• 88 Posts
  • 2.15K Comments
Joined 3 years ago
cake
Cake day: June 22nd, 2023

help-circle





  • In the US, the cover (as long as it doesn’t mess up the song too much) is automatically allowed, as long as you pay what is called a compulsory royalty (a certain amount per record sold, or per audience member in case of a live performance). ASCAP and/or the Harry Fox Agency (iirc) act among other things as clearinghouses for these payments. You have to notify them ahead of time of the cover you’re releasing, and maybe pay something up front.

    Normally if you seek permission from the publisher of the song you want to cover, it’s because you want to negotiate a lower royalty than the compulsory one. You can often do that if you can convince them that your record is going to sell a lot of copies. It’s just a discussion about money and business people are used to that.

    If your performance copies from the original but is not a straightforward cover, then you do need permission ahead of time as the compulsory license doesn’t apply, with some limited free-speech exceptions for parodies.

    IANAL bla bla bla.

    https://en.wikipedia.org/wiki/Compulsory_license#United_States





  • solrize@lemmy.mlOPtoflashlight@lemmy.worldCell welder advice?
    link
    fedilink
    English
    arrow-up
    1
    ·
    2 days ago

    Wow I didn’t know about car audio capacitors. What capacitance did you use? What voltage, typically? They are on the expensive side, but impressive. I bet they could also jump start car engines. I’m not keen on using a lead-acid battery so capacitors seem like an ok alternative.









  • I think it’s hard, and even if there is something that works, its use can probably be detected somehow, and that could get your family in trouble.

    Tbh I’d probably use snail mail letters for anything private on the theory that the RU govt doesn’t have the resources to open all the envelopes, and you can use special phrases for particularly private meanings. All that stuff like media attachments is asking for trouble. You could also send microSD cards by snail mail though that might attract attention.

    Remember that Osama bin Laden’s compound in Pakistan had no internet connectivity at all. If he wanted to send an email, he’d write it to a USB drive and have a guy on a motorcycle take it to a café 70 km away or something like that. Replies would be brought to him the same way. They still managed to find him and kill him in his bedroom.

    Today with AI analysis of massive amounts of traffic logs, I’m sure signal ID is far easier than it was in 2011.



  • The 3 diseases:

    The woman had a rare, life-threatening blood disorder, autoimmune haemolytic anaemia (AIHA), whereby rogue immune defences destroy red blood cells. … In addition to AIHA, the woman had two other autoimmune diseases. One, immune thrombocytopenia (ITP), is driven by immune cells destroying platelets, which raises the risk of bleeding. The other, known as antiphospholipid syndrome (APS), has an opposing effect and raises the risk of harmful blood clots. All three diseases were due to wayward B-cells which make infection-fighting antibodies.


  • Hmm ok, but it still sounds kind of sus. One of the insights of the Mixmaster era is that what really matters is the amount of message reordering you can do, and that’s why remailers typically had 24 hours or more of latency. So I’ve never believed in Tor (near real time). Even with a text chat network, more than a few seconds of latency will have a significant usability hit. And also, as mentioned, using the service at all probably makes you into one of the usual suspects.

    The Guardian (newspaper) handles this in an interesting way, for 1-way communication from users to the Guardian itself. They have a news reader app used by millions of subscribers to access news articles and stuff. And if you want to send them a confidential news tip, the app has a feature where you can enter a text message for their editors. The news reading protocol includes some space for this type of message in every transaction, under a layer of encryption so that an eavesdropper can’t see if a message is present. Allowing user to user communication through such a scheme could easily lead to mayhem, but for sending stuff to an identified recipient (the Guardian) that has some establishment cred, it’s clever.