[syndicated profile] rwitchesvspatriarchy_feed

Posted by /u/ParticularWindoww

Cleaning a messy room/house can be extremely overwhelming. Not only do I have a comorbidity of AuDHD but I also grew up with a hoarder for a mother. I never really learned cleaning skills from my mom. My ADHD made it hard to put things away. My autism made me get extremely overwhelmed to the point of breakdown.

So when I started therapy for both of these, my therapist came over to my house and taught me how to clean with these tips.

  1. do not put something down unless it is in its spot. Take the extra time to walk away and put it where it’s supposed to go. If you put it down just anywhere, it is a death sentence.
  2. take a lot of breaks. This is called the on/off method. Find a point of completion (you can make your own rules). Take however much time you spent working on that task and use the same amount for your break. Whether it be tv, video games, or even playing with the stuff you found. For example, if you spend 30 minutes on the task, spend 30 minutes off the task. Make sure you have regular and frequent breaks. You need to be stimulated.
  3. categorize your things in an easy way and make that your only task. For example, I always start with dishes. Find all the dishes. Put them in the sink. You do not need to do the dishes right away. You can do them another day. Then I find all the trash I can see and throw it away. Already, your room will start to look cleaner. Next, do clothes. Put them in the hamper. You do not have to do laundry right away. You can do it another day. Then I pick items by color. I usually start with red. I pick up everything that is red and put it away where it is supposed to go. Then orange. Then yellow. Etc.
  4. clean with the supplies you have available. If you are out of glass cleaner, write it down in your notes app but do not go out and get it. You can use it next time when you have it. Leaving the house to get cleaning supplies is a stimulating but avoidant activity. You’ll waste your drive to clean by going to the store.
  5. One “baseline task” per day Make bed, wash 1 dish, read 1 page. (Anchor Activities which i have to do daily no matter what. I use Soothfy App to build these alongside novelty Activities. ) This rebuilt the reward system from the bottom up. None of this fixed everything instantly… but after 10–14 days, I started feeling tiny sparks again. Like my brain was slowly coming back online.
submitted by /u/ParticularWindoww
[link] [comments]
[syndicated profile] efforg_feed

Posted by Mitch Stoltz

People building the future of the social web — interoperable and decentralized — need to protect themselves against copyright liability. Like anyone who creates and operates platforms for user-uploaded content, the hosts of the decentralized social web can take preventive measures to reduce their legal exposure when a user posts material that violates someone’s copyright.

This post gives an overview of the steps to take. It’s meant for operators of Mastodon and other ActivityPub servers, Bluesky hosts, RSS mirrors, and other decentralized social media protocols, and developers of apps for those protocols — but it will apply to other hosts as well. This isn’t legal advice, and can’t substitute for a consultation with a lawyer about your specific circumstances. It focuses on U.S. law — the law may impose different requirements elsewhere. Still, we hope it helps you get started with confidence.

Why should I care? Copyright’s Sword of Damocles

In some circumstances, the operator of a platform that handles user content can be legally responsible for content that infringes copyright. That can happen when the platform operator is directly involved in copying or distributing the copyrighted material, when they promote or knowingly assist the infringement, or when they benefit financially from infringement while being in a position to supervise it. But these judge-made rules are often difficult and uncertain to apply in practice — and the penalties for being found on the wrong side of the law can be severe. Copyright’s “statutory damages” regime allows for massive, unpredictable financial liability. That’s why it’s important to limit your risk.

For Server Operators: Limiting Risk with the DMCA Safe Harbors

If you run a social network server, the safe harbor provisions of the Digital Millennium Copyright Act (DMCA) are an important way to limit your liability risk. The DMCA shields server operators from nearly all forms of copyright liability that can result from “storage at the direction of a user” — in other words, hosting user-uploaded content. But to qualify for this protection, there are steps a server operator has to take.

1. Designate A Contact To Receive Copyright Infringement Notices

First, you’ll need to provide contact information for someone who can receive infringement notices (a “designated agent”). That information needs to be posted in at least two places: on your server in a place visible to users (such as a “DMCA” page or post, or as part of your Terms of Service), and in the U.S. Copyright Office’s “Designated Agent Directory.” To post that information to the directory, you have to create an account at https://www.copyright.gov/dmca-directory/ and pay a small fee. The directory listings expire after three years, and once expired, your safe harbor protection goes away, so it’s important to keep that listing current.

2. Respond Promptly to Notices and Counter-notices

When you receive infringement notices, it’s important to respond to them promptly. Notices are supposed to identify the copyright holder, the copyrighted work they claim was infringed, and the post they claim is infringing. By deleting or disabling access to the posted material, you protect yourself from liability with respect to that material.

The theory behind Section 512 is that hosts don’t have to be in a position of deciding whether a post infringes someone’s copyright — it’s up to the poster, the rights holder, and potentially a court to decide that. A host who takes down posts whenever they receive an infringement notice is well-protected. But it’s equally important to recognize that hosts aren’t required to take down content in response to every notice. Infringement notices are frequently wrong, misguided, or abusive, or simply incomplete. Hosts who want to stand up for their users’ speech can choose to disregard infringement notices that seem suspect. While this risks losing the automatic protection of the safe harbor in each instance, it can still be done safely with careful preparation, ideally using a plan crafted with help from a lawyer. Bear in mind that people sending false notices, including by failing to consider whether a post is a fair use before asking a host to take it down, can be liable for damages under the DMCA.

The DMCA also allows the person who posted the material to send a “counter-notification” asserting that they really did have the right to post and that there’s no copyright infringement. Responding to counter-notifications is a good way for a host to demonstrate that they look out for their users. When a host receives a counter-notification, they should forward it on to the person who sent the original takedown notice and let them know that the post will be restored in 10 business days. Then, after that waiting period has elapsed, the host can restore the posted material. Just like with infringement notices, a host isn’t required to honor a counter-notification that appears to be fraudulent, but there’s no penalty for honoring it anyway.

3. Have A Repeat Infringer Policy

The next requirement is to have a policy of terminating the accounts of “subscribers and account holders” who are “repeat infringers” in “appropriate circumstances,” and to carry out that policy. Yes, that’s a vague requirement. It doesn’t require a “three strikes” policy or any other sports analogy. It just needs to be reasonable. Be sure your policy is spelled out in your website terms or “DMCA” page.

4. Don’t Ignore Known Infringement

Hosts need to take down user posts whenever the host actually knows that the post is infringing. In other words, a host isn’t protected if they ignore takedown notices based on technicalities in the notices, or if they learn about the infringement some other way. But hosts don’t need to actively look for infringement on their servers — only to act when someone notifies them.

5. Don’t Encourage Infringement

Finally, make sure that nothing you post or advertise actively encourages copyright infringement. For example, don’t post examples of users uploading copyrighted music or video without permission, or insinuate that your server is a good place for infringing content.

There are some other technicalities in the DMCA that can affect the safe harbor, which is why it’s always a good idea to consult with a lawyer. But following these steps will help protect you when you run a social media server — or any other kind of user-uploaded content platform.

[syndicated profile] snopes_feed

Posted by Anna Rascouët-Paz

The Wall Street Journal reported aides kept the U.S. President away from the room because they were worried he was too impatient.
[syndicated profile] rwitchesvspatriarchy_feed

Posted by /u/inKev83

6 months of gender bending magic ✨🏳️‍⚧️

I’ve been taking a bit of a social media break lately to protect my peace and focus on my mental health, but I couldn't let this moment pass without sharing.

Today marks 6 months of HRT! 🏳️‍⚧️😊 6 months of living the life I was supposed to have from the very beginning.

Sending love to all my sisters and siblings here! 💖💫

submitted by /u/inKev83
[link] [comments]

Witches, a Historical Mystery, & More

Apr. 21st, 2026 03:30 pm
[syndicated profile] smartbitches_feed

Posted by Amanda

I Got Abducted by Aliens and Now I’m Trapped in a Rom-Com

I Got Abducted by Aliens and Now I’m Trapped in a Rom-Com by Kimberly Lemming is $4.99! This is book one in the Comic Chaos series and came out last February. Book two is due out in August of this year.

A hilarious and sexy romance about a woman who gets dropped on a strange planet only to fall for not one, but two, aliens, from the author of I Got Drunk and Yeeted a Love Potion at a Werewolf.

Dorothy Valentine is close to getting her PhD in wildlife biology when she’s attacked by a lion. On the bright side, she’s saved! On the not-so-bright side, it’s because they’re abducted by aliens. In her scramble to escape, Dory and the lion commandeer an escape pod and crash-land on an alien planet that has…dinosaurs?

Dory and her new lion bestie, Toto, are saved in the nick of time by a mysterious and sexy alien, Sol. On their new adventure, they team up with the equally hot, equally dangerous Lok, who may or may not be a war criminal. Whether it be trauma, fate, or intrigue, Dory can’t resist the attraction that’s developing in their trio….

As this ragtag group of misfits explore their new planet, Dory learns more about how and why they’ve all ended up together, battles more prehistoric creatures than she imagined (she imagined…zero), and questions if she even wants to go back home to Earth in this hilarious and steamy alien romance adventure comedy romp.

Add to Goodreads To-Read List →

You can find ordering info for this book here.

 

 

 

The Once and Future Witches

RECOMMENDED: The Once and Future Witches by Alix E. Harrow is $1.99! Carrie reviewed this one and gave it a B+:

Overall I loved reading this book. I literally gasped and clapped my hands over my mouth periodically, like a silent movie star. It’s so gripping, so beautifully written, and such a powerful homage to women’s voices and the need to unify against a common enemy.

In 1893, there’s no such thing as witches. There used to be, in the wild, dark days before the burnings began, but now witching is nothing but tidy charms and nursery rhymes. If the modern woman wants any measure of power, she must find it at the ballot box.

But when the Eastwood sisters–James Juniper, Agnes Amaranth, and Beatrice Belladonna–join the suffragists of New Salem, they begin to pursue the forgotten words and ways that might turn the women’s movement into the witch’s movement. Stalked by shadows and sickness, hunted by forces who will not suffer a witch to vote-and perhaps not even to live-the sisters will need to delve into the oldest magics, draw new alliances, and heal the bond between them if they want to survive.

There’s no such thing as witches. But there will be.

Add to Goodreads To-Read List →

You can find ordering info for this book here.

 

 

 

Silent in the Grave

RECOMMENDED: Silent in the Grave by Deanna Raybourn is $1.99! This book and series has been mentioned quite a bit on the site. Elyse recommended it if you like historical mysteries. Reader StacieH4 mentioned it for those who prefer their romance light on sex, and Reader Tina Chaney said on a podcast that the book has one of her favorite opening lines. Have you read it?

“Let the wicked be ashamed, and let them be silent in the grave.”

These ominous words, slashed from the pages of a book of Psalms, are the last threat that the darling of London society, Sir Edward Grey, receives from his killer. Before he can show them to Nicholas Brisbane, the private inquiry agent he has retained for his protection, Sir Edward collapses and dies at his London home, in the presence of his wife, Julia, and a roomful of dinner guests.

Prepared to accept that Edward’s death was due to a long-standing physical infirmity, Julia is outraged when Brisbane visits and suggests that Sir Edward has been murdered. It is a reaction she comes to regret when she discovers the damning paper for herself, and realizes the truth.

Determined to bring her husband’s murderer to justice, Julia engages the enigmatic Brisbane to help her investigate Edward’s demise. Dismissing his warnings that the investigation will be difficult, if not impossible, Julia presses forward, following a trail of clues that lead her to even more unpleasant truths, and ever closer to a killer who waits expectantly for her arrival.

Add to Goodreads To-Read List →

You can find ordering info for this book here.

 

 

 

A Fine Scottish Time

A Fine Scottish Time by Maeve Greyson is $2.99 at Amazon! This is time travel romance and it’s the first book in the The Magical Matchmakers of Seven Cairns series.

Time Travel, Tarot, and Fated Love in the Highlands

Jessa Tamson desperately needs a win. Her three-year relationship ended in heartbreak, her dream job evaporated, her car was stolen, and her rent just skyrocketed. She’s about ready to tell the universe exactly where to go—until a strange tarot card dating app starts popping up on her phone. It’s persistent, mysterious, and downright annoying, but when it promises an escape from her current mess of a life, she decides to take a leap of faith—and a flight to Scotland.

Grant MacAlester has no time for love—or meddling witches. It’s been forty years since his clan barely survived the Jacobite uprising in 1746, and between smuggling runs and keeping the peace, he’s got his hands full. The last thing he needs is old Mairwen and her apprentice scheming to marry him off again. His first marriage taught him one women bring trouble.

But when Jessa suddenly lands in Grant’s 18th-century Highlands—quite literally—everything changes. Their meeting isn’t just a coincidence; it’s the work of the immortals of Seven Cairns, who have declared them fated mates. Together, they hold the key to strengthening the Highland Veil, a mystical barrier protecting all creation from chaos.

—Magic, time travel, and destiny can lead to wonderful things—if a person’s brave enough to embrace them.

Add to Goodreads To-Read List →

You can find ordering info for this book here.

 

 

 

[syndicated profile] smartbitches_feed

Posted by Amanda

This HaBO is from Christelle, who wants to find this romance:

I’m looking for the title of a book, the second in a series.

The story takes place in a small town. A military hero returns home with a back injruy. A night in a bar, he meet a beautiful woman named Charlotte but refuses to go home with her.

Later, he meets his nurse Charlie, assumes she’s a man, but her real name is Charlotte and she is the woman from the bar.

He is a grumpy hero and I don’t remember much else…I hope someone can help…

Let’s HaBO!

[syndicated profile] smartbitches_feed

Posted by Amanda

Happy Tuesday!

We’re quickly approaching the end of the month. Can you believe it? Most of the titles on our TBR piles this week have some sort of fantasy element.

Which new releases are you anticipating this week? Let us know in the comments!

The Antiquarian’s Object of Desire

The Antiquarian’s Object of Desire by India Holton

Author: India Holton
Released: April 21, 2026 by Berkley
Genre: , , ,
Series: Love's Academic #3

When two history professors and best friends are forced to fake hate to protect their reputations, chaos ensues, in the next rollicking historical-fantasy rom-com from beloved author India Holton.

Magical-antique experts Amelia Tarrant and Caleb Sterling have been best friends forever, although lately each has begun secretly wishing for more than friendship. But when rumors about their relationship spread, they’re forced to fake being enemies to protect their reputations and keep their jobs.

The resulting arguments spark havoc across Oxford University, and when they cause an explosion while fighting over a magical antique, it’s the final straw for their exasperated faculty head. He dispatches them to a job in Cumbria where even they can’t get into trouble.…

Which proves just how wrong one man can be. In a stormbound old manor house, Amelia and Caleb face magical mayhem and rampaging ghosts that make the previous havoc look mild in comparison. Most troublesome of all, though, is the secret of how they feel about each other. When it comes to tackling deadly antiques, hiding the truth in their hearts could destroy them for real.

New India Holton!

Add to Goodreads To-Read List →

Thistlemarsh

Thistlemarsh by Moorea Corrigan

Author: Moorea Corrigan
Released: April 21, 2026 by Berkley
Genre: , ,

Faeries disappeared over one hundred years ago, as suddenly as slipping through a doorway. It was only the very foolish, or the very determined, who held out hope for their return.

Welcome to Thistlemarsh—a ramshackle estate where an impoverished orphan and a beguiling Faerie collide in an enchanting novel of love, revenge, and ruin.

In the wake of The Great War, the world is a decidedly unmagical place for Mouse Dunne. She once dreamed of becoming a Faerie anthropologist, but with one telegram, her world shattered. At the Battle of the Somme, her cousin’s body disappeared into the mud, and her brother was left with debilitating shell shock. It was time, she knew, to put aside childish dreams.

When Mouse receives news that her uncle has left her the Faerie-blessed Thistlemarsh Hall, a dilapidated manor in the English countryside, she must leave her brother’s side and return to her childhood home to claim her birthright. But there is a catch in her uncle’s If Mouse does not rehabilitate the crumbling house in one month’s time, she will forfeit her inheritance and any hope of caring for her brother.

It quickly becomes clear it’s impossible to repair the manor in the allotted time, until a mysterious Faerie appears with a proposition. He offers to restore Thistlemarsh…for a price. Mouse knows better than to trust a Faerie—especially one so insufferably handsome and arrogant—but she is out of options. There are dark and magical forces at work in the house, and Mouse must confront the ghosts of her past and the secrets of her heart or lose Thistlemarsh, and herself, in the process.

Amanda: The dreaminess of this is getting me.

Lara: I’m incredibly picky about books featuring the fae, but I’m hopeful that this one will scratch that itch.

Read Lara’s review!

Add to Goodreads To-Read List →

Witch Queen Rising

Witch Queen Rising by Savannah Stephens

Author: Savannah Stephens
Released: April 21, 2026 by Ace
Genre:

A reclusive witch who fled the burden of her bloodline rises to be the greatest among them in this lush and haunting fantasy debut.

For New Orleans witchkin, there is no greater honor than to become the Prime—chosen to rule. But the title is meant to pass between two rival Houses of magic, not to the wayward daughter of the former Prime who died under mysterious circumstances.

As a girl, Seraphine Barreau was dubbed the Tick Witch for her ability to feed on magic and make it her own. Even among those who alter fate and manipulate reality, she was a powerful outcast feared and misunderstood by her people. Now dragged back to continue the legacy that nearly destroyed her, Phine has her work cut out for her. She must earn the respect of her people, navigate the politics of the paranormal communities residing in her city, and heal a broken heart, all the while battling a parasitic curse poisoning witchkin. Between her werewolf ex, power-hungry vampires, and the skeletons in her family’s closet, Phine must learn to make peace with her past to save her—and all of witchkin’s—future.

Amanda: Can we get a round of applause for this cover?

Add to Goodreads To-Read List →

Mermaid in Manhattan

Mermaid in Manhattan by Jessica Gadziala

Author: Jessica Gadziala
Released: April 23, 2026 by Avon
Genre: ,

Iris loves being a mermaid. So, when her Mom, Queen of the Ocean, declares that she’s to be wed to a human, she’s furious.

Finn wants to be the first human mayor of magical New York. He needs a magical wife as part of his PR strategy to win over his constituents, and he’s fine with a loveless marriage.

But after his reluctant fiancé Iris douses him with seawater at their first meeting, Finn finds himself wanting this romance to be more than a business arrangement.

Iris can’t stand Finn on principle, but no matter how far she pushes him, Finn just won’t break off their engagement. In fact, he keeps going out of his way to make her life easier. And soon, this mermaid is left wondering if life might be better in Manhattan than under the sea…

Amanda: This sounds silly in a delightful way.

Add to Goodreads To-Read List →

[syndicated profile] hackernewsfp_feed
  1. John Ternus to become Apple CEO
    (2013 points, apple.com, comments)
  2. All phones sold in the EU to have replaceable batteries from 2027
    (1363 points, theolivepress.es, comments)
  3. Qwen3.6-Max-Preview: Smarter, Sharper, Still Evolving
    (655 points, qwen.ai, comments)
  4. ggsql: A Grammar of Graphics for SQL
    (434 points, posit.co, comments)
  5. GitHub's fake star economy
    (783 points, awesomeagents.ai, comments)
  6. Atlassian enables default data collection to train AI
    (582 points, letsdatascience.com, comments)
  7. M 7.4 earthquake – 100 km ENE of Miyako, Japan
    (282 points, usgs.gov, comments)
  8. WebUSB Extension for Firefox
    (251 points, github.com/arcanenibble, comments)
  9. Brussels launched an age checking app. Hackers took 2 minutes to break it
    (267 points, politico.eu, comments)
  10. Turtle WoW classic server announces shutdown after Blizzard wins injunction
    (305 points, pcgamer.com, comments)
  11. Kimi K2.6: Advancing open-source coding
    (673 points, kimi.com, comments)
  12. Sauna effect on heart rate
    (429 points, tryterra.co, comments)
  13. Kimi vendor verifier – verify accuracy of inference providers
    (284 points, kimi.com, comments)
  14. Quantum Computers Are Not a Threat to 128-Bit Symmetric Keys
    (265 points, filippo.io, comments)
  15. Deezer says 44% of songs uploaded to its platform daily are AI-generated
    (352 points, techcrunch.com, comments)
  16. Stop trying to engineer your way out of listening to people
    (417 points, rolfmore.com, comments)
  17. 10 years ago, someone wrote a test for Servo that included an expiry in 2026
    (219 points, mastodon.social, comments)
  18. A Brief History of Fish Sauce
    (231 points, legalnomads.com, comments)
  19. NSA is using Anthropic's Mythos despite blacklist
    (466 points, axios.com, comments)
  20. Modern Rendering Culling Techniques
    (164 points, krupitskas.com, comments)
  21. Jujutsu megamerges for fun and profit
    (246 points, isaaccorbrey.com, comments)
  22. Kefir C17/C23 Compiler
    (164 points, sr.ht, comments)
  23. Claude Token Counter, now with model comparisons
    (220 points, simonwillison.net, comments)
  24. OpenClaw isn't fooling me. I remember MS-DOS
    (296 points, flyingpenguin.com, comments)
  25. Soul Player C64 – A real transformer running on a 1 MHz Commodore 64
    (139 points, github.com/gizmo64k, comments)
  26. Scientific datasets are riddled with copy-paste errors
    (148 points, sciencedetective.org, comments)
  27. Up to 8M Bees Are Living in an Underground Network Beneath This Cemetery
    (174 points, discovermagazine.com, comments)
  28. OpenAI ad partner now selling ChatGPT ad placements based on “prompt relevance”
    (281 points, adweek.com, comments)
  29. F-35 is built for the wrong war
    (275 points, warontherocks.com, comments)
  30. Mechanical Keyboard Sounds – A listening Museum
    (180 points, sheets.works, comments)
  31. At long last, InfoWars is ours
    (598 points, theonion.com, comments)
  32. Show HN: Run TRELLIS.2 Image-to-3D generation natively on Apple Silicon
    (197 points, github.com/shivampkumar, comments)
  33. I Made the "Next-Level" Camera and I love it
    (255 points, thelibre.news, comments)
  34. Monero Community Crowdfunding System
    (136 points, getmonero.org, comments)
  35. SDF Public Access Unix System
    (170 points, sdf.org, comments)
  36. Focused microwaves allow 3D printers to fuse circuits onto almost anything
    (162 points, newatlas.com, comments)
  37. Swiss AI Initiative (2023)
    (88 points, swiss-ai.org, comments)
  38. We accepted surveillance as default
    (315 points, vivianvoss.net, comments)
  39. Zero-copy protobuf and ConnectRPC for Rust
    (124 points, medium.com/iainmcgin, comments)
  40. Not buying another Kindle
    (316 points, androidauthority.com, comments)
  41. Monumental ship burial beneath ancient Norwegian mound predates the Viking Age
    (103 points, phys.org, comments)
  42. AI Resistance: some recent anti-AI stuff that’s worth discussing
    (369 points, stephvee.ca, comments)
  43. Ben Lerner's Big Feelings
    (42 points, vulture.com, comments)
  44. Writing string.h functions using string instructions in asm x86-64 (2025)
    (66 points, pmasschelier.github.io, comments)
  45. A cache-friendly IPv6 LPM with AVX-512 (linearized B+-tree, real BGP benchmarks)
    (62 points, github.com/esutcu, comments)
  46. How Motorola’s 2N2222 and 2N3904 transistors became the default NPNs
    (87 points, allaboutcircuits.com, comments)
  47. IEA: Solar overtakes all energy sources in a major global first
    (164 points, electrek.co, comments)
  48. Stripe's Payment APIs: the first 10 years (2020)
    (95 points, stripe.dev, comments)
  49. Interesting Map Geometry and Mathematics
    (33 points, markrjohnsongames.com, comments)
  50. What if database branching was easy?
    (70 points, xata.io, comments)
  51. The insider trading suspicions looming over Trump's presidency
    (299 points, bbc.com, comments)
  52. Ex-CEO, ex-CFO of iLearningEngines charged with fraud
    (157 points, reuters.com, comments)
  53. Ask HN: How to solve the cold start problem for a two-sided marketplace?
    (137 points, news.ycombinator.com, comments)
  54. Show HN: A working reference implementation of context engineering
    (45 points, github.com/outcomeops, comments)
  55. Show HN: A lightweight way to make agents talk without paying for API usage
    (52 points, juanpabloaj.com, comments)
  56. Knitout and Kniterate 3
    (45 points, agnescameron.info, comments)
  57. IPC medley: message-queue peeking, io_uring, and bus1
    (57 points, lwn.net, comments)
  58. I prompted ChatGPT, Claude, Perplexity, and Gemini and watched my Nginx logs
    (133 points, surfacedby.com, comments)
  59. We got 207 tok/s with Qwen3.5-27B on an RTX 3090
    (164 points, github.com/luce-org, comments)
  60. Figma's woes compound with Claude Design
    (117 points, martinalderson.com, comments)
[syndicated profile] snopes_feed

Posted by Laerke Christensen

The rumor concerned a list of beliefs that the Trump administration claimed could indicate someone was a domestic terrorist.
[syndicated profile] rwitchesvspatriarchy_feed

Posted by /u/Drama-kween27

Holly Humberstone looked magical during Coachella ✨🔮

Holly Humberstone’s set design was genuinely stunning, everything felt so intentional and it matched the mood of her music perfectly.

There was something quite witchy about it too, soft but haunting, like you were being pulled into her world. Does anyone else get where I’m coming from or watched her set?

submitted by /u/Drama-kween27
[link] [comments]
[syndicated profile] snopes_feed

Posted by Jordan Liles

Social media users shared misinformation referencing CNN's genuine investigative reporting about a dark corner of the internet.
[syndicated profile] efforg_feed

Posted by Cindy Cohn, Betty Gedlu

For years, EFF has pushed technology companies to make real human rights commitments—and to live up to them. In response to growing evidence that Palantir’s tools help power abusive immigration enforcement by ICE, we sent the company a detailed letter asking how the promises in its own human rights framework extends to that work.

This post explains what we asked, how Palantir responded, and why we believe those responses fall short. EFF is not alone in raising alarms about Palantir; immigrants' rights groups, human rights organizations, journalists, and former employees have raised similar concerns based on reports of the company's role in abusive immigration enforcement. We focus here on Palantir’s own human rights promises.

At the outset, we appreciate that Palantir was willing to engage respectfully, and we recognize that confidentiality and security obligations can limit what it can say. Nonetheless, measured against Palantir's own human rights commitments, its decision to keep powering ICE with tools used in dragnet raids and discriminatory detentions is indefensible. A good-faith application of those commitments should lead Palantir to end its contract with ICE, and refuse new, or end current, contracts with any other agency whose work predictably violates those commitments.

Palantir’s Public Promises

Palantir has long said it performs comprehensive human rights analysis on its work. It has also worked with ICE for years, apparently in a more limited capacity than today. It has publicly embraced the UN Guiding Principles on Business and Human Rights, the Universal Declaration of Human Rights, and the OECD Guidelines for Multinational Enterprises. Additionally, in its response to EFF, Palantir says its legal responsibilities are only “the floor” for broader risk assessments.

That was the point of our letter. We asked what human rights due diligence Palantir conducted when it first contracted with ICE and DHS; whether it performed the “proactive risk scoping” it advertises, how it reviews work over time, what it has done in response to reports of misuse, and whether it has used “every means at [its] disposal”—including contract provisions, third‑party oversight, and termination—to prevent or mitigate harms.

For the most part, Palantir did not answer our accountability questions. It did correct one point: Palantir says it does not currently work with CBP, and available evidence supports that, though it also made clear it could work with CBP in the future.

Palantir also raised a red herring it often deploys in response to criticism. It denied building a 'mega' or 'master' database for ICE and denied creating a database of protesters, which some ICE agents have claimed to have been built. We call it a red herring because those denials sidestep the central issues: what capabilities Palantir's tools actually provide to ICE.

To be clear, EFF has never claimed that Palantir is building a single centralized database. Our concern is grounded in how Palantir’s tools allow ICE to query and analyze data from multiple databases through a unified interface—which from an agent’s perspective can be a distinction without a difference.

In the sections that follow, we compare Palantir’s account of its work for ICE with evidence about how its tools seem to be used, and explain why legality, internal process, and sustained “engagement with the institutions whose vital tasks exist in tension with certain human rights” are no substitute for real human rights due diligence—because respect for human rights must be measured by outcomes, not just process.

Palantir’s ICE Work Undermines Its Own Standards

Palantir says ICE uses its ELITE tool for “prioritized enforcement”: to surface likely addresses of specific people, such as individuals with final orders of removal or high‑severity criminal charges. But according to sworn testimony in Oregon, ICE agents use ELITE to determine where to conduct deportation sweeps, and the system “pulled from all kinds of sources” to identify locations for raids aimed at mass detentions, including information from the Department of Health and Human Services such as Medicaid data. A leaked ELITE user guide for 'Special Operations' also instructs operators to disable filters to "display all targets within a Special Operations dataset." Those details directly conflict with Palantir’s narrow description of ELITE’s role.

Additionally, Palantir's response leans on legal authority and the Privacy Act. But it does not identify any specific lawful basis for using Medicaid data in this way or explain how its software enables that access. Even if a legal theory exists, turning sensitive medical information into fuel for dragnet sweeps is hard to reconcile with its commitments to privacy, equity, and the rights of impacted communities. Its own human rights framework requires grappling with foreseeable harms its products may enable, not just invoking possible legal authorization.   

Reporting shows that many people detained by ICE had no criminal record, much less a serious one, and in many cases no final order of removal. An overwhelming percentage of those detained were, or appeared to be, from Central and South America, and nearly one in five ICE arrests were street arrests of a Latine person with neither a criminal history nor a removal order.

These facts raise obvious questions about discriminatory impact, racial profiling, and whether Palantir's tools are facilitating detention practices far broader than the company claims. Palantir's response does not meaningfully engage those questions, despite the company's commitments to non-discrimination and due process.

EFF’s letter asked Palantir to explain how it is honoring its commitments to civil liberties in light of reports linking Palantir-owned systems to facial recognition and other tools used to identify and target people engaged in observing and recording law enforcement, including in connection with the deaths of Renée Good and Alex Pretti. The letter also cites an incident in which an officer scanned protesters’ and observers’ faces and threatened to add their biometrics to a “nice little database.” Palantir’s response denies involvement in any such database.

A narrow denial about a single database does not answer the broader question: if ICE, its customer, claims it has this capability, what has Palantir done to ensure its tools are not used to chill protected speech, retaliate against observers, or facilitate targeting of people engaged in First Amendment‑protected activity? For a company that claims to value democracy and civil liberties, this is not a marginal issue; it goes to the heart of its human rights commitments.

Legality, Process, and Engagement with ICE Are Not Human Rights Standards

As mentioned above, Palantir leans heavily on legal compliance. It says government data sharing is “subject to, and governed by, data sharing agreements and government oversight” and that any sharing it facilitates is done according to “legal and technical requirements, including those of the Privacy Act of 1974.” It describes its role in ELITE as “data integration,” enabling ICE “to incorporate data sources to which it has access,” including data shared under inter‑agency agreements.

EFF is very familiar with the Privacy Act—we are suing the Office of Personnel Management over it currently. But Palantir’s response does not clarify how ICE legally has access to this information, how Palantir ensures that it follows those legal processes, or how Palantir’s software may have enabled access in the first place. More critically, that is still a legal answer to a human rights question, and legal compliance alone is insufficient as a human rights standard.

Human rights due diligence requires assessing foreseeable harms, responding to credible evidence of abuse, and changing course when the facts demand it—something Palantir, on paper, recognizes. That’s why it stresses that its legal responsibilities are only “the floor for [its] broader risk assessments,” pointing to the way it built toward GDPR‑style data protection principles and incorporated international humanitarian law principles before those requirements were formalized. If those commitments mean anything, Palantir has to explain how specific practices—like enabling ICE to use Medicaid data in dragnet raids—square with that broader standard.

Palantir also leans heavily on process. It points to a “layered approach” to risk, frameworks that purportedly examine multiple dimensions of privacy and equity, and “indelible” audit logs that track how its tools are used. Audit logs are not sufficient for protecting human rights. There is a long history of authoritarian regimes keeping extensive logs of their human rights abuses. Those structures can be useful for protecting human rights, but only if they are used to detect harm, trigger reassessment, and lead to changes in design, access, support, or contract enforcement when credible reports of abuse emerge.

That is why we pressed Palantir to spell out clearly what reports of misuse Palantir has received, what changes it made, and on what timeline. Again, instead of offering specific examples, Palantir points back to its internal framework and its willingness to “move towards the hardest problems” as evidence of effective efforts. But human rights are an outcome, not just a process.

Human rights due diligence is not a one-time approval at contract signing; under the UN Guiding Principles, it is supposed to be continuous, with new facts triggering reassessment. Complaints, media reports, leaks, litigation, and sworn testimony are exactly the kinds of events that should prompt review. If Palantir has an account for that work— how often it reviews ICE contracts, who conducts the reviews, what triggers them, and how findings reach the Board— it had every opportunity to describe it. Instead, it offered a generic assurance that it remains committed to human rights without engaging in the specifics. Confidentiality may sometimes limit disclosure, but it is no substitute for accountability.

What Needs to Happen Next 

Palantir wants credit for “mov[ing] towards the hardest problems” and engaging with institutions whose missions it says are “in tension with certain human rights” while having a human rights framework. But when the record includes violent raids, dragnet detentions, use of sensitive medical data, discriminatory targeting, retaliation against observers, and deaths tied to immigration enforcement operations, pointing to a values page is not enough; it has to reckon with the results.

Voluntary corporate human rights policies often function as weak accountability mechanisms: companies can tout principles, publish policies, and answer criticism with polished statements while changing very little on the ground. Palantir’s response fits that pattern all too well. EFF will continue to challenge its role in abusive immigration enforcement and demanding more accountability for technology vendors whose tools enable human rights violations. We are also happy to continue a dialogue with Palantir to that end. For now, this much is clear: Palantir needs to reconsider its contract with ICE and with all agencies whose work predictably violate human rights.

[syndicated profile] rwitchesvspatriarchy_feed

Posted by /u/swells61

It’s been nearly a year on HRT but I am finally starting to see her in mirror

Just wanted to share some unexpected joy that happened tonight. Been dysphoric and stressed the past couple weeks but even if it was for a moment I saw who I always wanted to be in the mirror tonight and that meant the world to me.

submitted by /u/swells61
[link] [comments]
[syndicated profile] hackernewsfp_feed
  1. Vercel April 2026 security incident
    (802 points, bleepingcomputer.com, comments)
  2. College instructor turns to typewriters to curb AI-written work
    (477 points, sentinelcolorado.com, comments)
  3. Archive of BYTE magazine, starting with issue #1 in 1975
    (580 points, archive.org, comments)
  4. What are skiplists good for?
    (281 points, antithesis.com, comments)
  5. SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit [pdf] (2017)
    (183 points, usenix.org, comments)
  6. Changes in the system prompt between Claude Opus 4.6 and 4.7
    (342 points, simonwillison.net, comments)
  7. Game devs explain the tricks involved with letting you pause a game
    (431 points, kotaku.com, comments)
  8. The seven programming ur-languages (2022)
    (334 points, madhadron.com, comments)
  9. The RAM shortage could last years
    (325 points, theverge.com, comments)
  10. The Bromine Chokepoint
    (209 points, warontherocks.com, comments)
  11. Nanopass Framework: Clean Compiler Creation Language
    (137 points, nanopass.org, comments)
  12. Modern Common Lisp with FSet
    (182 points, common-lisp.dev, comments)
  13. Notion leaks email addresses of all editors of any public page
    (382 points, twitter.com/weezerosint, comments)
  14. The world in which IPv6 was a good design (2017)
    (225 points, apenwarr.ca, comments)
  15. Updating Gun Rocket through 10 years of Unity Engine
    (110 points, jackpritz.com, comments)
  16. Show HN: Prompt-to-Excalidraw demo with Gemma 4 E2B in the browser (3.1GB)
    (140 points, teamchong.github.io, comments)
  17. Zero-Copy GPU Inference from WebAssembly on Apple Silicon
    (114 points, abacusnoir.com, comments)
  18. 2,100 Swiss municipalities showing which provider handles their official email
    (214 points, mxmap.ch, comments)
  19. Six Levels of Dark Mode (2024)
    (101 points, cssence.com, comments)
  20. NASA Shuts Off Instrument on Voyager 1 to Keep Spacecraft Operating
    (229 points, nasa.gov, comments)
  21. I wrote a CHIP-8 emulator in my own programming language
    (76 points, github.com/navid-m, comments)
  22. Show HN: Faceoff – A terminal UI for following NHL games
    (119 points, vincentgregoire.com, comments)
  23. Show HN: Shader Lab, like Photoshop but for shaders
    (150 points, basement.studio, comments)
  24. Ask HN: How did you land your first projects as a solo engineer/consultant?
    (271 points, news.ycombinator.com, comments)
  25. Vercel says internal systems hit in breach
    (377 points, decipher.sc, comments)
  26. Prove you are a robot: CAPTCHAs for agents
    (103 points, browser-use.com, comments)
  27. It's cool to care (2025)
    (109 points, alexwlchan.net, comments)
  28. My first impressions on ROCm and Strix Halo
    (56 points, marcoinacio.com, comments)
  29. Spiral staircase with a single guardrail once led to the top of the Eiffel Tower
    (50 points, smithsonianmag.com, comments)
  30. Keep Pushing: We Get 10 More Days to Reform Section 702
    (182 points, eff.org, comments)
  31. Metatextual Literacy
    (54 points, jenn.site, comments)
  32. The creative software industry has declared war on Adobe
    (231 points, theverge.com, comments)
  33. Bypassing the kernel for 56ns cross-language IPC
    (79 points, github.com/riyaneel, comments)
  34. Binary GCD
    (88 points, algorithmica.org, comments)
  35. Airline worker arrested after sharing photos of bomb damage in WhatsApp group
    (277 points, lbc.co.uk, comments)
  36. Binary Dependencies: Identifying the Hidden Packages We All Depend On
    (51 points, vlad.website, comments)
  37. I dug into the Postgres sources to write my own WAL receiver
    (51 points, medium.com/mailbox.sq7, comments)
  38. Reading Input from an USB RFID Card Reader
    (40 points, kevwe.com, comments)
  39. Reverse Engineering ME2's USB with a Heat Gun and a Knife
    (65 points, github.com/coremaze, comments)
  40. Swiss authorities want to reduce dependency on Microsoft
    (224 points, swissinfo.ch, comments)
  41. SI Units for Request Rate (2024)
    (85 points, entropicthoughts.com, comments)
  42. When moving fast, talking is the first thing to break
    (113 points, daverupert.com, comments)
  43. Notes from the SF peptide scene
    (133 points, 12gramsofcarbon.com, comments)
  44. KTaO3-Based Supercurrent Diode
    (31 points, acs.org, comments)
  45. A. J. Ayer – ‘What I Saw When I Was Dead’ (1988)
    (86 points, philosopher.eu, comments)
  46. Minimal Viable Programs (2014)
    (46 points, joearms.github.io, comments)
  47. Blue Origin's rocket reuse achievement marred by upper stage failure
    (74 points, arstechnica.com, comments)
  48. Matt Mullenweg Overrules Core Committers; Puts Akismet on WP 7's Connector List
    (57 points, therepository.email, comments)
  49. I learned Unity the wrong way
    (94 points, darkounity.com, comments)
  50. Hot-wiring the Lisp machine
    (42 points, scheatkode.com, comments)
  51. Eliza a Play by Tom Holloway
    (22 points, mtc.com.au, comments)
  52. Pairwise Order of a Sequence of Elements
    (25 points, morwenn.github.io, comments)
  53. Why Zip drives dominated the 90s, then vanished almost overnight
    (72 points, xda-developers.com, comments)
  54. Russia's doping program is run by the same FSB team that poisoned Navalny
    (96 points, theins.press, comments)
  55. C++26: Reflection, Memory Safety, Contracts, and a New Async Model
    (37 points, infoq.com, comments)
  56. CEOs admit AI had no impact on employment or productivity
    (85 points, fortune.com, comments)
  57. PM Carney declares U.S. ties now a 'weakness' in address to Canadians
    (134 points, ctvnews.ca, comments)
  58. Banned by Anthropic?
    (99 points, bannedbyanthropic.com, comments)
  59. 3D-Printing a Trombone
    (25 points, unnamed.website, comments)
  60. Bipartisan Bill to Tighten Controls on Sensitive Chipmaking Equipment
    (26 points, house.gov, comments)
librarymonster: "Library Monster.io" in old movie monster font. There's a comic book-style fem face with glasses & underbite fangs. (Default)
Linnea the Library Monster Blog

Page Summary