![](https://media.fedi196.gay/4d/06/4d064ecbb4c8ba898afdf086183f3104e99c6dee28169c20160e9b1b6f2a52c4.jpg)
![](https://beehaw.org/pictrs/image/c0e83ceb-b7e5-41b4-9b76-bfd152dd8d00.png)
it’s because they aren’t talking about users, it’s shareholders. shareholders don’t stand to gain near as much ad revenue from the endless algorithm induced scrolling. executives and shareholders hate chronological feeds, not people
Certified thrall
I’m ivy and I’m the admin of fedi196.gay
I’m also @ivy
She/They
cottagecore Sapphic trans demigirl
some flavor of bi idk
I’m the opposite of a high functioning individual. a low functioning person? non functioning? idk that’s too much work to figure out
currently in university for computer science
rust has quickly become my favorite language
hrt 29 Dec 2022
it’s because they aren’t talking about users, it’s shareholders. shareholders don’t stand to gain near as much ad revenue from the endless algorithm induced scrolling. executives and shareholders hate chronological feeds, not people
I’m on glitch soc instead of mastodon and I’ve liked it a lot
it pretty much fixes most of my biggest gripes with mastodon and I hide the counters anyway because the number isn’t very important to me
it’s just because the mod tools aren’t where they need to be yet and beehaw does a lot of work to protect minorities. the mods weren’t really happy with having to defederate and they plan on refederating once the tools are better or we get settled in
it’s almost as if op was hiding something
no no that can’t be it
“it’s a biological fact” mfs when I exist (I’m intersex)
it’s almost as if they require proof and analysis to back a claim in universities lol
i use kbin because I don’t like lemmy’s devs 🙃
bonus points that it actually deletes things
Obsidian is hella based
I’m using porkbun for my instance and it’s been great
my domain renewal was half google domain’s offering price
this makes more sense if you understand public and private keys
when encrypting a message, there are two keys. the public key can only be used to encrypt and the private key to decrypt. a recipient will put its public key out and a peer wishing to send it a message will use this key to encrypt it. once the message arrives, the recipient can use their private key to then decrypt the message
peer to peer means that the information goes from one “peer” (device) to the other, no middleman
end to end encrypted means that the message is encrypted before transit and is then decrypted at the other “end” once it’s on the recipient’s device. end to end could have a server acting as a middleman, storing these encrypted messages, allowing for chat logs to be stored more conveniently and messages to be sent while one peer is offline.
average intel pc