Bob’s Guns is an excellent track by Ludique.

she/her

  • 1 Post
  • 231 Comments
Joined 2 years ago
cake
Cake day: March 31st, 2022

help-circle











  • I want to dispel a myth here. There is generally no advantage for trans women in almost all sports. If you know trans women you know that almost all of us are not athletic at all. And those of us that are have a significantly lower VO2 max than cis women athletes. When trans women are allowed to compete as women we do not see an unusually high win rate and we usually lose. Trans women were mostly allowed to compete in the Olympics for a while and have never won a medal. The whole notion that trans women have a biological advantage in sports is nothing but absurdity and transmisogyny and does not have any basis in reality. And even if we do win, or even do better than last place, people act as if the sky is falling. It is not the end of the world if a woman wins because she had a biological advantage in the biological advantage measuring contests.






  • It’s a mix network and it hides it from not just your ISP but from peers as well. This is a little simplified, but how you typically get caught torrenting without a VPN is that someone from the movie company tries to connect to peers on a torrent. They then send complaints to whoever provides internet for the IP address that is seen. This is why lists of blocked IP addresses can be used with torrenting. They don’t connect to clients who are known to do this. Private trackers work by vetting and keeping out the movie people, which is pretty effective. A VPN obscures this by showing them the IP address of the VPN instead of your own IP address that’s linked to your ISP. I2P breaks up your traffic into chunks and sends those chunks through randomized routes of other people using I2P. Those chunks get together again at the other end but to identify the person who sent them would require you to compromise every other person along the route of the chunk. There are some things you can do to analyze the traffic and correlate input to the network with output from the network if you’re a nation state level attacker but movie studios don’t have that kind of capability. That means that I2P gives you anonymity that you just can’t get from a block list, a private tracker, or a VPN. The downside is that it’s slow, computationally intensive, and there’s a limited selection.