

Next headline, 4.7 million teens move to Fediverse.


Next headline, 4.7 million teens move to Fediverse.


By out in the middle of nowhere, you would have to not be able to connect to any carrier network at all. If you are a Verizon customer and can’t get Verizon signal, but you can see an AT&T tower, you will connect to it to make 911 calls, or a T-Mobile tower, if that’s the one you can see. It doesn’t matter. Every carrier has to carry 911 calls for every other carrier.


I have not done so yet, but I’m going to set up a few of my family members with nodes, but I’m going to get them one of those helltec mesh pocket nodes since it’s also a phone backup battery. That way they’ll be likely to actually carry it with them.


Happy to report that meshtastic is still functioning, despite not being charged a monthly service fee.


Yeah, if it’s not Zigbee or Z-Wave, I’m not touching it. Because I won’t use anything that has a cloud account attached to it.


For me, if I can’t control it with Home Assistant, it does not go in my house. I have smart plugs and I’m getting a smart thermometer and they are all badged for the Works with Home Assistant program so that they can be used even if the company goes out of business. I will buy nothing else.


Open Street Maps. On android you can use osmand from fdroid
With that said, I’ve noticed that OSM does not have a lot of addresses, especially for residential areas, so I would recommend pairing that with gps-coordinates.net two convert street addresses into GPS coordinates.


I haven’t looked at Bookwyrm in quite a while. The last time I did, I couldn’t find the books on it that I was wanting to share. I’m assuming that’s changed recently.


I’m going to have to try to go through House of Suns again. If I remember correctly, I started to try to read it and was put off by the political world environment building or whatever. But I’ll have to give it another shot.


I’m glad I got through the political parts of it at the beginning because the book itself was incredibly interesting, but I found the political part at the beginning to be kind of boring. I need to attempt to read House of Suns because I started it but didn’t get very far through it.


But according to governments around the world, we should use our IDs in order to access this kind of material. And this is exactly why it’s a fucking terrible idea.


You should sit on me instead


They will probably pay a small fine and fix the problem and the world will move on.

I’m a real fucking lightweight, because just that whiskey and Coke makes me really just want to go to sleep. And I haven’t had a drink since like February. I’ve known a bottle of alcohol to be in my house for several years before it’s gone.

I just had a whiskey and Coke. If I’m awake at midnight, then I’m awake. And if I’m not, then I’m not. I don’t really care either way. I’m just gonna chill the fuck out.
A similar attack actually took place on Monero in August of 2025. A mining pool called qubic decided to create their own cryptocurrency and mine Monero and then sell that Monero for Tether and buy their own coin back. This incentivized Monero miners to mine with them because they could get more in rewards than the Monero network itself was giving them. The attacking pool was able to gain between 33 and 35% of the network hashrate, but the other 66% would not join because it was against the Monero network’s interest. That 66% believe in Monero enough that they did not want to see Monero fail.
The Monero network has two-minute blocks, and the attacking pool managed to do an 18-block reorganization, or 36 minutes worth of blocks. This did cause the Monero price to drop somewhat, but the network handled it by just people organically asking for longer confirmations while the network was under attack. Most people on the Monero network consider a transaction to be finalized after 10 blocks or 20 minutes, and since the attacker was able to cause an 18 block reorganization, people started asking for around 30 blocks worth of confirmations.
In the end, the attack failed because the attacking pool realized that people still wanted to use the network even if it was under a denial of service attack and just asked for longer confirmations that they could not sustain the hashrate to undo.

Definitely Hannah Hays


In another comment, I specifically acknowledged that you could not track a device that is powered off, but as soon as it is powered back on, it would be trackable again.
Isn’t Australia the totalitarian state where you must verify your identity to use social media? If so, then just saying you’re older won’t work. If not, then the law is completely pointless.