---
blogpost: true
date: 10.6.2024
author: Tobias
location: Stuttgart
category: links, 2024
tags: links, 2024
language: Deutsch
---

# Links für 2024 KW 23

Zusammengefasst von
[LlongOrca](https://huggingface.co/TheBloke/LlongOrca-13B-16K-GGUF).

------------------------------------------------------------------------

**[HN-text](https://github.com/piqoni/hn-text)**:

The article discusses HN-text, a fast, easy-to-use, and distraction-free
Hacker News terminal client. It focuses on easy navigation,
distraction-free reading, and fast loading times. The client supports
navigation through the HN Frontpage, Comments Page, and Article\'s Text.
Installation methods include using Homebrew, downloading binaries, or
installing through GO.

------------------------------------------------------------------------

**[Psychological tricks rich people use to look generous (without
actually spending more money)](https://billmei.net/blog/shopping)**:

This blog post discusses the concept of narrative value in shopping and
how it can be used to show off personality traits without overspending.
It suggests various ways to spend money more consciously by borrowing
items, repairing them, improving existing ones, getting them secondhand
or not buying them at all. The article emphasizes that people value the
effort and love behind the gifts and decisions rather than the objects
themselves. Ultimately, it promotes a focus on genuine connections with
friends and family instead of material possessions.

------------------------------------------------------------------------

**[The Intellectual Obesity
Crisis](https://www.gurwinder.blog/p/the-intellectual-obesity-crisis)**:

The article discusses how an overabundance of information in the digital
age has led to an epidemic of intellectual obesity, or \"junk info.\"
This junk info, which is low-quality and often false but not harmful
just because it\'s false, fills people\'s minds with useless information
that distracts from more meaningful content. It compares this issue to
overeating sugar in the past; our bodies evolved to crave sweet things
for energy, but when they became abundant, they became detrimental. The
author suggests developing meta-awareness and rearranging lifestyles to
limit exposure to junk info and improve one\'s information diet.

------------------------------------------------------------------------

**[Twitch removes every member of its Safety Advisory
Council](https://www.engadget.com/twitch-removes-every-member-of-its-safety-advisory-council-131501219.html)**:

Twitch has terminated its Safety Advisory Council, which was formed in
2020 to help draft new policies and develop products that improve
safety. The council included experts such as Dr. Sameer Hinduja and Dr.
T.L. Taylor. In a meeting on May 6th, Twitch informed the nine members
that their contracts would end on May 31st, and they would not be
getting paid for the second half of 2024. The streaming website plans to
replace them with individuals who serve as \"Twitch Ambassadors,\" who
are said to positively contribute to the Twitch community. The reason
behind this change remains unclear, but it could potentially be a
cost-cutting measure since the terminated members were paid between
\$10,000 and \$20,000 per year.

------------------------------------------------------------------------

**[The Weird Nerd comes with
trade-offs](https://www.writingruxandrabio.com/p/the-weird-nerd-comes-with-trade-offs)**:

The article discusses the backlash faced by Katalin Karikó, co-inventor
of the mRNA technology used in COVID-19 vaccines and 2023 Nobel Prize
winner. Her comments about academia requiring political games and people
pleasing led to anger among some individuals. The author argues that
many \"Weird Nerds\" are being driven out of academia due to a
preference for the \"Failed Corporatist phenotype.\" They believe that
institutions should be more explicit in supporting these unique
individuals, as they can contribute greatly to creative intellectual
endeavors. The article also discusses the challenges faced by Karikó
during her career and how the academic world might be selecting against
people like her.

------------------------------------------------------------------------

**[\[ANNOUNCEMENT\] Response Regarding Google PlayStore App Updates ·
termux/termux-app · Discussion
#4000](https://github.com/termux/termux-app/discussions/4000)**:

The article discusses the release of termux-app v0.120 on Google
PlayStore by \@fornwall for Android \>= 11 devices. This release differs
from the termux/termux-app master branch on GitHub and is an
unofficial/forked release source. The article also highlights that users
should install Termux only from F-Droid and GitHub, as the PlayStore
releases are deprecated. Additionally, the article mentions that there
are still issues related to system_linker_exec solution and the solution
may violate PlayStore policies, so users should install the PlayStore
release at their own risk.

------------------------------------------------------------------------

**[William Ha Law \| Remember When You Named Your 20 Year Old Girlfriend
As a Beneficiary? He Didn\'t
Either.](https://www.williamhalaw.com/post/8/)**:

The Wall Street Journal reported on a case where Margaret Sjostedt might
inherit her ex-boyfriend Jeffrey Rolison\'s \$1 million retirement
account from 1987. Rolison listed Sjostestdt as the sole beneficiary but
never updated it before his death in 2015, leading to a dispute between
Rolison\'s brothers and Procter & Gamble (P&G), his former employer.
This case highlights the importance of updating beneficiary forms for
retirement accounts, life insurance policies, and bank accounts, which
can override wills even if filled out years ago. The number of
households aged 55 and older with workplace retirement accounts has
significantly increased, leading to more disputes over these funds due
to lost or incomplete beneficiary forms.

------------------------------------------------------------------------

**[Dagen H](https://en.wikipedia.org/wiki/Dagen_H)**:

Dagen H, also known as \"Högertrafikomläggningen\", was the day on 3
September 1967 when Sweden switched from driving on the left side to
right side of the road. The Swedish Commission for the Introduction of
Right-Hand Driving (HTK) oversaw this change, which was aimed at
aligning with neighboring countries and reducing head-on collisions due
to vehicles being predominantly left-hand drive. The switchover involved
a temporary ban on non-essential traffic, reconfiguring intersections,
replacing traffic signals, and repainting roads. Initially, the change
resulted in fewer accidents; however, this improvement did not last
long, as accident rates returned to normal within six weeks following
the switch.

------------------------------------------------------------------------

**[Tell HN: Domain migrated from Google to Squarespace went down after 1
month](https://news.ycombinator.com/item?id=40623332)**:

The article discusses the importance of decoupling services,
particularly for small teams. It suggests using separate domain
registrars and hosting DNS elsewhere, such as Cloudflare. For email
hosting, Google Workspace is recommended but alternatives exist.
Websites should be hosted by reputable providers with backup plans in
place. Apps should also be decoupled from the main website and hosted by
another reliable provider.

------------------------------------------------------------------------

**['Enshittification' is coming for absolutely
everything](https://web.archive.org/web/20240208152542/https://www.ft.com/content/6fb1602d-a08b-4a8c-bac0-047b7d64aba5)**:

Last year, I coined the term \"enshittification\" to describe the way
that platforms decay. That obscene little word did big numbers; it
really hit the zeitgeist. The American Dialect Society made it its Word
of the Year for 2023 (which, I suppose, means that now I\'m definitely
getting a poop emoji on my tombstone). So what\'s enshittification and
why did it catch fire? It\'s my theory explaining how the internet was
colonised by platforms, why all those platforms are degrading so quickly
and thoroughly, why it matters and what we can do about it. We\'re all
living through a great enshittening, in which the services that matter
to us, that we rely on, are turning into giant piles of shit. It\'s
frustrating. It\'s demoralising. It\'s even terrifying. I think that the
enshittification framework goes a long way to explaining it, moving us
out of the mysterious realm of the \"great forces of history\", and into
the material world of specific decisions made by real people; decisions
we can reverse and people whose names and pitchfork sizes we can learn.
Enshittification names the problem and proposes a solution. It\'s not
just a way to say \"things are getting worse\", though, of course, it\'s
fine with me if you want to use it that way. (It\'s an English word. We
don\'t have ein Rat für englische Rechtschreibung. English is a
free-for-all. Go nuts, meine Kerle.) But in case you want to be more
precise, let\'s examine how enshittification works. It\'s a three-stage
process: first, platforms are good to their users. Then they abuse their
users to make things better for their business customers. Finally, they
abuse those business customers to claw back all the value for
themselves.

------------------------------------------------------------------------

**[Paper: Garbage Collect Your Technical
Debt](https://ieeexplore.ieee.org/document/9520328)**:

The paper discusses tech debt in software development, comparing it to
the garbage collection process in computer memory. It suggests that
viewing software development processes as algorithms can help minimize
tech debt. The article explores the use of four different algorithms for
tech debt management: none, reactive, proactive, and balanced. It
suggests that choosing the appropriate algorithm depends on the
circumstances, such as the team\'s and project\'s size, domain
knowledge, design experience, technology experience, and schedule
pressure. The paper also discusses the differences between finite and
infinite games in tech debt management, and emphasizes the importance of
re-evaluating your tech debt algorithm when switching between the two
types of games.

------------------------------------------------------------------------

**[Wolters Kluwer
Health](https://lww.com/_layouts/1033/OAKS.Journals/Error/JavaScript.html)**:

This article provides instructions on how to enable JavaScript in
various web browsers, including Internet Explorer, Firefox, and Safari.
To do so, users should access their browser\'s settings menu and
navigate to the appropriate options for enabling JavaScript.

------------------------------------------------------------------------

**[Sildenafil ('Viagra') improves brain blood flow and could help to
prevent
dementia](https://www.ox.ac.uk/news/2024-06-07-sildenafil-viagra-improves-brain-blood-flow-and-could-help-prevent-dementia)**:

A new study published in Circulation Research suggests that sildenafil,
more commonly known as Viagra, has the potential to improve brain blood
flow and prevent dementia. The research, conducted by Dr. Alastair Webb
at Oxford University, is the first trial to demonstrate that sildenafil
can enter the blood vessels in the brain, improving blood flow and
responsiveness of these blood vessels. This could be significant as
vascular dementia currently lacks specific treatments and chronic damage
to small blood vessels in the brain causes 30% of strokes and 80% of
brain bleeds. The researchers are now planning larger-scale trials to
confirm their findings and explore sildenafil\'s potential for
preventing vascular dementia on a wider scale.

------------------------------------------------------------------------

**[Brain Drain: The Mere Presence of One's Own Smartphone Reduces
Available Cognitive
Capacity](https://www.journals.uchicago.edu/doi/10.1086/691462)**:

This paper discusses the cognitive impact of smartphones on users. The
research conducted shows that the mere presence of a smartphone can
reduce cognitive capacity, even when the device is not in use or
consciously thought about. The study also suggests that individual
differences in dependence on smartphones can influence the degree to
which cognitive capacity is affected. The implications of this research
are discussed in the context of consumer choice, advertising
effectiveness, and education.

------------------------------------------------------------------------

**[Brisante Funktion: Microsoft Recall
ausprobiert](https://www.heise.de/news/Erste-Erfahrungen-mit-Recall-9750138.html?view=print)**:

The article discusses Microsoft\'s Recall feature, which aims to search
user activities on Copilot+-PCs using AI. While the feature requires an
NPU, it has been enabled on older ARM-PCs using a special version of
Windows 11 and a system with ARM-CPU, such as the 2023 dev-kit or
Microsoft\'s Azure Cloud. Recall searches for user activities through
text and image recognition on screenshots. The article highlights
concerns about the security and privacy implications of Recall, as the
data generated can be accessed by any user with administrative rights,
potentially exposing personal information to malicious actors.

------------------------------------------------------------------------

**[Welcome to the safest time to give birth in human history --- The
fall in maternal mortality has saved millions of
mothers](https://www.theupwing.com/the-radical-drop-in-maternal-mortality-was-a-public-health-miracle/)**:

This article discusses the significant decline in global maternal
mortality rates from 2000 to 2017, with a reduction of 38%. In
low-income countries, the rate fell by 46% due to factors such as
improved nutrition, access to clean water, better sanitation, midwifery
care, and antibiotic treatment. The article highlights that while
maternal mortality rates have declined significantly worldwide, there
remains a large gap between high-income countries and the rest of the
world. It emphasizes the importance of effective family planning, access
to contraceptives, and skilled healthcare professionals in reducing
maternal mortality rates.

------------------------------------------------------------------------

**[South Pole Water Infrastructure --
brr](https://brr.fyi/posts/south-pole-water-infrastructure)**:

This article discusses water infrastructure at the South Pole station,
focusing on how fresh water is produced and wastewater disposed of in
such a harsh environment. The majority of Antarctic research stations
are located near the coast, but the South Pole is an exception due to
being hundreds of miles from the coast and high up on an inland plateau.
Water at the station begins with a Rodwell, which melts snow for fresh
water production, while wastewater is stored underground until it can be
disposed of using outdated methods. The article also highlights
challenges such as extreme cold, wind, accumulating snow, and long
supply chains for engineering expertise and spare parts that make
maintaining infrastructure at the South Pole difficult yet crucial for
human life in the region.

------------------------------------------------------------------------

**[How Replit used legal threats to kill my open-source
project](https://intuitiveexplanations.com/tech/replit/)**:

The article discusses how Replit, a company that encourages open-source
development and contributes to the community, threatened legal action
against one of its former interns for creating an open-source project
with similarities to their webapp. The author, Radon Rosborough, was
told to take down his project due to potential copyright infringement,
even though it had no commercial aspects or intention to compete with
Replit. Amjad, the CEO of Replit, apologized and agreed to disagree on
the situation, promising to allow Rosborough to put the project back up.

------------------------------------------------------------------------

**[The Italian Streets That Don\'t Exist on Any
Map](https://www.atlasobscura.com/articles/italian-streets-not-on-map)**:

In Italy, there are numerous \"invisible\" or \"fictitious\" streets,
such as Via Mariano Tuccella in Bologna, that do not exist physically
but serve as addresses for people who do not have a fixed residence.
This system dates back to the post-war era and was initially used for
circus performers and other traveling professionals who struggled to
access local services without a permanent address. Today, these streets
are often used for homeless or precariously housed individuals, as they
provide an official address that can be placed on their ID cards. This
allows them to claim their rights and be counted in the community where
they live. While Italy\'s invisible street system has its flaws, it
remains a unique solution that helps homeless people maintain their
legal identity and access vital services.

------------------------------------------------------------------------

**[Adobe Photoshop\'s New Terms of Service Demands the Right to Access
Your Work \|
Lifehacker](https://lifehacker.com/tech/photoshops-terms-of-service-demands-the-right-to-your-content)**:

Adobe has faced backlash from creators after introducing new pop-ups in
Photoshop informing users of changes to its Terms of Service (TOS). The
updated TOS claims that Adobe now has the right to access any work
generated using their software for various purposes, including training
AI. This includes accessing content through both automated and manual
methods. Creators have criticized the update, with some calling it a
violation of privacy and others claiming it interferes with their work.
Adobe\'s TOS currently reflect these changes.

------------------------------------------------------------------------

**[Feynman\'s
Razor](https://defenderofthebasic.substack.com/p/feynmans-razor)**:

The article discusses the importance of providing explanations for
technical matters that are comprehensible even to those who are capable
of understanding them, known as Feynman\'s Razor. It highlights an
example of a nonsensical error message and provides an alternative
explanation. The author emphasizes the need to avoid dumbing down
information and instead provide accurate and understandable explanations
for users with varying levels of technical knowledge or interest.

------------------------------------------------------------------------

**[What is PID 0? ·
blog.dave.tf](https://blog.dave.tf/post/linux-pid0/)**:

This article explains that Unix Process ID (PID) 0 actually exists and
serves as the bootstrap CPU core\'s idle task, responsible for
scheduling and power management in early kernel stages. However, PID 0
has no involvement in memory management processes. The confusion
surrounding PID 0 arises from a misinterpretation on Wikipedia that
spread across the web over time. The article also highlights the
importance of conducting primary research to verify information.

------------------------------------------------------------------------

**[Setting Up and Switching Between an NVIDIA eGPU on Ubuntu 22.04: A
Step-by-Step
Guide](https://scribe.r4fo.com/setting-up-and-switching-between-an-nvidia-egpu-on-ubuntu-22-04-a-step-by-step-guide-199739f4129f)**:

This guide provides a step-by-step process to set up an NVIDIA eGPU on
Ubuntu 22.04, ensuring seamless switching between the eGPU and
integrated graphics. The steps involve initializing the device,
installing appropriate drivers, installing egpu-switcher software,
rebooting and checking settings, and configuring the egpu-switcher for
smooth operation.

------------------------------------------------------------------------

**[Fefes Blog](https://blog.fefe.de/)**:

The article discusses various topics including Google working on a
feature similar to Microsoft Recall for Chromebooks, vulnerabilities in
Azure, Apple not issuing a bug bounty to Russian cybersecurity company
Kaspersky Lab after it disclosed four zero-day vulnerabilities in iPhone
software, Adobe needing more training data, PwC and Aleph Alpha founding
a joint venture for AI solutions in legal consulting, and Checkpoint\'s
advisory on the dangerous flaw exploited by threat actors.

------------------------------------------------------------------------

**[Google Leak Reveals Thousands of Privacy
Incidents](https://archive.is/RXEjf)**:

Google has accidentally collected children\'s voice data, leaked carpool
users\' trips and home addresses, made YouTube recommendations based on
deleted watch history, among other privacy incidents, according to an
internal database tracking six years worth of potential privacy and
security issues obtained by 404 Media. These incidents, individually
minor, have shown how the company handles a massive amount of sensitive
personal data. The data includes privacy and security issues reported
internally by Google\'s employees between 2013 and 2018.

------------------------------------------------------------------------

**[Cancel Adobe if you are a creative under NDA with your
clients](https://news.ycombinator.com/item?id=40607442)**:

The summary of the article is that Adobe has updated its terms and
conditions to include a new clause that grants them access to any
content created or edited using their software, including Photoshop.
This includes both cloud-stored files and local ones. The reason behind
this change is not specified, but it could potentially be related to
training AI models with user data. Users who rely on Adobe for their
work may find it difficult to switch to alternative software due to the
convenience and features provided by the company\'s suite of products.
However, there are alternatives available such as Krita, GIMP, and
Affinity Designer/Photo. The article also discusses how to avoid
cancellation fees when discontinuing an Adobe subscription.

------------------------------------------------------------------------

**[Shu Ha Ri](https://www.martinfowler.com/bliki/ShuHaRi.html)**:

Shu-Ha-Ri is a concept originating from Japanese martial arts
(particularly Aikido) that Alistair Cockburn introduced for software
development. The idea represents three stages of gaining knowledge:
Shu - imitating and focusing on the master\'s way; Ha - understanding
principles and learning from multiple masters; Ri - self-directed
innovation and creating one\'s own approach. This concept emphasizes
tailoring teaching styles to learners\' understanding levels, with a
focus on concrete steps, principles, and eventually self-directed
innovation. The Dreyfus model provides a more nuanced version of this
concept, which can be expressed as Imitate, Assimilate, Innovate.

------------------------------------------------------------------------

**[The Problem with Lying is Keeping Track of All the
Lies](https://materialize.com/blog/engineering/keeping-track-lies/)**:

The article discusses the challenges and complexity of working with
databases that provide weak isolation, which can lead to inconsistencies
and \"anomalies.\" Weak isolation models require developers to spend
more time reasoning about architecture diagrams, potential errors, and
interactions between different clients accessing the database. In
contrast, strong isolation models offer local reasoning and enable
programmers to reason about a single query in isolation without worrying
about inconsistencies or other users\' transactions. The article
emphasizes that while weak isolation is not something to be entirely
excluded, it should be used with caution as it can lead to significant
waste of resources and time for developers trying to maintain
consistency across their systems.

------------------------------------------------------------------------

**[How to keep using adblockers on chrome and
chromium](https://gist.github.com/velzie/053ffedeaecea1a801a2769ab86ab376)**:

Google\'s Manifest V3 has caused concerns among adblockers due to its
lack of a webRequestBlocking API equivalent. Starting in Chrome version
127, the transition to MV3 will prevent the use of MV2 extensions
entirely. To address enterprise complaints, an
ExtensionManifestV2Availability key was added and is likely to remain
indefinitely. For regular users, they can continue using their MV2
extensions by following specific instructions involving terminal
commands and enabling developer mode. This allows them to keep MV2
extensions even after they\'re supposed to stop working.

------------------------------------------------------------------------

**[The "full-stack framework"
fallacy](https://stack.convex.dev/full-stack-framework-fallacy)**:

The article discusses the importance of having an opinionated backend
ecosystem that interoperates seamlessly with frontends for full-stack
developers to easily build apps that can scale. This includes features
such as schema definition, database access, argument validation,
authentication, scheduled jobs, real-time subscriptions, caching,
security, text search, vector search, file storage, and automatic
scaling. Having a backend platform with these features in a consistent
package reduces fragmentation and makes it easier for developers to work
on frontend and backend components simultaneously. The author also
mentions Convex as an example of such a backend ecosystem that works
with various frontend frameworks and languages while providing strong
abstractions for end-to-end types, real-time reactivity, and data
consistency.

------------------------------------------------------------------------

**[Developer posts secret key on GitHub, loses \$40K in 2
minutes](https://cointelegraph.com/news/web3-dev-loses-40k-github-key-leak)**:

The article is about a Web3 developer, Brian Guan, who accidentally
shared his secret keys on GitHub, resulting in the loss of \$40,000 in
just two minutes. The incident sparked a mixed reaction within the
crypto community, with some showing sympathy and offering support, while
others criticized Guan\'s previous comments about developers using
ChatGPT to write code. Additionally, a memecoin coded using ChatGPT has
found success within the crypto space, reaching a market capitalization
of \$600 million.

------------------------------------------------------------------------

**[Remote Machine Learning \|
Immich](https://immich.app/docs/guides/remote-machine-learning/)**:

This article discusses performance issues on low-memory systems like the
Raspberry Pi when hosting Immich\'s machine-learning container. It
suggests using a more powerful system, such as a laptop or desktop
computer, to alleviate these issues. To enable hardware acceleration,
add one of -\[armnn, cuda, openvino\] to the image tag. The example
image is provided with the tag: \${IMMICH_VERSION:-release}-cuda.
Updates should always be performed together on both hosts to avoid
instabilities and bugs.

------------------------------------------------------------------------

**[VDO.Ninja](https://vdo.ninja/)**:

This article discusses VDO.Ninja, a platform for group-chat and video
management. The platform allows users to create rooms with tools for
managing multiple guests. Guests can see the director but not other
guests\' videos. The director will be performing in group scenes as
well. Advanced settings are available to customize rooms, and it is
recommended to use headphones/earphones for the best experience. The
\"Recording\" option is experimental, and only trusted guests should be
invited into the room.

------------------------------------------------------------------------

**[How bad OEM firmware ruins TPM
security](https://mkukri.xyz/2024/06/01/tpm-gpio-fail.html)**:

This article demonstrates a software attack that allows an operating
system to set PCRs (Platform Configuration Register) values on a
discrete TPM device and unseal any secret using a PCR-based sealing
policy such as disk encryption keys in unattended FDE schemes. The
attack does not require physical access to the pins on the device but
instead relies on software abusing Intel\'s PCH (Platform Controller
Hub) buses to reset TPM devices. This can be used to attack TPM FDE
schemes, such as BitLocker, in multiple ways, allowing an attacker brief
physical access or running malware within another operating system to
extract encryption keys and secrets stored on disk. To mitigate this
attack, boot firmware updates are required, but the author suggests that
Intel\'s BootGuard may need further enhancements for better protection
against PCR reset attacks.

------------------------------------------------------------------------

**[The Distinctiveness of Human
Aggression](https://www.robkhenderson.com/p/the-distinctiveness-of-human-aggression)**:

The \"self-domestication hypothesis\" suggests that early human
communities eliminated individuals prone to aggression, leading us to
become relatively peaceful apes. Humans tamed one another by removing
particularly aggressive individuals. While humans are far nicer to
members of their own group than chimps, there is still a significant
amount of violence among us today. The ability to cooperate and
coordinate actions, especially in the context of outgroups, has shaped
human nature and evolution. This double-edged sword has contributed to
both our kindness and cruelty, as well as our unique capacity for
organized violence.

------------------------------------------------------------------------

**[save.tf](https://save.tf/)**:

The article is about a group of people who are trying to save Team
Fortress 2 from being destroyed by malicious bots. They are planning to
do this by spreading awareness of the issue on social media and by
signing a petition to Valve, the game\'s developer, to fix the problem.
The group believes that Valve is not doing enough to address the issue
and that the game is in a state of crisis. They are asking Valve to take
action and fix the issue, and are planning to use social media to spread
awareness of the issue and to pressure Valve to take action.

------------------------------------------------------------------------

**[Automated check for corrupted image files with Python and ImageMagick
\| Davide
Barranca](https://www.davidebarranca.com/2018/05/automated-check-for-corrupted-image-files-with-python-and-imagemagick/)**:

The article describes a Python script and ImageMagick utility to check
if image files (tiff, psd, psb) are corrupted without opening them or
looking at their thumbnails with Bridge or Photoshop. This is useful for
large data migration tasks where opening the images in Photoshop is not
an option. The script can be used by changing the folderToCheck variable
and fileExtension to match the user\'s specific files and then running
it on a terminal using python3 command.

------------------------------------------------------------------------

**[Pigweed Eng Blog #2: Feature flags in Bazel
builds](https://pigweed.dev/docs/blog/02-bazel-feature-flags.html)**:

The article discusses three approaches for configuring build systems
with Bazel, focusing on code relying heavily on preprocessor defines to
configure its code. These methods include:

1\. Easy but limited: bazelrc config with copts - This approach involves
adding compiler options in the .bazelrc configuration file and applying
them when building the same code for different final product
configurations. However, this method has downsides such as dangerous
typos and no multi-platform build support.

2\. More power with no code changes: Platform-based Skylib flags - This
approach represents build features as Skylib flags grouped through
platform-based flags. While this solution is more powerful and does not
involve code changes, it has downsides like limited multirepo support
and typos remaining dangerous.

3\. Error-preventing approach: Chromium-style build flag pattern - This
method builds on the Platform-based Skylib flags by adding a macro
helper for retrieving flag values that guards against typos. It involves
users of flags accessing them in C++ files via BUILDFLAG(SOME_NAME).
However, this approach is still under development and not available in
older Bazel versions.

------------------------------------------------------------------------

**[Microsoft Recall should make you consider
Linux](https://creativegood.com/blog/24/recall-switch-to-linux.html)**:

This article discusses Microsoft\'s latest product announcement,
\"Recall,\" which takes snapshots of a user\'s on-screen activity every
few seconds and stores it locally on the computer in plaintext. This has
raised security concerns as it leaves users vulnerable to hackers who
can steal their private information with just two lines of code. Despite
this issue, Microsoft is unlikely to recall the feature as it increases
the amount of surveillance data available for the company. The article
suggests that users should switch to Linux, a free and open-source
operating system without opaque surveillance code, in order to protect
their privacy from Big Tech companies.

------------------------------------------------------------------------

**[Professor by Day. Porn Star by Night. Can He Be
Both?](https://www.thefp.com/p/94eb374f-0cb9-49ff-97f3-fbc507d2cd0c)**:

University of Wisconsin La Crosse professor Joe Gow, 63, and his wife
Carmen Wilson, 56, have been videotaping their sexual escapades for
nearly ten years. The couple has gained over 10,000 followers since
joining OnlyFans under the username \"Sexy Happy Couple.\" However,
Gow\'s employment at the university may be in jeopardy after a
university lawyer discovered he was selling adult films online.

------------------------------------------------------------------------

**[Photoshop ToS grants Adobe access to user projects for \'content
moderation\'](https://news.ycombinator.com/item?id=40591860)**:

This article discusses various Adobe Photoshop alternatives that users
can consider using instead. Affinity Photo by Serif and Pixelmator Pro
are mentioned as good, light, quick, and easy-to-use tools with
reasonable pricing. Additionally, DxO PhotoLab is suggested for those
looking for an alternative to Adobe Lightroom. The author also mentions
their preference for Skylum software, which integrates well with macOS
Photos.

------------------------------------------------------------------------

**[Kreativsoftware für Profis \| Wir sind
Affinity](https://affinity.serif.com/de/)**:

The article announces the release of version 2.5 for a software known
for image editing, graphic designing, and page layout, which works on
Mac, Windows & iPad. It is fast, efficient, and free from unnecessary
features while also providing seamless workflow with common file
formats. Developed using advanced technology for latest technology
compatibility, it offers full functionality across all platforms without
a subscription or additional costs.

------------------------------------------------------------------------

**[Photoshop Terms of Service grants Adobe access to user projects for
'content
moderation'](https://nichegamer.com/photoshop-terms-of-service-grants-adobe-access-to-user-projects-for-content-moderation/)**:

Photoshop\'s new terms of service allow Adobe access to users\' active
projects for content moderation purposes and other reasons. This has
raised concerns among professionals as it could compromise NDA-protected
projects such as logos for unannounced games or media projects. Tech
companies, including Microsoft, are increasingly interested in
monitoring user activities and using user-generated content to improve
their services.

------------------------------------------------------------------------

**[How Online Privacy Is Like
Fishing](https://spectrum.ieee.org/online-privacy)**:

Microsoft recently caught state-backed hackers using its generative AI
tools to help with their attacks, leading to questions about how the
company figured it out. The issue is not about how hackers are utilizing
the tools, but whether Microsoft was spying on AI users. This situation
exemplifies \"shifting baseline syndrome,\" where each generation\'s
privacy expectations are lower than the previous one due to advancements
in technology. To address this issue, a holistic ecosystem-wide
perspective is required for both privacy rights and services provided by
companies. A scientifically informed and democratic regulatory process
needs to be implemented for preserving heritage and ensuring
sustainability in the digital landscape.

------------------------------------------------------------------------

**[Online Privacy and Overfishing - Schneier on
Security](https://www.schneier.com/blog/archives/2024/06/online-privacy-and-overfishing.html)**:

Microsoft recently detected state-backed hackers using their AI tools
for malicious purposes. The main question was how Microsoft figured it
out, leading some to believe that the company was spying on its users.
However, cloud service providers regularly monitor user activity, and it
would be unfair to call this \"spying.\" This situation highlights our
shifting collective expectations of privacy. Similar to overfishing in
oceans, where each generation has a different baseline for acceptable
catch size, the security community\'s understanding of privacy is
subject to change as technology advances. AI chatbots are an example of
this phenomenon, with cloud-based systems tracking user input. To
address privacy concerns, we need to take a holistic and ecosystem-wide
perspective, considering what a healthy technological environment should
look like. This requires a scientifically informed regulatory process to
preserve privacy rights for future generations.

------------------------------------------------------------------------

**[Report: E.U. censorship laws mostly suppress legal
speech](https://reason.com/2024/06/05/report-e-u-censorship-laws-mostly-suppress-legal-speech/)**:

This article discusses Europe\'s regulation on online speech,
particularly the Digital Services Act (DSA), and its potential impact on
freedom of expression. The Future of Free Speech, a think tank based at
Vanderbilt University, found that legal online speech made up most of
the removed content from posts on Facebook and YouTube in France,
Germany, and Sweden. The report suggests that social media companies may
over-remove content to avoid fines under legislation such as NetzDG in
Germany. It also highlights how high-profile current events are a
prominent subject in suppressed content and that enforcement of speech
regulation is more common in cultures less tolerant of free expression.
The article concludes that the DSA undermines freedom of expression
based on shallow empirical evidence, with governments giving social
media giants the key to steer digital discourse.

------------------------------------------------------------------------

**[268% higher failure rates for Agile software
projects](https://www.theregister.com/2024/06/05/agile_failure_rates/)**:

A study commissioned by consultancy Engprax found that software projects
using Agile practices were 268 percent more likely to fail than those
not adopting Agile methods. The research, which surveyed 600 software
engineers in the UK and US, discovered that projects with clear
requirements documented before development started were 97% more likely
to succeed. According to Dr Junade Ali, author of Impact Engineering,
robust requirements engineering processes are crucial for delivering
high-quality software on time and within budget. The research highlights
a need to find a balance between Agile practices and other methodologies
like Waterfall.

------------------------------------------------------------------------

**[Stable Audio Open --- Stability
AI](https://stability.ai/news/introducing-stable-audio-open)**:

Stable Audio Open is an open source text-to-audio model that allows
users to generate up to 47 seconds of high-quality audio data, such as
drum beats, instrument riffs, ambient sounds, foley recordings and
production elements. This release marks a key milestone for making
portions of generative audio capabilities accessible for sound
designers, musicians, and creative communities. Unlike the commercial
Stable Audio product, which generates full tracks with coherent musical
structures up to three minutes in length, this open source model is
designed specifically for creating audio samples, sound effects, and
production elements. Users can fine-tune the model on their own custom
audio data and explore its capabilities by downloading the model weights
from Hugging Face. This release is part of an ongoing effort to develop
open and responsible AI audio generation capabilities in collaboration
with creative communities.

------------------------------------------------------------------------

**[Fefes Blog](https://blog.fefe.de/?ts=989e58cb)**:

In an effort to influence global public opinion regarding the war in
Gaza, the Israeli government conducted a PR campaign using fake social
media accounts and websites that spread pro-Israel and Islamophobic
content. This operation was orchestrated by Israel\'s Diaspora Affairs
Ministry and executed through a political campaigning firm.

------------------------------------------------------------------------

**[Is Microsoft trying to commit
suicide?](https://www.antipope.org/charlie/blog-static/2024/06/is-microsoft-trying-to-commit-.html)**:

This article discusses Microsoft\'s announcement of CoPilot+, an
AI-based add-on for Windows, as well as the new Recall feature that
takes snapshots of all open windows on a computer and saves them
locally. The author argues that these features pose privacy risks and
potentially breach data protection laws. Additionally, the article
highlights Apple\'s approach to integrating AI into its products and
services without causing significant concerns for user privacy.

------------------------------------------------------------------------

**[Meta is fixing three of the Quest 3's biggest lingering
annoyances](https://www.theverge.com/2024/6/4/24171381/meta-quest-3-v66-passthrough-distortion-background-audio-wrist-menu)**:

The Meta Quest 3 is getting a new v66 update, which addresses two major
issues - distortion in the real-world view and the confusing menu access
gesture. With the update, users can now tap a button on their wrist to
open the menu, reducing distortion and making it easier to interact with
virtual objects. Additionally, there is now proper background audio for
multitasking, allowing users to play music or videos without pausing
them automatically when switching apps. The passthrough fixes are
exclusive to Quest 3 at present, but the wrist buttons and background
audio will be coming to Quest 2 and Quest Pro as well. Other features
include support for \"high-resolution\" Netflix on the web browser and
improved realism in mixed reality (MR) games and apps.

------------------------------------------------------------------------

**[This Hacker Tool Extracts All the Data Collected by Windows' New
Recall
AI](https://www.wired.com/story/total-recall-windows-recall-ai/)**:

Microsoft\'s new Windows AI tool, Recall, was revealed by CEO Satya
Nadella and can answer questions about users\' web browsing and laptop
use. However, security researchers have demonstrated that preview
versions of the tool store screenshots of activity in an unencrypted
database. Alex Hagenah, a cybersecurity strategist, has developed a demo
tool called TotalRecall that extracts all information Recall saves on a
Windows laptop. The database is unencrypted and can be easily accessed
by attackers. Microsoft has faced criticisms as hacks of its systems
have led to US government data breaches, with Nadella stating security
should be the company\'s \"top priority.\"

------------------------------------------------------------------------

**[Study shows most doctors endorsing drugs on X are paid to do
so](https://medicalxpress.com/news/2024-05-doctors-endorsing-drugs-paid.html)**:

A study by U.S. medical researchers found that a significant number of
doctors who posted endorsements for drugs on social media site X had
been paid to do so by the drug manufacturers. The researchers used Open
Payments, a website run by the Centers for Medicare and Medicaid
Services, to identify which doctors received payments for their
endorsements. In the United States, it is legal for pharmaceutical
companies to advertise drugs, including on social media sites, and for
doctors to receive payment for endorsing them. The study found that 26
of the 28 doctors they examined had received payments from drug
manufacturers, with most payments categorized as \"speaking\" or
\"consulting.\" While this practice may be seen as unethical, it is not
illegal and does not affect a doctor\'s license.

------------------------------------------------------------------------

**[You\'ll regret using natural
keys](https://blog.ploeh.dk/2024/06/03/youll-regret-using-natural-keys/)**:

The article discusses the issue of using natural keys in database
designs and shares a personal experience where a chassis number was
wrongly changed, causing concern about car ownership. The author
explains that while natural keys may seem like an easy solution for
uniquely identifying entities, they are not without their problems.
These issues include ensuring the uniqueness of the key, potential
clerical errors, and difficulties in correcting data errors. The article
concludes with a recommendation to always use synthetic keys for
database tables instead of natural ones due to these challenges.

------------------------------------------------------------------------

**[RealPage Rent Price-Fixing Probe Escalates With FBI Raid \|
Entrepreneur](https://www.entrepreneur.com/business-news/realpage-rent-price-fixing-probe-escalates-with-fbi-raid/475109)**:

The Federal Bureau of Investigation (FBI) conducted an unannounced raid
on Cortland Management as part of a criminal antitrust investigation
into RealPage, a software company that recommends rent increases on
millions of housing units across the US. The investigation is looking
into an alleged rental price-fixing conspiracy impacting millions of
Americans. Lawsuits filed against RealPage claim its algorithm raises
rental prices based on data collected from landlords, not demand. Over
16 million rental units in the US used RealPage\'s algorithm as of 2020,
with the company playing a significant role in rising apartment rents.

------------------------------------------------------------------------

**[Excess mortality across countries in the Western World since the
COVID-19 pandemic: 'Our World in Data' estimates of January 2020 to
December 2022](https://bmjpublichealth.bmj.com/content/2/1/e000282)**:

This study investigated excess mortality in 47 Western countries from
January 2020 until December 2022, finding that a total of 3,098,456
excess deaths were recorded during this period. Excess mortality was
documented in 87% of countries in 2020, 89% of countries in 2021, and
91% of countries in 2022. The highest number of excess deaths was
reported during the year in which both containment measures and COVID-19
vaccines were used to address virus spread and infection. This raises
concerns about the underlying causes of persistent excess mortality,
prompting government leaders and policymakers to thoroughly investigate
these issues.

------------------------------------------------------------------------

**[Microsoft blocks Windows 11 workaround that enabled local
accounts](https://www.pcworld.com/article/2354686/microsoft-blocks-windows-11-workaround-local-accounts.html)**:

This article is about Laura, a passionate gamer and film/series fan who
studied communications science and started her career in media
immediately after graduation. She has been writing about PCs and
technology topics since May 2024 and currently works as a permanent
editor for PC-Welt.

------------------------------------------------------------------------

**[Linux Printing with Kyocera Print
Panel](https://community.spiceworks.com/t/linux-printing-with-kyocera-print-panel/1014129?_escaped_fragment_=)**:

This article provides a step-by-step guide on how to install Kyocera
Linux 9.2 driver (Dec-2022) under Ubuntu 22.04 using the command line to
meet dependencies prior to installation and ensure correct driver/PPD
integration for Print Panel. The process involves downloading the Linux
driver package, installing necessary dependencies, installing the
printer, selecting the correct device port type as LPD/LPR, and running
the Kyocera Print Panel application for setting up printer settings and
profiles.

------------------------------------------------------------------------

**[Why Ruby's Timeout is dangerous (and Thread.raise is
terrifying)](https://jvns.ca/blog/2015/11/27/why-rubys-timeout-is-dangerous-and-thread-dot-raise-is-terrifying/)**:

This article discusses the Timeout API in Ruby, which allows users to
auto-terminate long-running operations after a certain amount of time
has passed. The author shares an experience where they encountered
difficulties due to the unintended consequences of using Timeout and
raises concerns about its implementation, as well as comparing it to
other languages\' approaches. The article suggests that there might be
better ways to handle timeouts in Ruby than relying on Timeout\'s
potentially dangerous methods.

------------------------------------------------------------------------

**[Linux Mint Disabling Unverified Flatpaks By
Default](https://www.phoronix.com/news/Linux-Mint-Unverified-Flatpaks)**:

The Linux Mint project has released its May newsletter, detailing recent
progress made on the Ubuntu-derived desktop-focused Linux distribution.
Enhancements to their software manager include faster loading and
default disabling of unverified Flatpaks with a warning for security
risks. Additionally, they are testing the Fastly CDN for faster and more
reliable repository access and utilizing Datadog for data monitoring
around their repository.

------------------------------------------------------------------------

**[MeshMap - Meshtastic Node Map](https://meshmap.net/)**:

**TODO**

------------------------------------------------------------------------

**[Homeschooling](https://www.teamten.com/lawrence/writings/homeschooling.html)**:

The article describes the author\'s experience homeschooling their son,
Milo. After reading Seth Godin\'s Stop Stealing Dreams, which questions
traditional schooling methods, the author decided to pull Milo out of
public school for two years. Initially, they found some homeschooling
books and online classes but quickly discovered that self-driven
learning was much more effective. The concept of \"unschooling\"
resonated with the family; allowing Milo near-complete control over his
education led to a significant shift in his attitude towards learning.
By the end of their experiment, Milo had developed strong interests in
various subjects and even excelled academically when he returned to
public school.

------------------------------------------------------------------------

**[Here comes the Muybridge camera moment but for text. Photoshop
too](https://interconnected.org/home/2024/05/31/camera)**:

This article discusses the potential for measuring the velocity of
concepts over a piece of text using AI-adjacent techniques like
embeddings. The author gives examples of how embeddings can be used to
create search engines and visualizations, as well as mentioning
real-time hermeneutics, manipulating text based on hidden features, and
comparing this to the development of photography and its impact on
society. The article ultimately suggests that AI techniques will
continue to evolve, leading to new user interfaces and potentially
unpredictable cultural implications.

------------------------------------------------------------------------

**[Putins Russland： Zurück zur Sowjetunion？ ｜ DW
Nachrichten](https://www.youtube.com/watch?v=WC5vAqPKzh4) (Video):**

The video discusses the parallels between modern Russia and the Soviet
Union, focusing on various aspects such as ideology, economy,
geopolitical power, and political control. Some key points include:

1\. Ideological similarities: The speaker mentions that ideologies of
the past are resurfacing in modern Russian youth organizations,
promoting a nostalgia for Soviet times.

2\. Economic parallels: There is an increase in investments into
military-industrial complex and a subvention of state-owned industries.
This is similar to how the Soviet Union controlled production and
resources during its time.

3\. Geopolitical power: The speaker argues that Russia, like the USSR,
sees itself as a world power and is trying to regain its position in
international politics.

4\. Political control: In both eras, private businesses face pressure
from the state, with an increasing presence of secret services in
corporations and a heavy influence on economic decisions.

5\. Consumer culture: The speaker mentions that there are similarities
in consumer culture between present-day Russia and the Soviet Union,
where scarcity leads to higher prices for products in rural areas while
cities have access to imported goods from around the world.

6\. Investment in future industries: Both eras have neglected
investments in pharmaceutical industry, IT sector, and other
future-oriented sectors. The speaker believes that this could be a
potential long-term threat for Russia\'s economic stability.

7\. Comparison with other regimes: Despite the parallels with the Soviet
Union, the video does not predict an imminent collapse of Putin\'s
regime due to its ability to maintain stability through various factors
like controlled media and strong internal security forces.

------------------------------------------------------------------------

**[Why Russia Might Invade Georgia
(Again)](https://www.youtube.com/watch?v=fF6W3VGeBO8) (Video):**

The Transcript eines Youtube Videos discusses the complex geopolitical
situation in Georgia, a country located at the crossroads of Eastern
Europe and Western Asia. The main topics include the new foreign
influence law, tensions between Georgia and Russia, the impact of the
war in Ukraine, and the strategic importance of Georgia\'s geography for
trade routes and energy pipelines.

1\. New Foreign Influence Law: In May 2024, the Georgian government
passed a controversial law known as the Transparency of Foreign
Influence Bill. This law requires NGOs and media companies receiving
more than 20% of their funding from abroad to register themselves as
pursuing foreign interests in a public registry. Critics argue that this
is similar to a Russian law passed in 2012, which has been used to
suppress opposition media outlets and NGOs. The passing of the bill
could jeopardize Georgia\'s prospects of joining the European Union (EU)
and NATO.

Key Points:

-   The Transparency of Foreign Influence Bill is similar to a Russian
    law that allows for suppression of opposition.
-   Critics have labeled it as the \"Russian Law\" due to its
    similarities with the 2012 Russian legislation.
-   The bill\'s passing could prevent Georgia from joining the EU and
    NATO, which has been a long-standing aspiration of most Georgians.

2\. Tensions between Georgia and Russia: Relations between Georgia and
Russia have been strained since the 2008 war, in which Russia intervened
to support separatist movements in South Ossetia and Abkhazia. The
conflict resulted in Russian recognition of these regions\' independence
from Georgia and their effective military occupation. This has led to a
severance of diplomatic relations between the two countries.

Key Points:

-   The 2008 war was a significant turning point in Georgia-Russia
    relations, with Russia recognizing the independence of South Ossetia
    and Abkhazia.
-   Russian military forces are stationed within close proximity to
    Tbilisi, creating a strategic threat to Georgia.
-   The capture of these regions by Russia has extended its control over
    key transportation routes and energy pipelines.

3\. Impact of the War in Ukraine: The ongoing war in Ukraine has created
ripple effects across Europe and Asia. It has led to an increase in
trade volume between Russia and Georgia, with Georgian exports to Russia
rising by nearly 7% in 2022 and imports skyrocketing by 79% over the
same period. This has caused tensions with the Ukrainian government,
which has accused Georgia of assisting Russia in evading sanctions.

Key Points:

-   The war in Ukraine has increased trade between Russia and Georgia,
    leading to criticism from Ukraine.
-   Tensions between Georgia and Ukraine have escalated due to these
    economic ties and allegations of supporting Russian interests.

4\. Strategic Importance of Georgia\'s Geography: Georgia\'s location at
the crossroads of Eastern Europe and Western Asia makes it a critical
space for both Russia and the West. It controls several key
transportation routes, including the Baku-Tbilisi-Seyhan oil pipeline
and the Southern Gas Corridor. The development of the Anakhlyia
deep-water port could significantly enhance trade with China and other
Asian countries, making Georgia an essential part of the Middle Corridor
Trade Route.

Key Points:

-   Georgia\'s geography makes it a strategic location for overland
    travel routes and energy pipelines.
-   The development of Anakhlyia as a deep-water port could further
    enhance its geopolitical importance.
-   The country is at the center of several trade routes, including the
    Middle Corridor between China and Europe.

Executive Summary: The Transcript eines Youtube Videos delves into the
complex political landscape in Georgia, highlighting the new foreign
influence law, tensions with Russia following the 2008 war, the impact
of the war in Ukraine, and the strategic importance of its geography for
trade routes and energy pipelines. These factors create a delicate
balance between East and West, with significant implications for global
geopolitics and trade dynamics.

------------------------------------------------------------------------

**[Taste the Plastic - How Coca Cola is Poisoning the Planet for Profit
｜ Greenwashing ｜ FD
Finance](https://www.youtube.com/watch?v=pumjYvHX4Wc) (Video):**

The video focuses on the problem of plastic pollution, particularly its
impact on marine life and the environment. It highlights the issue of
plastic ingestion by fish and other marine species. Coca-Cola is
mentioned as an example of a company that has not been fully transparent
about its recycling efforts and has even lobbied against increased
collection and recycling targets in Europe. The video also shows images
of Tanzania, where the Coca-Cola group\'s transition from glass to
plastic bottles created a mountain of waste and a recycling business
that primarily benefits poverty-stricken individuals. It concludes with
a statistic on the number of plastic bottles sold by the Coca-Cola Group
during the length of the video, emphasizing the enormous scale of the
problem.

------------------------------------------------------------------------

**[Marker： This Open-Source Tool will make your PDFs LLM
Ready](https://www.youtube.com/watch?v=mdLBr9IMmgI) (Video):**

The video discusses the challenges of using PDFs for LLM applications
due to their complex structure and lack of standard layout. It
introduces Marker, an open-source tool that converts complex PDF files
into well-structured markdowns for easier processing by LLM models. The
speaker compares Marker\'s performance with Nougat, another open-source
project, finding that Marker is faster and more accurate in converting
PDFs to markdowns. The video also mentions the limitations of these
tools in handling equations and tables in PDF files, but overall, it
presents Marker as a useful resource for working with PDF data for LLM
applications.

------------------------------------------------------------------------

**[Solar und Wind haben ein riesiges
Problem](https://www.youtube.com/watch?v=lY7JkEWQHs4) (Video):**

In this YouTube video, the speaker discusses Germany\'s exit from
nuclear energy and coal power at the same time while increasing the use
of renewables. They highlight that Germany is becoming more reliant on
wind and solar power, which can cause issues with fluctuations in supply
due to varying weather conditions. The speaker also mentions Germany\'s
plans for future electricity production, such as the construction of new
gas-powered plants that will eventually switch to hydrogen fuel by 2035
or 2040.

Another topic covered is Germany\'s energy storage strategy, which
involves increasing battery storage capacity and investing in pumped
storage power plants. The speaker emphasizes the importance of adjusting
electricity production based on demand and utilizing smart grid
technology to optimize energy consumption. They also mention that
electric vehicles (EVs) can help balance the electricity grid by
charging during off-peak times and discharging during peak hours.

Lastly, the speaker addresses the controversy surrounding Germany\'s
exit from nuclear power and whether it was a mistake. The video explains
that only around 2% of Germany\'s electricity comes from abroad, and
that France is also experiencing challenges with its nuclear power
plants due to high costs and maintenance issues. The speaker concludes
by stating that Germany has managed the energy transition without
relying on nuclear energy and should continue investing in renewable
sources like solar and wind power alongside battery storage and smart
grid technology.

------------------------------------------------------------------------

**[Von Salzkonsum bis Halotherapie -- Was Salz mit unserem Körper macht
｜ Puls ｜ SRF](https://www.youtube.com/watch?v=F-pLVWraux0) (Video):**

The transcript discusses various aspects of salt mining, health
implications of salt intake, and alternative therapies using salty
environments such as Halotherapy. Key points include:

1\. Salt mining has been present for over 350 years in the Alps, with
workers experiencing fewer respiratory problems compared to those
working above ground.

2\. Halotherapy is an interesting treatment for lung-related health
issues, wherein patients breathe in air containing salt particles. It
has shown positive effects on reducing inflammation and improving
breathing.

3\. The recommended daily intake of salt is 5g per day, but many people
can tolerate higher amounts without adverse effects. However, excessive
salt consumption can lead to negative outcomes for some individuals,
particularly those with hypertension or kidney issues.

4\. Salzgarten is a salty environment created by Christina Matlag for
people suffering from respiratory problems or skin diseases such as
psoriasis and eczema. The therapy involves breathing in salt particles
for an hour, which helps reduce inflammation and improve lung function.

5\. Jodiertes Salz is crucial for maintaining proper thyroid function,
but only 30% of pregnant women in Switzerland are receiving sufficient
iodine intake due to the changing dietary habits.

------------------------------------------------------------------------

**[Insider Infos： So beschummelt Aldi dich bei den
Preisen](https://www.youtube.com/watch?v=WdixhaMoIFU) (Video):**

The video discusses the strategies and tactics used by Aldi to offer low
prices on products. Key points include:

1\. Tie-in prices: Aldi offers certain items at deep discounts,
attracting customers and encouraging them to buy more. However, these
tie-in products might not be the best deals compared to other products
in the store.

2\. Deep discounts on selected items: Aldi focuses on a few specific
products as \"Eckartikeln\" or corner items, which are always available
at low prices due to high demand and frequent purchases.

3\. Limited product range: Aldi deliberately offers fewer products than
its competitors to simplify the shopping experience for customers and
reduce the time required for decision-making. This also allows them to
negotiate better prices with suppliers.

4\. Printed promotional materials: Aldi uses printed flyers, brochures,
and weekly highlights of discounted products to entice customers and
showcase their low prices. However, there have been allegations that the
company misleads customers by using \"Streichpreise\" (discounted
prices) from the past 30 days instead of current market prices as a
basis for calculating percentage-based discounts.

5\. Kassierleistung: Aldi is known for its efficient checkout processes,
with an emphasis on speed and efficiency to save costs and maintain
customer satisfaction. The company utilizes digital monitoring systems
to track employee performance and identify areas for improvement.

6\. Pressure on employees: Employees at Aldi face high pressure to meet
sales targets and maintain the company\'s image of low prices. This may
lead to consequences such as job loss or disciplinary action if they
fail to perform adequately.

------------------------------------------------------------------------

**[Europawahlen： EU kämpft gegen russische Desinformation ｜ DW
Nachrichten](https://www.youtube.com/watch?v=3RV__p-kOg8) (Video):**

The transcript discusses the involvement of Russia in European elections
and their use of fake accounts on social media platforms to manipulate
public opinion. They are accused of supporting far-right members and
employees of the European Parliament, financing propaganda networks like
Voice of Europe through illicit financial transactions. Despite
sanctions and expulsion from the country, Voice of Europe retained its
Prague address. Veronika Vyshova, an anti-disinformation activist,
expresses concern about this issue and highlights how European
politicians are also guilty of spreading disinformation within their own
continent. The Covid-19 conspiracy theories have been revived due to the
ongoing war between Russia and Ukraine. Tommaso Canetta, coordinator of
the European Observatory for Digital Media, emphasizes the importance of
a balanced approach between skepticism and trust in information sources,
as well as being vigilant against deepfakes and other forms of
disinformation. The upcoming European elections will be a crucial test
to determine how effective fact-checkers are in preserving the integrity
of the elections.

------------------------------------------------------------------------

**[Wenn die Eltern zum Pflegefall werden ｜ Politik & wir ｜
Twitch-Talk](https://www.youtube.com/watch?v=0v6K4BN-eG8) (Video):**

In the Transcript eines YouTube Videos titled \"Pflegenotstand - Wie
geht es weiter?\", several topics related to the current state of
eldercare in Germany were discussed. The video featured interviews with
Dr. Tina Rudolf, a politician and medical doctor; Eva Ohlert, a former
care worker with 20 years of experience; Kim Juncker-Mogale, who has
been caring for her mother at home since 2018; Jochen Springborn,
another home carer; and others.

The main topics discussed were:

1\. The Current State of Elderly Care in Germany

     - A shortage of caregivers due to the aging population and high turnover rate among staff was highlighted.
     - Pflegeheime (care homes) are facing a critical situation, with some having waiting lists for over six months.
     - There is also an issue with the quality of care, as seen in stories like that of Diana's mother who had to wait hours for help after pressing her emergency button and was later found in a state of disarray by her daughter.

2\. The Impact on Families

     - Many viewers shared their experiences or concerns about what would happen when their parents become elderly and need care.
     - Caring for an elderly family member at home can be challenging, both physically and mentally. It often leads to burnout and stress, as well as the feeling of being isolated from normal life activities.

3\. The Role of Private Investment in Care Homes

     - Despite claims that there is no money available for eldercare, private investors are making a lot of profit from care homes. This was explored by Aurora Lee, a researcher at Finanzwende Recherche. She explained how these investors use financial tricks to extract maximum profit, such as selling off the assets like land or buildings and then leasing them back to the care home at a higher cost.
     - There were calls for regulations to prevent profit-making in the field of health and eldercare, with suggestions including a ban on profits (Gewinn-Ernahme-Verbot) or a requirement that any profits be reinvested back into the care facilities (Reinvestitionsgebot).

4\. Alternative Models of Care

     - The video also presented an example from England where a multi-generational housing model is being used successfully, integrating children's daycare with eldercare in one location. This approach promotes intergenerational interaction and learning, providing benefits for both young and old alike.

5\. Optimism for the Future of Elderly Care

     - Despite the many challenges discussed, there was a sense of optimism among the participants about the potential for change and improvement in the future. They highlighted the increased awareness and interest in these issues brought on by events like the COVID-19 pandemic, as well as ongoing efforts to address them through policy changes and grassroots movements.

In conclusion, this video provided a comprehensive look at the current
state of elderly care in Germany, highlighting both its challenges and
potential solutions. It featured insights from experts and individuals
with personal experience in caring for loved ones, offering viewers a
multifaceted understanding of the issue. The discussion also underscored
the importance of community support and innovative models of care in
addressing the needs of an aging population.

------------------------------------------------------------------------




