Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)LI
Posts
3
Comments
12
Joined
1 wk. ago
Work Reform @lemmy.world

Should law enforcement workers form unions?

What about other government workers, such as military, teachers, social workers, etc?

  • You could hire a landscaper to mulch it and plant native ground covers and other native plants (or do it yourself). Very low maintenance. And you could have a landscaper come out again a couple times a year if you don't want to do that either.

  • It's Trump, the Republicans, Musk, and other billionaires using the power of the government to coerce Bytedance into actions that will be favorable to them. It's kind of Trump's MO; threaten people/corporations to enrich his family or otherwise benefit him in some way. They will likely force Bytedance to sell TikTok at a large discount to the government and Trump's friends.

  • News @lemmy.world

    The 127 Dorrance St. building houses the offices of Joseph Molina Flynn, an immigration lawyer in Massachusetts and Rhode Island who serves as a municipal court judge in Central Falls. Molina Flynn's office is the focus of the search, according to multiple sources.

    Molina Flynn was the first openly gay person and the first formerly undocumented person to serve on the bench in Central Falls, according to the city.

    Shortly after news of the FBI's actions broke, Central Falls Mayor Maria Rivera announced Molina Flynn's resignation.

    Cybersecurity @sh.itjust.works

    Chinese hacks, rampant ransomware, and Donald Trump’s budget cuts all threaten US security. In an exit interview with WIRED, former CISA head Jen Easterly argues for her agency’s survival.

    https://web.archive.org/web/20250124034155/https://www.wired.com/story/big-interview-jen-easterly-cisa-cybersecurity/

  • I mean, don't friend, or put high trust on people you don't know is pretty strong. Due to the "six degrees of separation" phenomenon, it scales pretty easily as well. If you have stupid friends that friend bots you can cut them off all, or just lower your trust in them.

    "Post-turing" is pretty strong. People who've spent much time interacting with LLMs can easily spot them. For whatever reason, they all seem to have similar styles of writing.

  • I think a web-of-trust-like network could still work pretty well where everyone keeps their own view of the network and their own view of reputation scores. I.e. don't friend people you don't know; unfriend people who you think are bots, or people who friend bots, or just people you don't like. Just looked it up, and wikipedia calls these kinds of mitigation techniques "Social Trust Graphs" https://en.wikipedia.org/wiki/Sybil_attack#Social_trust_graphs . Retroshare kinda uses this model (but I think reputation is just a hard binary, and not reputation scores).

  • You don't need blockchain for reputations systems, lol. Stuff like Gnutella and PGP web-of-trust have been around forever. Admittedly, the blockchain can add barriers for some attacks; mainly sybil attacks, but a friend-of-a-friend/WoT network structure can mitigate that somewhat too,