this post was submitted on 09 Oct 2023
1144 points (90.2% liked)

Memes

44949 readers
2315 users here now

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

founded 5 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 36 points 10 months ago (20 children)

Where is a good place to start to learn about this conflict. I have no idea who is in the right here.

[–] [email protected] 31 points 10 months ago (2 children)

I understand and appreciate you trying to learn. I think one of the issues why nobody can really point you to a good resource is that there are no 100% neutral resources that document "the conflict". Even just where/when you start something like a timeline can be biased.

Keeping all that in mind I have found a video that gives a short simplified summary of the base history.

https://youtu.be/1wo2TLlMhiw?si=_ANEgker8DzQZQxR

I liked it (might be part of my bias since I like crash course). But I'm sure there are mistakes in there and as above some details/framing might just be due to biases of the author's/presenters etc.

[–] [email protected] 10 points 10 months ago* (last edited 10 months ago) (1 children)

Yeah definitely a problem finding truly unbiased information. I'm paranoid my whole world view is shaped by western rule even though there is more free speech here than anywhere else.. or is that idea also propaganda lol

I will give that a watch when I have some time later thank you.

[–] [email protected] 3 points 10 months ago

Tbh this gets you down a very weird rabbit hole, especially if you're in tech. When you start to look at cybersecurity and the direction it's heading, a lot of cutting edge stuff uses a zero trust framework. cybersecurity as a field has realized that information and data is so ubiquitous at this point that it cannot be trusted at all and has to be authenticated and checked at every step. That's real defense in depth there; making sure that every level independently audits the information it uses within the context it needs.

But speaking as someone studying cybersecurity and is getting entrenched in the field & community, once you learn how much you can trust trust you really get a baseline level of paranoia. And to be honest, in my opinion the only thing to do is embrace it. It's difficult and you'll probably want to fuck off and become Amish, but once you see information as just information to be used, consumed, manipulated, and shared as needed the possibilities really open up. The future is only going to be more information and data dependent. Being able to intuitively tap into that is like a super power.

[–] [email protected] 7 points 10 months ago

Here is an alternative Piped link(s):

https://piped.video/1wo2TLlMhiw?si=_ANEgker8DzQZQxR

Piped is a privacy-respecting open-source alternative frontend to YouTube.

I'm open-source; check me out at GitHub.

load more comments (17 replies)