lunatique

joined 1 week ago
[–] lunatique@lemmy.ml 0 points 44 minutes ago

Who cares about your hypotheticals. We are talking about teenagers who smoke, drink, fight. They aren't 4 and 7. You all surely can comprehend this

[–] lunatique@lemmy.ml 7 points 2 hours ago (2 children)

It's not a big deal. The only people complain are social justice warriors. If you were 22 and they were 25 no one would care. It's 3 years. People are brainwashed to get triggered over it. Lol it's not even their business

[–] lunatique@lemmy.ml 5 points 2 hours ago

She probably has mixed feelings and still has some bond with you but is trying to make herself not want to talk to you since you too have two different dating goals

[–] lunatique@lemmy.ml 2 points 2 hours ago

The fuck is that?

[–] lunatique@lemmy.ml 1 points 4 hours ago

No it doesn't. You must elhave enabled it

[–] lunatique@lemmy.ml 1 points 7 hours ago (1 children)

What about under a technocracy? Sounds horrible

[–] lunatique@lemmy.ml 1 points 7 hours ago

A grind from a pepper grinder, but use as much as you desire or as little

[–] lunatique@lemmy.ml 2 points 7 hours ago (1 children)

Yeah telegram isn't the best. They need encryption by default in private group chats and personal one on ones even without secret chat activated But the point is people need to stop the government censorship. Only if their were people who weren't slaves that could demand and force the government to stop egregious practices, instead of trying to be smartasses online

[–] lunatique@lemmy.ml 2 points 8 hours ago

Yeah she was badass

[–] lunatique@lemmy.ml 2 points 8 hours ago (1 children)

I like her character and I've only had the chance to watch gameplay videos online.

[–] lunatique@lemmy.ml 3 points 19 hours ago

I didn't make it myself. I've done so before but I didn't have a direct picture so I used a reference. The community doesn't say you have to make it yourself so I posted. I just wanted people to know how tasty it is/was

 

Mine is Joanna Dark (Perfect Dark N64)

 
  • 1 medium yellow onion, cut into small dice - 2 ribs celery, thinly sliced
  • 1 red bell pepper, seeded and diced
  • 2 tablespoons olive oil
  • 1 teaspoon salt plus a big pinch
  • 8 cloves garlic, minced
  • 2 tablespoon nutritional yeast flakes
  • 1 teaspoon dried thyme
  • 1 teaspoon dried oregano
  • 1/4 teaspoon red pepper flakes
  • Several grinds freshly cracked black pepper
  • 4 cups vegetable broth
  • 3/4 cup dried brown or green lentils
  • 1 (28-ounce) can fire-roasted diced tomato
  • 1/2 cup tomato paste
  • 1/2 cup pitted black olives, sliced in half
  • 8 ounces kale, chopped
  • 8 ounces lasagna noodles
  • 1/2 cup loosely packed fresh basil leaves (you’ll be using more for garnish)

For the toppings

  • Vegan riccota
  • 1 cup sliced black olives
  • Red pepper flakes
  • 1/2 cup loosely packed fresh basil leaves
70
submitted 21 hours ago* (last edited 20 hours ago) by lunatique@lemmy.ml to c/foodporn@lemmy.world
 

Sweet potato (Yam) Cherry tomatoes Black beans Avocado Cilantro Maize Onion

 

Figured this could be extra motivation for anyone who is just degoogling themselves

 

Sharing for anyone else that think superconductors are interesting

39
submitted 1 day ago* (last edited 1 day ago) by lunatique@lemmy.ml to c/foss@beehaw.org
 

AVAIL4: Linux, Windows, Mac

Features

• Written in memory-safe Rust - almost 100% unsafe code free

• Amazingly fast - due to using more or less advanced algorithms and multithreading

• Free, Open Source without ads

• Multiplatform - works on Linux, Windows, macOS, FreeBSD and many more

• Cache support - second and further scans should be much faster than the first one

• CLI frontend - for easy automation

• GUI frontend - uses GTK 4 or Slint frameworks

• No spying - Czkawka does not have access to the Internet, nor does it collect any user information or statistics

• Multilingual - support multiple languages like Polish, English or Italian

• Multiple tools to use:

• Duplicates - Finds duplicates based on file name, size or hash

• Empty Folders - Finds empty folders with the help of an advanced algorithm

• Big Files - Finds the provided number of the biggest files in given location

• Empty Files - Looks for empty files across the drive

• Temporary Files - Finds temporary files

• Similar Images - Finds images which are not exactly the same (different resolution, watermarks)

• Similar Videos - Looks for visually similar videos

• Same Music - Searches for similar music by tags or by reading content and comparing it

• Invalid Symbolic Links - Shows symbolic links which point to non-existent files/directories

• Broken Files - Finds files that are invalid or corrupted

• Bad Extensions - Lists files whose content not match with their extension

 

I'm turning 41, but I don't feel like celebrating.

Our generation is running out of time to save the free Internet built for us by our fathers.

What was once the promise of the free exchange of information is being turned into the ultimate tool of control.

Once-free countries are introducing dystopian measures such as digital IDs (UK), online age checks (Australia), and mass scanning of private messages (EU).

Germany is persecuting anyone who dares to criticize officials on the Internet. The UK is imprisoning thousands for their tweets. France is criminally investigating tech leaders who defend freedom and privacy.

A dark, dystopian world is approaching fast - while we're asleep. Our generation risks going down in history as the last one that had freedoms -and allowed them to be taken away.

We've been fed a lie.

We've been made to believe that the greatest fight of our generation is to destroy everything our forefathers left us: tradition, privacy, sovereignty, the free market, and free speech.

By betraying the legacy of our ancestors, we've set ourselves on a path toward self-destruction - moral, intellectual, economic, and ultimately biological.

So no, I'm not going to celebrate today. I'm running out of time. We are running out of time.

 

My short response. Yes.

18
submitted 2 days ago* (last edited 2 days ago) by lunatique@lemmy.ml to c/asklemmy@lemmy.ml
 

Prevalence of Any Mental Illness (AMI)

Figure 1 shows the past year prevalence of AMI among U.S. adults.
    In 2022, there were an estimated 59.3 million adults aged 18 or older in the United States with AMI. This number represented 23.1% of all U.S. adults.
    The observed prevalence of AMI was higher among females (26.4%) than males (19.7%).
    Young adults aged 18-25 years had the highest prevalence of AMI (36.2%) compared to adults aged 26-49 years (29.4%) and aged 50 and older (13.9%).
    The prevalence of AMI was highest among the adults reporting two or more races (35.2%), followed by White adults (24.6%). The prevalence of AMI was lowest among Asian adults (16.8%).
 

I've been using this launcher for a few months now and it is good if you want to focus only on the use of the phone not the overuse. Text only no icons but has a compable gesture systems and simple but useful functionality.

Definitely not for everyone but some may find it perfect

 

Nowadays, a majority of apps require you to sign up with your email or even worse your phone number. If you have a phone number attached to your name, meaning you went to a cell service/phone provider, and you gave them your ID, then no matter what app you use, no matter how private it says it is, it is not private. There is NO exception to this. Your identity is instantly tied to that account.

Signal is not private. I recommend Simplex or another peer to peer onion messaging app. They don't require email or phone number. So as long as you protect your IP you are anonymous

 

In order to protect your privacy even more efficiently, you need to do something very simple whenever using an online service or a software. Something that most people fail to do is reading the terms of service, also known as a TOS, from companies or developers' software. This usually will tell you straight up whether they're spying on you, selling your data, or using it to sell ads. This will solve a lot of problems with people not realizing that some software is actually the opposite of privacy, but they keep using it thinking it enhances their privacy.

view more: next ›