My username is a wordplay on the Linux command filesystem check: fsck.

  • 1 Post
  • 133 Comments
Joined 9 months ago
cake
Cake day: February 24th, 2024

help-circle











  • I’m not sure why you see it as a single incident. It was a series of choices—actions—that outline his overall behavior. I don’t see how a person who shows no empathy towards others, particularly from a position of ‘power’ over them, then refuses to acknowledge their poor behavior should get any empathy themselves.

    It has always been a very easy option, if he wanted, to ameliorate the situation himself. Instead he chose to stick to his choices multiple times.

    You’re not wrong that it could be considered taking the high road to never bring it up. However, too often do people abuse that expectation to avoid consequences and just continue their behaviors. Without acknowledging their own actions there is no evidence that this is just not their own standard of behavior.



  • go $fsck yourself@lemmy.worldtolinuxmemes@lemmy.worldBased
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    2
    ·
    edit-2
    4 days ago

    Very succinct and includes 99% of the situation. Thanks, and well done.

    Only things I would add would be: Being a moderator on lemmy and not knowing that modlogs are public is baffling. That alone really outlines the fact he was unqualified for the role.

    And that it seems pretty obvious the comments were only deleted by him to hide his own. He had already shown an inability to be measured and collected, as well as a poor understanding of the platform from a moderation perspective. Then, his clear disregard for the only rule for the community by lashing out at something that could have been more easily dismissed entirely. He should have just deleted the comment without a response. My mildly stupid comment just did not deserve that kind of reaction.

    It all serves as solid evidence that he was willing to abuse his mod role for something so minor, and a person like that wouldn’t stop there.

    The real cherry on top is how pathetic it is to go to mastodon to complain about the public mod logs on lemmy.




  • Since you’re going to childishly talk about me and infer something that is entirely false, I’m going to step in here.

    First, you claim it’s “a convenient shorthand”, except “middleman” is far shorter than “man-in-the-middle”. So that argument is entirely false.

    Next, “nothing that I wrote misrepresents the situation”? You literally linked the Wikipedia article for “Man in the middle attack”, but conveniently left out the word “attack” both when referring to it and in the link itself which redirected to the actual Wiki page https://en.wikipedia.org/wiki/Man-in-the-middle_attack.

    You are clearly intentionally misrepresenting the subject in order to frame things to suit your narrative. That’s not just a claim out of nowhere, I provided evidence to support this.

    And get out of here with your pathetic “like most of my colleagues” pretentious attitude.




  • You’re conflating MitM, which is specifically defined as an attack, with the concept of a middleman. You acknowledge that it’s not an attack, even:

    It just means it’s not a man-in-the-middle attack.

    The other things you’re describing are also framed specifically in a way that makes Cloudflare seem like some sort of bad actor out of the norm.

    You say users have no choice in using Cloudflare. Yeah, the party that runs the service/website/whatever decides what services they use to serve their content. Nothing special there. If you are against Amazon then users have no choice but to use them when the other side chooses to use their services, or any other service provider which includes the ones you like. Similarly, users would have to resolve DNS records to determine what services they are connecting to.

    You also don’t have to use Cloudflare’s proxy. You can just use them for DNS record management. You can use different SSL settings that allow an unencrypted connection between Cloudflare and the server, or you can enforce strict SSL policies where it is encrypted end-to-end.

    You’re going to have to prove any of your claims, or else I am just going to assume you’re talking out of your ass. Particularly because you’re clearly misunderstanding what a MitM is, or you’re intentionally misusing it.

    -edited formatting-