As of May 2023, 65% of the Ukrainian refugees that left Ukraine starting February 2022 and decided to stay in Poland found a job—so, within around a year, as opposed to 5-6 years as in the article. Cultural similarity here is likely making it much, much simpler. For those who want to read more about the situation of Ukrainian refugees in Poland, this report by Polish National Bank (Narodowy Bank Polski, NBP) might be useful: https://nbp.pl/wp-content/uploads/2023/05/Raport_Imigranci_EN.pdf (in English!), there is a lot of interesting details.
lemmy.ml is hosted in EU, and lemmynsfw.com uses CloudFlare, which operates in EU. Worst case, issue a GDPR request to both.
I do not have notes from that time anymore, sorry. I do recall though that after following a chain of citations I ended up at the paper in the center of this controversy. Nobody sane would cite in now except to point out its flaws, but if there’s a modern paper that cites a 10 year old paper that cites a 30 year old paper that cites it—people usually won’t notice.
From my experience, despite all the citogenesis described in other comments here, Wikipedia citations are still better vetted than in many, many scientific papers, let alone regular journalism :/ I recall spending days following citation links in already well-cited papers to basically debunk basic statements in the field.
A lack of planning on your part doesn’t constitute an emergency on mine.
Though I kind of think Japanese grammar cannot express this thought and the closest you can get is Ganbatte!
Good question! I quickly found this table, though this is yearly statistics only: https://www150.statcan.gc.ca/t1/tbl1/en/tv.action?pid=3510019201
Will they keep the dense email list view as an option? Seeing more than the 14 email messages visible on the screenshot in the post is useful to sort out large folders.
I’m surprised federation isn’t based on asymmetric cryptography. Let the public/private keys identify instances, as opposed to domains that risk being blocked by governments or bought by malicious third parties if the instance owner forgets to prolong it.
With that, implementing a change in domain names would be simple.
Mosh is not more secure than SSH: it uses SSH to initiate connections, so this is the upper bound.¹ Mosh’s UDP protocol has not been given the same security attention as SSH’s, though. As such, I’m willing to use it over the open internet for private stuff, but not for business use cases.
¹ I know mosh authors write «In one concrete respect, the Mosh protocol is more secure than SSH’s: SSH relies on unauthenticated TCP to carry the contents of the secure stream.», but this refers to the UDP stream after the connection is initiated. If there is a security hole in SSH, it’s pretty likely the attacker could take advantage of it during the connection initiation process. Mosh authors do acknowledge this in the subsequent paragraph: «However, in typical usage, Mosh relies on SSH to exchange keys at the beginning of a session, so Mosh will inherit the weaknesses of SSH—at least insofar as they affect the brief SSH session that is used to set up a long-running Mosh session.»
Indeed. Most of the web is broken under GDPR’s privacy requirements.
GDPR believes an IP address is a private information. This can be used to mount a legal attack on EU-hosted lemmy instances.
I’m not a person who’d be loyal to a brand. Yet Motorola consistently produces devices that turn out to be the best trade-offs (price to functionality) for me. And, so far, all these devices were pretty durable as well, though it’s not that I really put smartphones into lots of use. That’s all I can say.
So far I’ve been following recommendations from this person: https://old.reddit.com/r/NewMaxx/comments/16xhbi5/ssd_guides_resources_ssd_help_post_your_questions/