• 4 Posts
  • 84 Comments
Joined 2 months ago
cake
Cake day: January 29th, 2026

help-circle




  • I haven’t got the stomach to watch the whole thing, but in the bits of it I’ve watched, he seems so much more alert, so much more present, so much, dare I say, smarter, than he’s been when speaking publicly recently. He makes jokes, he’s funny, he smiles. He completes some sentences. He doesn’t seem like the tongue-tied partially-senile Fox-News-grandpa he is when he talks to the public or the press.

    He quips that somehow he’s a “king” but he can’t get his ballroom approved. He’s a piece of shit, he behaves like he’s here to destroy America as we know it, but that’s a legitimate by-God joke. I’ve never seen him make an actual joke before.

    Am I imagining that? I don’t know what to make of it. Is the “flailing senile dumbass” just a character he’s playing? Is it a ruse? So many people who have had face time with him say he’s genuinely a moron.







  • I don’t see a definition in the bill. I don’t know if there’s a standard legal definition for that or not.

    Even a good-faith interpretation of “performer” could leave some gray areas, I’d think. A song-and-dance number for an audience gathered for the purpose is a performance with a performer, sure. What about an appearance on a talk show, an interview, a forum discussion, a podcast?

    Unfortunately, “performance” is a bit of jargon for a specific, unrelated concept in contract law.

    The reservations your question suggests are very reasonable. I don’t intend to dampen anyone’s alarm at this absurd effort to implement legal, systemic bullying over nothing. I just so happened to be reading about the Ohio bill shortly before I came across FreshParsnip’s comment.










  • I’m probably an idiot. Tell me I’m all wrong about this.

    The danger is that quantum computers could factor large products well enough to reverse public keys, finding the associated private keys. Which would indeed be very bad. But this isn’t quite a magic key that opens everything.

    Public key crypto is used to set up a secure network connection, but it’s not used to encrypt the data that flows on that connection. Quantum snooping would require an eavesdropper to intercept every bit on a connection, from initiation onward. And decrypting it would probably not be a real-time affair.

    Public key crypto is also not used to protect your typical encrypted zip file or file system volume. Your Bitlocker and Veracrypt secrets aren’t about to fall to quantum spies.

    I’m bothered that so many popular articles about this issue draw no distinction between the classes of cryptography that are vulnerable and those that are not.