP installations and clients. What's worse, there may be no way to stop them. Last week, contributors to the PGP protocol GnuPG noticed that someone was "poisoning" or "flooding" their certificates. In this case, poisoning refers to an attack where someone spams a certificate with a large number of signatures or certifications. This makes it impossible for the the PGP software that people use to verify its authenticity, which can make the software unusable or break. In practice, according to one of the GnuPG developers targeted by this attack, the hackers could make it impossible for people using Linux to download updates, which are verified via PGP.