• 0 Posts
  • 29 Comments
Joined 8 months ago
cake
Cake day: June 4th, 2025

help-circle
  • What about cases where the move is only temporary? Should people sell every time and hope there is a place to live when they return?

    In the private lender case, do you see that as different from someone who starts their own company and manages the property themselves while the renter pays them directly?

    The earning equity piece isn’t necessarily incorrect, what the owner is losing is potentially the opportunity to move at all. This assumes they can afford a mortgage + whatever it costs to live somewhere else.


  • The economists’ answer is that renting exists for the people in this situation. You may be moving to another country for a year or two. Are you going to buy a new house every time you move? Renting gives flexibility in that regard.

    Likewise for refugees, putting them up in a rental is a more efficient solution than building new housing for each family.

    That said, the model provides an inherently exploitative market and needs some kind of overlay to function efficiently, which in most US cities it doesn’t at all.


  • 100% it’s always a question of your resources vs theirs, but you’re dead on to make it harder.

    I’ll just add to also turn it off, pull the SIM, and show in a Faraday bag on your way back too. If the recent reporting about ICE buying location data from ad networks shows anything, it’s that they are interested in a capability of following people to and from protests. Graphene should obviate this by disabling Google Play services by default anyway.

    You should leave your regular phone at home, go to another place, power on your other device, speak your part in public, then travel another location and power off. This provides no consistent start or end location to work with for a particular device.


  • Alright, I already “umm, ackshually’d” someone in this thread but this post in particular hit a nerve with me. The Tor security model is based on 3 hops but does not guarantee 3 different jurisdictions. Their circuit building only takes into account “jurisdiction” in the way we’re using it here if you use guard nodes or specific cases when you cannot access the network directly or look like you’re exiting from a Tor node.

    That said, it’s still a very strong project and security model. And everything you said about spreading out your providers without a single point of failure (or pressure) applies.




  • You can plus this up into a vodka cream sauce fairly easily. Throw some garlic in with that onion once it’s starting to look translucent. Cook the tomato paste for a bit until it starts taking on some color then add like 1.5 tbl of vodka and let it cook a bit to lose some of the alcohol flavor.

    Throw in some butter and Parmesan cheese at the end if you have it. Also can incorporate different meats if they’re cheap that week and scales up real well.

    Look up Brian Lagerstrom vodka pasta on YouTube or Piped for the recipe I’m referring to. He also gives options for shelf stable replacements so you can stock up.












  • Sounds a lot like Japan. There’s colored bags that you can buy at the store for “combustible” and not waste. Then there’s metal and glass pickup, small yard waste (mostly twigs), electronics, paper, and certain plastic has a dropoff. I’ve never heard of trash police issuing fines, but they’ll leave your items behind if it’s the wrong day or type.

    When I lived in the US it was just two bins - trash (which was really anything you can fit in a bag, nobody checks) and recycling. Recycling varied by municipality but it was mostly single-stream glass, metal, and most plastics. Things like plastic bags and Styrofoam couldn’t go in the recycling but most places like the grocer would take bags or fluorescent bulbs or batteries.

    Of course, multiple studies have shown that most plastics just end up burned or in the ocean so guess it doesn’t much matter how they are collected…



  • I’ll address the second objection first regarding the phone or browser. You’re always going to rely on some technology for the solutions that use cryptography, you just can’t do those calculations long-hand realistically. That said, look up frameworks like CTAP that allow a potentially untrusted user terminal, like a browser, to interact with a trusted hardware token. Those hardware tokens can be made fairly tamper-proof, see FIPS authorized Yubikeys, such that the phone is pretty much removed from the attestation process. Yes these can still be stolen, but they make hardware keys that are fingerprint authenticated and the biometric stays on the device. Doesn’t get much more self-sovereign than that.

    The existence of a trusted credential provider is a challenge. Fully self-sovereign credentials need to either be trust on first use or validated against a larger system everyone participates in. Even if we had some system of birth certificates tied to a distributed ledger, we would have to trust the third party recording that certificate in the first place, be it a hospital, doctor, or state entity. These trust and proof systems don’t create the trust, they just allow us to extend that trust from one claimant to a verifier. Whether you place that trust in the state, an individual, or an independent third party is up to you.