oursin: hedgehog in santa hat saying bah humbug (Default)
oursin ([personal profile] oursin) wrote2025-12-18 09:41 am

(no subject)

Hasppy birthday, [personal profile] nomeancity!
slacktivist ([syndicated profile] slacktivist_feed) wrote2025-12-17 08:54 pm

Have fun storming the castle!

Posted by Fred Clark

Some storytellers leave a legacy of great art that is admired and respected. Rob Reiner leaves behind a host of stories that we simply love -- stories that make us happy. That's great art too.
rydra_wong: Lee Miller photo showing two women wearing metal fire masks in England during WWII. (Default)
rydra_wong ([personal profile] rydra_wong) wrote2025-12-17 09:29 pm
Entry tags:

Okay so more context

(Re: the previous entry.)

Dragonslayer Ornstein & Executioner Smough (also known as Oreo and S'mores, Biggie and Smalls, Pikachu and Snorlax, Rodgers and Hammerstein, and any other name the fandom can come up with) are one of the most iconic boss fights in the entire Dark Souls series.

There are much harder ones in later games (and in the DLC), but they're still legendary and still regarded as a Serious boss fight.

They're also a famous mid-game difficulty spike and cause of rage quitting. Conversely, if you can get through O&S, people often say you should have the skills to beat the rest of the base game.

The major issue is that it's a duo boss fight, with one agile speedster (Ornstein) who can zip most of the way across the room in a single move, and also throws lightning, and one heavyweight bruiser (Smough) who is slower but not that slow -- he has a charge attack to close distance fast that hits like a freight train -- and does huge amounts of damage.

So for the first phase of the fight, you have to try to keep track of where they both are simultaneously (not to mention where you are in relation to the room, so you don't back yourself into a corner and get trapped) and constantly manoeuvre to try to be able to get in a hit on one without being hit by the other.

If you kill one of them, the fight goes into a second phase where the surviving one absorbs some of their powers (so if it's Smough, he gets lightning, while if it's Ornstein he gets sized up and picks up part of Smough's moveset) and also restarts with a full and vastly increased health bar. Though there is a general consensus that the second phase is more manageable than the first phase simply because you're not having to fight two bosses at the same time.

Illustrative example of someone doing the fight:



(You can summon an NPC or other human players to try to help you, but the bosses get extra health to compensate and it's still tough. And also I have been having enormous fun trying to beat all the bosses without summons so far, and am averse to the extra complications and unpredictability of having more people -- human or NPC -- in the mix while I try to figure out a fight. Though I've also had enormous fun being a summons for other people on boss fights, so zero disrespect to people summoning*, it's an excellent game mechanic.)

As I may have mentioned once or twice, my brain has huge difficulty tracking multiple moving objects (which is why I can't drive or cycle on the road) and I have the reaction speed of a slime mould.

So yeah. I knew O&S are the big mid-game stopper and I was very aware that this could potentially be the point where I hit a wall and the game became flatly impossible for me. Or at least where I'd have to summon to get through it.

And that did not happen. I solo-ed O&S.

It took multiple sessions over multiple days before I mastered it, but that's standard for me on DS boss fights. And I had SO MUCH FUN. It's SUCH A COOL FIGHT.

I did a thing that was a real achievement for me and I am very proud, and especially given the shitshow this year has been, I'll take it.

{*Necessary disclaimer only because Dark Souls fandom has historically had a section who are toxic as fuck and would like you to know that you didn't really beat the game if you summoned or used magic or whatthefuckever else they disapprove of.}
oursin: Photograph of small impressionistic metal figurine seated reading a book (Reader)
oursin ([personal profile] oursin) wrote2025-12-17 07:33 pm

Wednesday says Happy 319th Birthday, Emilie du Chatelet!

What I read

Finished Audrey Lane Stirs the Pot - teensy pedantic note that a girl who was a teenage WW2 evacuee was not going to have been called Doris after Doris Day.

I read a couple more nostalgic (I literally read these when I was still at school) Elswyth Thanes (also the ebooks are v cheap), This Was Tomorrow (1951) and Homing (1957), and apart from a couple of fortunately brief scenes in Williamsburg (I get the impression is being done up as Heritage Site with Rockefeller dough?) set in England/Europe just before and at beginning of WW2. Apart from the 2 idealistic Oxford Groupers (it's not actually named but it sounds very like) who want to shed love and light on the Nazis, nobody is for appeasement. So unlike e.g. Lanny Budd's first wife and her second (Brit aristo) husband.... There is also weird reincarnation theme going on.

Latest Literary Review.

Some while ago I was looking for my copy of The Goblin Emperor and it was not in any of the places I thought it plausibly might be and then I spotted it while dusting the bookshelves in a non-intuitive spot and have been re-reading that. Have also read the online short story Min Zemerin's Plan (The Cemeteries of Amalo, #1.5) (2022), which I hadn't come across before, and re-read The Orb of Cairado (The Chronicles of Osreth, #1.1) (2025). Does anyone know how I can get access to Lora Selezh (The Cemeteries of Amalo, #0.5), which was apparently a freebie for preorders of the Tor edition of Witness for the Dead???

On the go

Have started Dickon Edwards, Diary at the Centre of the Earth: Vol. 1 (1997-2007) (2025) - possibly a dipper-inner rather than a read straight through, though sometimes diaries that one thinks this about grab one like the Ancient Mariner, I'm looking at you Mr Isherwood.

Up Next

As may seem predictable, I am on to a re-read of Katherine Addison's Cemeteries of Amalo trilogy.

I should probably also be turning my attention to Dorothy Richardson, Pointed Roofs, for the Pilgrimage online book group discussion in early Jan.

Deeplinks ([syndicated profile] eff_feed) wrote2025-12-17 06:46 pm

The Breachies 2025: The Worst, Weirdest, Most Impactful Data Breaches of the Year

Posted by ARRAY(0x5617f66826f8)

Another year has come and gone, and with it, thousands of data breaches that affect millions of people. The question these days is less, Is my information in a data breach this year? and more How many data breaches had my information in them this year? 

Some data breaches are more noteworthy than others. Where one might affect a small number of people and include little useful information, like a name or email address, others might include data ranging from a potential medical diagnosis to specific location information. To catalog and talk about these breaches we created the Breachies, a series of tongue-in-cheek awards, to highlight the most egregious data breaches. 

In most cases, if these companies practiced a privacy first approach and focused on data minimization, only collecting and storing what they absolutely need to provide the services they promise, many data breaches would be far less harmful to the victims. But instead, companies gobble up as much as they can, store it for as long as possible, and inevitably at some point someone decides to poke in and steal that data. Once all that personal data is stolen, it can be used against the breach victims for identity theft, ransomware attacks, and to send unwanted spam. It has become such a common occurrence that it’s easy to lose track of which breaches affect you, and just assume your information is out there somewhere. Still, a few steps can help protect your information.

With that, let’s get to the awards.

The Winners

The Say Something Without Saying Anything Award: Mixpanel

We’ve long warned that apps delivering your personal information to third-parties, even if they aren’t the ad networks directly driving surveillance capitalism, presents risks and a salient target for hackers. The more widespread your data, the more places attackers can go to find it. Mixpanel, a data analytics company which collects information on users of any app which incorporates its SDK, suffered a major breach in November this year. The service has been used by a wide array of companies, including the Ring Doorbell App, which we reported on back in 2020 delivering a trove of information to Mixpanel, and PornHub, which despite not having worked with the company since 2021, had its historical record of paying subscribers breached.    

There’s a lot we still don’t know about this data breach, in large part because the announcement about it is so opaque, leaving reporters with unanswered questions about how many were affected, if the hackers demanded a ransom, and if Mixpanel employee accounts utilized standard security best practices. One thing is clear, though: the breach was enough for OpenAI to drop them as a provider, disclosing critical details on the breach in a blog post that Mixpanel’s own announcement conveniently failed to mention.

The worst part is that, as a data analytics company providing libraries which are included in a broad range of apps, we can surmise that the vast majority of people affected by this breach have no direct relationship with Mixpanel, and likely didn’t even know that their devices were delivering data to the company. These people deserve better than vague statements by companies which profit off of (and apparently insufficiently secure) their data.

The We Still Told You So Award: Discord

Last year, AU10TIX won our first The We Told You So Award because as we predicted in 2023, age verification mandates would inevitably lead to more data breaches, potentially exposing government IDs as well as information about the sites that a user visits. Like clockwork, they did. It was our first We Told You So Breachies award, but we knew it wouldn’t be the last. 

Unfortunately, there is growing political interest in mandating identity or age verification before allowing people to access social media or adult material. EFF and others oppose these plans because they threaten both speech and privacy

Nonetheless, this year’s winner of The We Still Told You So Breachies Award is the messaging app, Discord — once known mainly for gaming communities, it now hosts more than 200 million monthly active users and is widely used to host fandom and community channels. 

In September of this year, much of Discord’s age verification data was breached — including users’ real names, selfies, ID documents, email and physical addresses, phone numbers, IP addresses, and other contact details or messages provided to customer support. In some cases, “limited billing information” was also accessed—including payment type, the last four digits of credit card numbers, and purchase histories. 

Technically though, it wasn’t Discord itself that was hacked but their third-party customer support provider — a company called Zendeskthat was compromised, allowing attackers to access Discord’s user data. Either way, it’s Discord users who felt the impact. 

The Tea for Two Award: Tea Dating Advice and TeaOnHer

Speaking of age verification, Tea, the dating safety app for women, had a pretty horrible year for data breaches. The app allows users to anonymously share reviews and safety information about their dates with men—helping keep others safe by noting red flags they saw during their date.

Since Tea is aimed at women’s safety and dating advice, the app asks new users to upload a selfie or photo ID to verify their identity and gender to create an account. That’s some pretty sensitive information that the app is asking you to trust it with! Back in July, it was reported that 72,000 images had been leaked from the app, including 13,000 images of photo IDs and 59,000 selfies. These photos were found via an exposed database hosted on Google’s mobile app development platform, Firebase. And if that isn’t bad enough, just a week later a second breach exposed private messages between users, including messages with phone numbers, abortion planning, and discussions about cheating partners. This breach included more than 1.1 million messages from early 2023 all the way to mid-2025, just before the breach was reported. Tea released a statement shortly after, temporarily disabling the chat feature.

But wait, there’s more. A completely different app based on the same idea, but for men, also suffered a data breach. TeaOnHer failed to protect similar sensitive data. In August, TechCrunch discovered that user information — including emails, usernames, and yes, those photo IDs and selfies — was accessible through a publicly available web address. Even worse? TechCrunch also found the email address and password the app’s creator uses to access the admin page.

Breaches like this are one of the reasons that EFF shouts from the rooftops against laws that mandate user verification with an ID or selfie. Every company that collects this information becomes a target for data breaches — and if a breach happens, you can’t just change your face. 

The Just Stop Using Tracking Tech Award: Blue Shield of California

Another year, another data breach caused by online tracking tools. 

In April, Blue Shield of California revealed that it had shared 4.7 million people’s health data with Google by misconfiguring Google Analytics on its website. The data, which may have been used for targeted advertising, included: people’s names, insurance plan details, medical service providers, and patient financial responsibility. The health insurance company shared this information with Google for nearly three years before realizing its mistake.

If this data breach sounds familiar, it’s because it is: last year’s Just Stop Using Tracking Tech award also went to a healthcare company that leaked patient data through tracking code on its website. Tracking tools remain alarmingly common on healthcare websites, even after years of incidents like this one. These tools are marketed as harmless analytics or marketing solutions, but can expose people’s sensitive data to advertisers and data brokers. 

EFF’s free Privacy Badger extension can block online trackers, but you shouldn’t need an extension to stop companies from harvesting and monetizing your medical data. We need a strong, federal privacy law and ban on online behavioral advertising to eliminate the incentives driving companies to keep surveilling us online. 

The Hacker's Hall Pass Award: PowerSchool

 In December 2024, PowerSchool, the largest provider of student information systems in the U.S., gave hackers access to sensitive student data. The breach compromised personal information of over 60 million students and teachers, including Social Security numbers, medical records, grades, and special education data. Hackers exploited PowerSchool’s weak security—namely, stolen credentials to their internal customer support portal—and gained unfettered access to sensitive data stored by school districts across the country.

PowerSchool failed to implement basic security measures like multi-factor authentication, and the breach affected districts nationwide. In Texas alone, over 880,000 individuals’ data was exposed, prompting the state's attorney general to file a lawsuit, accusing PowerSchool of misleading its customers about security practices. Memphis-Shelby County Schools also filed suit, seeking damages for the breach and the cost of recovery.

While PowerSchool paid hackers an undisclosed sum to prevent data from being published, the company’s failure to protect its users’ data raises serious concerns about the security of K-12 educational systems. Adding to the saga, a Massachusetts student, Matthew Lane, pleaded guilty in October to hacking and extorting PowerSchool for $2.85 million in Bitcoin. Lane faces up to 17 years in prison for cyber extortion and aggravated identity theft, a reminder that not all hackers are faceless shadowy figures — sometimes they’re just a college kid.

The Worst. Customer. Service. Ever. Award: TransUnion

Credit reporting giant TransUnion had to notify its customers this year that a hack nabbed the personal information of 4.4 million people. How'd the attackers get in? According to a letter filed with the Maine Attorney General's office obtained by TechCrunch, the problem was a “third-party application serving our U.S. consumer support operations.” That's probably not the kind of support they were looking for. 

TransUnion said in a Texas filing that attackers swept up “customers’ names, dates of birth, and Social Security numbers” in the breach, though it was quick to point out in public statements that the hackers did not access credit reports or “core credit data.” While it certainly could have been worse, this breach highlights the many ways that hackers can get their hands on information. Coming in through third-parties, companies that provide software or other services to businesses, is like using an unguarded side door, rather than checking in at the front desk. Companies, particularly those who keep sensitive personal information, should be sure to lock down customer information at all the entry points. After all, their decisions about who they do business with ultimately carry consequences for all of their customers — who have no say in the matter.

The Annual Microsoft Screwed Up Again Award: Microsoft

Microsoft is a company nobody feels neutral about. Especially in the infosec world. The myriad software vulnerabilities in Windows, Office, and other Microsoft products over the decades has been a source of frustration and also great financial rewards for both attackers and defenders. Yet still, as the saying goes: “nobody ever got fired for buying from Microsoft.” But perhaps, the times, they are a-changing. 

In July 2025, it was revealed that a zero-day security vulnerability in Microsoft’s flagship file sharing and collaboration software, SharePoint, had led to the compromise of over 400 organizations, including major corporations and sensitive government agencies such as the National Nuclear Security Administration (NNSA), the federal agency responsible for maintaining and developing the U.S. stockpile of nuclear weapons. The attack was attributed to three different Chinese government linked hacking groups. Amazingly, days after the vulnerability was first reported, there were still thousands of vulnerable self-hosted Sharepoint servers online. 

Zero-days happen to tech companies, large and small. It’s nearly impossible to write even moderately complex software that is bug and exploit free, and Microsoft can’t exactly be blamed for having a zero-day in their code. But when one company is the source of so many zero-days consistently for so many years, one must start wondering whether they should put all their eggs (or data) into a basket that company made. Perhaps if Microsoft’s monopolistic practices had been reined in back in the 1990s we wouldn’t be in a position today where Sharepoint is the defacto file sharing software for so many major organizations. And maybe, just maybe, this is further evidence that tech monopolies and centralization of data aren’t just bad for consumer rights, civil liberties, and the economy—but also for cybersecurity. 

The Silver Globe Award: Flat Earth Sun, Moon & Zodiac

Look, we’ll keep this one short: in October of last year, researchers found security issues in the flat earther app, Flat Earth, Sun, Moon, & Clock. In March of 2025, that breach was confirmed. What’s most notable about this, aside from including a surprising amount of information about gender, name, email addresses and date of birth, is that it also included users’ location info, including latitude and longitude. Huh, interesting.

The I Didn’t Even Know You Had My Information Award: Gravy Analytics

In January, hackers claimed they stole millions of people’s location history from a company that never should’ve had it in the first place: location data broker Gravy Analytics. The data included timestamped location coordinates tied to advertising IDs, which can reveal exceptionally sensitive information. In fact, researchers who reviewed the leaked data found it could be used to identify military personnel and gay people in countries where homosexuality is illegal

The breach of this sensitive data is bad, but Gravy Analytics’s business model of regularly harvesting and selling it is even worse. Despite the fact that most people have never heard of them, Gravy Analytics has managed to collect location information from a billion phones a day. The company has sold this data to other data brokers, makers of police surveillance tools, and the U.S. government

How did Gravy Analytics get this location information from people’s phones? The data broker industry is notoriously opaque, but this breach may have revealed some of Gravy Analytics’ sources. The leaked data referenced thousands of apps, including Microsoft apps, Candy Crush, Tinder, Grindr, MyFitnessPal, pregnancy trackers and religious-focused apps. Many of these app developers said they had no relationship with Gravy Analytics. Instead, expert analysis of the data suggests it was harvested through the advertising ecosystem already connected to most apps. This breach provides further evidence that online behavioral advertising fuels the surveillance industry

Whether or not they get hacked, location data brokers like Gravy Analytics threaten our privacy and security. Follow EFF’s guide to protecting your location data and help us fight for legislation to dismantle the data broker industry. 

The Keeping Up With My Cybertruck Award: Teslamate

TeslaMate, a tool meant to track Tesla vehicle data (but which is not owned or operated by Tesla itself), has become a cautionary tale about data security. In August, a security researcher found more than 1,300 self-hosted TeslaMate dashboards were exposed online, leaking sensitive information such as vehicle location, speed, charging habits, and even trip details. In essence, your Cybertruck became the star of its own Keeping Up With My Cybertruck reality show, except the audience wasn’t made up of fans interested in your lifestyle, just random people with access to the internet.

TeslaMate describes itself as “that loyal friend who never forgets anything!” — but its lack of proper security measures makes you wish it would. This breach highlights how easily location data can become a tool for harassment or worse, and the growing need for legislation that specifically protects consumer location data. Without stronger regulations around data privacy, sensitive location details like where you live, work, and travel can easily be accessed by malicious actors, leaving consumers with no recourse.

The Disorder in the Courts Award: PACER

Confidentiality is a core principle in the practice of law. But this year a breach of confidentiality came from an unexpected source: a breach of the federal court filing system. In August, Politico reported that hackers infiltrated the Case Management/Electronic Case Files (CM/ECF) system, which uses the same database as PACER, a searchable public database for court records. Of particular concern? The possibility that the attack exposed the names of confidential informants involved in federal cases from multiple court districts. Courts across the country acted quickly to set up new processes to avoid the possibility of further compromises.

The leak followed a similar incident in 2021 and came on the heels of a warning to Congress that the file system is more than a little creaky. In fact, an IT official from the federal court system told the House Judiciary Committee that both systems are “unsustainable due to cyber risks, and require replacement.”

The Only Stalkers Allowed Award: Catwatchful

Just like last year, a stalkerware company was subject to a data breach that really should prove once and for all that these companies must be stopped. In this case, Catwatchful is an Android spyware company that sells itself as a “child monitoring app.” Like other products in this category, it’s designed to operate covertly while uploading the contents of a victim’s phone, including photos, messages, and location information.

This data breach was particularly harmful, as it included not just the email addresses and passwords on the customers who purchased the app to install on a victim’s phone, but also the data from the phones of 26,000 victims’ devices, which could include the victims’ photos, messages, and real-time location data.

This was a tough award to decide on because Catwatchful wasn’t the only stalkerware company that was hit this year. Similar breaches to SpyX, Cocospy, and Spyic were all strong contenders. EFF has worked tirelessly to raise the alarm on this sort of software, and this year worked with AV Comparatives to test the stalkerware detection rate on Android of various major antivirus apps.

The Why We’re Still Stuck on Unique Passwords Award: Plex

Every year, we all get a reminder about why using unique passwords for all our accounts is crucial for protecting our online identities. This time around, the award goes to Plex, who experienced a data breach that included customer emails, usernames, and hashed passwords (which is a fancy way of saying passwords are scrambled through an algorithm, but it is possible they could still be deciphered).

If this all sounds vaguely familiar to you for some reason, that’s because a similar issue also happened to Plex in 2022, affecting 15 million users. Whoops.

This is why it is important to use unique passwords everywhereA password manager, including one that might be free on your phone or browser, makes this much easier to do. Likewise, credential stuffing illustrates why it’s important to use two-factor authentication. Here’s how to turn that on for your Plex account.

The Uh, Yes, Actually, I Have Been Pwned Award: Troy Hunt’s Mailing List

Troy Hunt, the person behind Have I Been Pwned? and who has more experience with data breaches than just about anyone, also proved that anyone can be pwned. In a blog post, he details what happened to his mailing list:

You know when you're really jet lagged and really tired and the cogs in your head are just moving that little bit too slow? That's me right now, and the penny has just dropped that a Mailchimp phish has grabbed my credentials, logged into my account and exported the mailing list for this blog.

And he continues later:

I'm enormously frustrated with myself for having fallen for this, and I apologise to anyone on that list. Obviously, watch out for spam or further phishes and check back here or via the social channels in the nav bar above for more.

The whole blog is worth a read as a reminder that phishing can get anyone, and we thank Troy Hunt for his feedback on this and other breaches to include this year.

Tips to Protect Yourself

Data breaches are such a common occurrence that it’s easy to feel like there’s nothing you can do, nor any point in trying. But privacy isn’t dead. While some information about you is almost certainly out there, that’s no reason for despair. In fact, it’s a good reason to take action.

There are steps you can take right now with all your online accounts to best protect yourself from the the next data breach (and the next, and the next):

  • Use unique passwords on all your online accounts. This is made much easier by using a password manager, which can generate and store those passwords for you. When you have a unique password for every website, a data breach of one site won’t cascade to others.
  • Use two-factor authentication when a service offers it. Two-factor authentication makes your online accounts more secure by requiring additional proof (“factors”) alongside your password when you log in. While two-factor authentication adds another step to the login process, it’s a great way to help keep out anyone not authorized, even if your password is breached.
  • Delete old accounts: Sometimes, you’ll get a data breach notification for an account you haven’t used in years. This can be a nice reminder to delete that account, but it’s better to do so before a data breach happens, when possible. Try to make it a habit to go through and delete old accounts once a year or so. 
  • Freeze your credit. Many experts recommend freezing your credit with the major credit bureaus as a way to protect against the sort of identity theft that’s made possible by some data breaches. Freezing your credit prevents someone from opening up a new line of credit in your name without additional information, like a PIN or password, to “unfreeze” the account. This might sound absurd considering they can’t even open bank accounts, but if you have kids, you can freeze their credit too.
  • Keep a close eye out for strange medical bills. With the number of health companies breached this year, it’s also a good idea to watch for healthcare fraud. The Federal Trade Commission recommends watching for strange bills, letters from your health insurance company for services you didn’t receive, and letters from debt collectors claiming you owe money. 

(Dis)Honorable Mentions

According to one report, 2025 had already seen 2,563 data breaches by October, which puts the year on track to be one of the worst by the sheer number of breaches.

We did not investigate every one of these 2,500-plus data breaches, but we looked at a lot of them, including the news coverage and the data breach notification letters that many state Attorney General offices host on their websites. We can’t award the coveted Breachies Award to every company that was breached this year. Still, here are some (dis)honorable mentions we wanted to highlight:

Salesforce, F5, Oracle, WorkComposer, Raw, Stiizy, Ohio Medical Alliance LLC, Hello Cake, Lovense, Kettering Health, LexisNexis, WhatsApp, Nexar, McDonalds, Congressional Budget Office, Doordash, Louis Vuitton, Adidas, Columbia University, Hertz, HCRG Care Group, Lexipol, Color Dating, Workday, Aflac, and Coinbase. And a special nod to last minute entrants Home Depot, 700Credit, and Petco.

What now? Companies need to do a better job of only collecting the information they need to operate, and properly securing what they store. Also, the U.S. needs to pass comprehensive privacy protections. At the very least, we need to be able to sue companies when these sorts of breaches happen (and while we’re at it, it’d be nice if we got more than $5.21 checks in the mail). EFF has long advocated for a strong federal privacy law that includes a private right of action.

muccamukk: Brick red background, text: We're here. We're queer. I have a brick. (Misc: Queer Brick)
Muccamukk ([personal profile] muccamukk) wrote2025-12-17 09:35 am

Reading Wednesday, the Dog Days of Summer Edition

These are probably going to be short and sweet, given I read them in late August through September. I'll hopefully catch up to where I am now by the time next term starts, and I go back to only reading stuff for school. Expect a bunch of books about gender, followed by all the romance novels I read on my off time, lol.


Sunrise on the Reaping by Suzanne Collins, narrated by Jefferson White
I had only the vaguest memories of the account of Haymitch's games from Catching Fire, or anything else from Catching Fire, for that matter. I never did read the other prequel. If Haymitch is one of your favourite characters, and you just want backstory on all the olds who show up later in the original series, this is solid fun. Collins did a good job of thinking through where everyone came from, and how they got like they are when Katniss meets them. Effee showing up is especially fun. We also get confirmation of several queer characters (which I assume she wasn't allowed to do in 2008), and an interesting note about the Capital banning generative A.I..

I enjoyed all the themes of the amount of groundwork needed to put into a revolution, and how the lives of the people in this story eventually led to the events of the first books. Especially how the characters themselves feel like they've failed and wasted everything, but the reader can tell how it's more a process of (horribly) figuring out what works and what doesn't.

At the same time, it didn't feel like a story of only moving pieces into place for the "real story" that will start later. It certainly doesn't read as a stand alone novel, but it does stand up as being about these characters in this moment. Haymitch is such a sweet kid when we first meet him, and is a bit more of a dynamic lead than Katniss (i.e., he actually likes people and wants to talk to them), and given the pile of characters we meet for the first time (because these games have twice the number of tributes), each of the new people get enough development for the reader to become least somewhat invested in what happens to them (spoiler alert: it's the Hunger Games, so...).

I always found the games themselves the least interesting part of the earlier books, which is largely true here as well, but the story still moves along pretty fast. They probably would've been more interesting if I remembered what the story was supposed to be, as Collins puts a lot into the contrasts and surprises. The post-games section did draaaaaaaaaaaaag though. Especially the recap of the games we'd just read about, and the part that was set up as this huge poetic tragedy. I think if you're like... 14, you'd be weeping through the end, but I found it overdone, and thought her editor should've made her stop.

Still, I'm happy to have read it.


The Hunger Games by Suzanne Collins
I hadn't read these in fifteen years, so I thought I'd swing back through to remember what we were supposed to know about all the characters we met in the prequel. Enjoyed it. Games still dragged.

Catching Fire by Suzanne Collins
So most of the characters from Haymitch's book actually show up here, it turns out. So I read this one. Enjoyed this too, though found the games section dragged a bit. The love triangle continues obnoxious, and I did myself the favour of not reading Mockingjay again.


On Tyranny: Twenty Lessons from the Twentieth Century by Timothy Snyder
I've been hearing bits of this quoted since it came out, and it's quite good. I think the target is more people involved in public life, but it was still good to listen to, these being the times that were given to us. I know it's his area, but I wish there had been more examples from autocracies other than 1930s Germany, for the sake of variety, if nothing else (there were a handful of comparisons from the Soviet bloc, but it was very Nazi centric).

I think it's on YouTube for free, if anyone wants to listen. I'll probably go back to it later, so that I take more on board.


Rainbow heart sticker Transforming: The Bible and the Lives of Transgender Christians by Austen Hartke
Solid primer if you're interested in the a gender-diverse approach to Christian theology. Hartke talks to a variety of other trans and non-binary Christians, especially those involved in ministry, about their relationship with God and the Bible. Each chapter focuses on a few lines of scripture, which are largely clobber verses, and discusses how they can be seen as trans affirming. It's really beautifully expressed, and thoughtfully takes on some difficult parts of the Bible. Hartke does talk about how frustrating it is to feel like he has to spend so much time justifying himself and talking about the clobber verses, when he just wants to talk about religious gender euphoria. He's since put out a second edition, which might refine that approach, but I haven't looked at that yet. I really appreciated this edition is an intro, however, and helped me put together a church service for Trans Day of Remembrance.
Deeplinks ([syndicated profile] eff_feed) wrote2025-12-15 10:09 pm

Trends to Watch in the California Legislature

Posted by Hayley Tsukayama

If you’re a Californian, there are a few new state laws that you should know will be going into effect in the new year. EFF has worked hard in Sacramento this session to advance bills that protect privacy, fight surveillance, and promote transparency.

California’s legislature runs in a two-year cycle, meaning that it’s currently halftime for legislators. As we prepare for the next year of the California legislative session in January, it’s a good time to showcase what’s happened so far—and what’s left to do.

Wins Worth Celebrating

In a win for every Californian’s privacy rights, we were happy to support A.B. 566 (Assemblymember Josh Lowenthal). This is a common-sense law that makes California’s main consumer data privacy law, the California Consumer Privacy Act, more user-friendly. It requires that browsers support people’s rights to send opt-out signals, such as the global opt-out in Privacy Badger, to businesses. Managing your privacy as an individual can be a hard job, and EFF wants stronger laws that make it easier for you to do so.

Additionally, we were proud to advance government transparency by supporting A.B. 1524 (Judiciary Committee), which allows members of the public to make copies of public court records using their own devices, such as cell-phone cameras and overhead document scanners, without paying fees.

We also supported two bills that will improve law enforcement accountability at a time when we desperately need it. S.B. 627 (Senator Scott Wiener) prohibits law enforcement officers from wearing masks to avoid accountability (The Trump administration has sued California over this law). We also supported S.B. 524 (Asm. Jesse Arreguín), which requires law enforcement to disclose when a police report was written using artificial intelligence.

On the To-Do List for Next Year

On the flip side, we also stopped some problematic bills from becoming law. This includes S.B. 690 (Sen. Anna Caballero), which we dubbed the Corporate Coverup Act. This bill would have gutted California’s wiretapping statute by allowing businesses to ignore those privacy rights for “any business purpose.” Working with several coalition partners, we were able to keep that bill from moving forward in 2025. We do expect to see it come back in 2026, and are ready to fight back against those corporate business interests.

And, of course, not every fight ended in victory. There are still many areas where we have work left to do. California Governor Gavin Newsom vetoed a bill we supported, S.B. 7, which would have given workers in California greater transparency into how their employers use artificial intelligence and was sponsored by the California Federation of Labor Unions. S.B. 7  was vetoed in response to concerns from companies including Uber and Lyft, but we expect to continue working with the labor community on the ways AI affects the workplace in 2026.

Trends of Note

California continued a troubling years-long trend of lawmakers pushing problematic proposals that would require every internet user to verify their age to access information—often by relying on privacy-invasive methods to do so. Earlier this year EFF sent a letter to the California legislature expressing grave concerns with lawmakers’ approach to regulating young people’s ability to speak online. We continue to raise these concerns, and would welcome working with any lawmaker in California on a better solution.

We also continue to keep a close eye on government data sharing. On this front, there is some good news. Several of the bills we supported this year sought to place needed safeguards on the ways various government agencies in California share data. These include: A.B. 82 (Asm. Chris Ward) and S.B. 497 (Wiener), which would add privacy protections to data collected by the state about those who may be receiving gender-affirming or reproductive health care; A.B. 1303 (Asm. Avelino Valencia), which prohibits warrantless data sharing from California’s low-income broadband program to immigration and other government officials; and S.B. 635 (Sen. Maria Elena Durazo), which places similar limits on data collected from sidewalk vendors.

We are also heartened to see California correct course on broad government data sharing. Last session, we opposed A.B. 518 (Asm. Buffy Wicks), which let state agencies ignore existing state privacy law to allow broader information sharing about people eligible for CalFresh—the state’s federally funded food assistance program. As we’ve seen, the federal government has since sought data from food assistance programs to use for other purposes. We were happy to have instead supported A.B. 593 this year, also authored by Asm. Wicks—which reversed course on that data sharing.

We hope to see this attention to the harms of careless government data sharing continue. EFF’s sponsored bill this year, A.B. 1337, would update and extend vital privacy safeguards present at the state agency level to counties and cities. These local entities today collect enormous amounts of data and administer programs that weren’t contemplated when the original law was written in 1977. That information should be held to strong privacy standards.

We’ve been fortunate to work with Asm. Chris Ward, who is also the chair of the LGBTQ Caucus in the legislature, on that bill. The bill stalled in the Senate Judiciary Committee during the 2025 legislative session, but we plan to bring it back in the next session with a renewed sense of urgency.

oursin: Photograph of a statue of Hygeia, goddess of health (Hygeia)
oursin ([personal profile] oursin) wrote2025-12-16 07:49 pm

Maybe seeing some connections?

I will concede that this piece on sperm donation is not about dodgy docs or freelance 'donors' but it still all sounds fairly spooky: Why are sperm donors having hundreds of children? Because while, okay, some criteria seem reasonable:

Rules vary across the world, but in the UK you also have to be relatively young - aged 18-45; be free of infections like HIV and gonorrhoea, and not be a carrier of mutations that can cause genetic conditions like cystic fibrosis, spinal muscular atrophy and sickle cell disease.

Errrr: don't I recollect seeing somewhere that the gene that conveys sickle cell, is actually protective against ?malaria so it was/is actually beneficial in certain environments - and it was like haemophilia that you had to get it from both sides for the dangers to show up?
From this small pool of donors, some men's sperm is just more popular than others.
Donors are not chosen at random. It's a similar process to the savage reality of dating apps, when some men get way more matches than others.... "You know if they're called Sven and they've got blonde hair, and they're 6 ft 4 (1.93m) and they're an athlete, and they play the fiddle and speak seven languages - you know that's far more attractive than a donor that looks like me," says male fertility expert Prof Allan Pacey, pictured, who used to run a sperm bank in Sheffield.

And how much of that is down to environment, hmmmmm? Or at least, non-genetic factors.

I am over here muttering 'Morlock Power!'

On men spreading it about, historically speaking: the challenges of illegitimacy when exploring genealogy and how to find that shadowy figure who is not on the birth certificate/in the baptismal register. (With luck he had a bastard sworn upon him when that was a thing, otherwise it's a lot more work and a lot of surmising.)

Let's blame the woman, let's let's let's, she probably did something wrong: Marked: Birthmarks and Historical Myths of Maternal Responsibility - which just mutatates and mutates, no?

A conversation with historian Dagmar Herzog on Fascism’s Body Politics and disability under fascism in her new book, The New Fascist Body

And I think relating to all these sorts of issues: Reproductive norms: stigma and disruptions in family-building:

Our expectations of conception, reproduction, and family-building are imbued with reproductive norms. In our younger years, we may imagine and expect that we will have a certain number of children at specific ages or points in the life-course, and in particular circumstances. We may think that conception will be straightforward, pregnancy will pass without complications, and our children will be healthy and without disabilities or impairments. We may have hazy, dreamy ideas of what our children will be like and perhaps more defined ideas of what we will be like as parents.

Deeplinks ([syndicated profile] eff_feed) wrote2025-12-16 05:44 pm

🪪 Age Verification Is Coming for the Internet | EFFector 37.18

Posted by Christian Romero

The final EFFector of 2025 is here! Just in time to keep you up-to-date on the latests happenings in the fight for privacy and free speech online.

In this latest issue, we're sharing how to spot sneaky ALPR cameras at the U.S. border, covering a host of new resources on age verification laws, and explaining why AI companies need to protect chatbot logs from bulk surveillance.

Prefer to listen in? Check out our audio companion, where EFF Activist Molly Buckley explains our new resource explaining age verification laws and how you can fight back. Catch the conversation on YouTube or the Internet Archive.

LISTEN TO EFFECTOR

EFFECTOR 37.18 - 🪪 AGE VERIFICATION IS COMING FOR THE INTERNET

Since 1990 EFF has published EFFector to help keep readers on the bleeding edge of their digital rights. We know that the intersection of technology, civil liberties, human rights, and the law can be complicated, so EFFector is a great way to stay on top of things. The newsletter is chock full of links to updates, announcements, blog posts, and other stories to help keep readers—and listeners—up to date on the movement to protect online privacy and free expression. 

Thank you to the supporters around the world who make our work possible! If you're not a member yet, join EFF today to help us fight for a brighter digital future.

seekingferret: Two warning signs one above the other. 1) Falling Rocks. 2) Falling Rocs. (Default)
seekingferret ([personal profile] seekingferret) wrote2025-12-16 10:32 am
Entry tags:

(no subject)

Oy to the World

I did not have high expectations for this year's Hallmark Hannukah movie and this about lived up to my expectations.

When Jake, Rabbi's son, and Nikki, Reverend's daughter, were teenagers, they were inseparable best friends, until high school academics made them rivals and brought out a dysregulated competitive streak in both that ruptured the friendship.

As grownups, they both seem to live stunted lives. Nicki appears to have zero adult friends and works at her father's small church as children's choir director. Jake has spent 20 years playing tiny NYC rock clubs and chasing a label signing (in 2025!) and refusing to visit his henpecking mother.

When the temple has a fire the week before Hannukah, the church invites their Jewish neighbors to make use of the church space to celebrate Hanukkah. This soon bizarrely evolves into a joint Chrismukkah with combined sermon ("Both Hanukkah and Christmas are about love," natch) and combined choir concert, as Jake and Nikki are guilted and manipulated into co-choir directing by their pandering parents.

The Chrismukkah merger is eerily frictionless. The movie is not at all interested in interrogating the reasons why Hanukkah and Christmas are distinct observances or exploring how Jewish people and Christian people are different and approach the world differently. Religion is represented as a sort of universal fiber, with the different versions no different than a comic book with variant covers.

This lack of friction extends to the film's romantic chemistry. Jake Epstein and Brooke D'Orsay are charming actors and it's clear that their characters like each other, but because all their seeming differences resolve so simply, we don't see their relationship really deepen. Everyone in both families is on board with intermarriage, nobody discusses what religion future children will be raised in, everything is just easy. At worst, Nikki is briefly confronted at dinner eith the fact that if she marries Jake, her mother in law will be the worst version of a stereotypical Jewish mother in law, but this is quickly papered over. Even the inevitable, overforeshadowed moment where Jake has to miss the concert to go back to New York and meet with a label is resolved without any argument, and doesn't actually force Jake to compromise. Surprise! Turns out he can make it to the concert after all, without missing his meeting.

Hallmark really fooled us with Round and Round. The past two years have been a reversion to the nonsense we used to get in Hallmark Hanukkah movies. I will continue to watch them, of course, but I am back to watching them with gritted teeth.
rydra_wong: Lee Miller photo showing two women wearing metal fire masks in England during WWII. (Default)
rydra_wong ([personal profile] rydra_wong) wrote2025-12-16 11:19 am
Entry tags:

So

... I just beat Ornstein and Smough.

For anyone who would like context -- Symbalily meets and gets to grips with O&S, from the timestamp: https://youtu.be/3TKhwbveyVE?si=14uuwYlVq1ywUwRk&t=5681
muccamukk: Stacker and Mako evaluating candidates. (Pac Rim: Grading)
Muccamukk ([personal profile] muccamukk) wrote2025-12-15 10:11 pm

Finally Updated My Media Tracker

Which included a bunch of American Political movies, watches/rewatches of said being inspired in part by current events.

Dave and Independence Day: When the East Wing got it, in memory of the White House, and a time when we expected presidents to be non-terrible, or at least rational. Also, Nenya hadn't seen them.

Good Night and Good Luck: Following Keith Olbermann turning out to be the real villain in the Olivia Nuzzi scandal, and me remembering that even when I agreed with his takes (circa the Bush administration), I thought he had a hell of a lot of nerve to use that sign off. Also, Nenya hadn't seen it. Also, I couldn't find a good quality copy of the 1986 biopic I grew up watching (though I see there's a passible one on YouTube).

A Few Good Men: Because a man made a lot of art that mattered to a lot of people, and that should still mean something. Also, I'd never seen it.
slacktivist ([syndicated profile] slacktivist_feed) wrote2025-12-15 10:34 pm
oursin: Fotherington-Tomas from the Molesworth books saying Hello clouds hello aky (fotherington-tomas)
oursin ([personal profile] oursin) wrote2025-12-15 07:44 pm

Okay, nobody has entered the beaver lodges to check for sewing machines - yet

[F]irst wild beaver spotted in Norfolk in 500 years and Wild beavers may have spread further than we realise:

It is not clear whether the Pensthorpe beaver, whose sex and age is unknown, was illegally released into the reserve by activists using a practice known as beaver bombing. It is possible it wandered of its own accord into the Wensum – an aquifer-fed chalk river whose name is derived from the Old English adjective for “wandering”.
“It could be a naturally dispersing wild beaver,” said Emily Bowen, a spokesperson for the Beaver Trust, a charity that aims to restore beavers to regenerate landscapes. She said that there were established wild populations in eight areas in England at the moment.
Wild beavers have also been spotted in Kent, Hampshire, Somerset, Wiltshire and Hereford, she said. Norfolk has some captive beavers but none have been reported missing.

Maybe it's a sinister beaver underground conspiracy....

And if we are talking aquatic mammals, see also otters: otters’ revival in Britain. Still rare only 20 years ago, the charismatic animals are in almost every UK river and a conservation success story.

White storks to be introduced to, believe it or not, Dagenham.

A rather different story: voyaging owls: Two burrowing owls stowed away on a cruise ship out of Miami, and are now living the high life at a Spanish resort before returning to the US next month. We think they may have been in flight from being a threatened species in Florida....

Deeplinks ([syndicated profile] eff_feed) wrote2025-12-15 12:20 pm

EFF, Open Rights Group, Big Brother Watch, and Index on Censorship Call on UK Government to Reform o

Posted by Paige Collings

Since the Online Safety Act took effect in late July, UK internet users have made it very clear to their politicians that they do not want anything to do with this censorship regime. Just days after age checks came into effect, VPN apps became the most downloaded on Apple's App Store in the UK, and a petition calling for the repeal of the Online Safety Act (OSA) hit over 400,000 signatures. 

In the months since, more than 550,000 people have petitioned Parliament to repeal or reform the Online Safety Act, making it one of the largest public expressions of concern about a UK digital law in recent history. The OSA has galvanized swathes of the UK population, and it’s high time for politicians to take that seriously. 

Last week, EFF joined Open Rights Group, Big Brother Watch, and Index on Censorship in sending a briefing to UK politicians urging them to listen to their constituents and reform or repeal the Online Safety Act ahead of this week’s Parliamentary petition debate on 15 December.

The legislation is a threat to user privacy, restricts free expression by arbitrating speech online, exposes users to algorithmic discrimination through face checks, and effectively blocks millions of people without a personal device or form of ID from accessing the internet. The briefing highlights how, in the months since the OSA came into effect, we have seen the legislation:

  1. Make it harder for not-for-profits and community groups to run their own websites. 
  2. Result in the wrong types of content being taken down.
  3. Lead to age-assurance being applied widely to all sorts of content.

Our briefing continues:

“Those raising concerns about the Online Safety Act are not opposing child safety. They are asking for a law that does both: protects children and respects fundamental rights, including children’s own freedom of expression rights.”

The petition shows that hundreds of thousands of people feel the current Act tilts too far, creating unnecessary risks for free expression and ordinary online life. With sensible adjustments, Parliament can restore confidence that online safety and freedom of expression rights can coexist.

If the UK really wants to achieve its goal of being the safest place in the world to go online, it must lead the way in introducing policies that actually protect all users—including children—rather than pushing the enforcement of legislation that harms the very people it was meant to protect.

Read the briefing in full here.

Update, 17 Dec 2025: this article was edited to include the word reform alongside repeal. 

oursin: hedgehog in santa hat saying bah humbug (Default)
oursin ([personal profile] oursin) wrote2025-12-15 09:29 am

(no subject)

Happy birthday, [personal profile] dancing_moon and [personal profile] sdn!
oursin: Frontispiece from C17th household manual (Accomplisht Lady)
oursin ([personal profile] oursin) wrote2025-12-14 06:30 pm
Entry tags:

Culinary

Last week's bread held out fairly well until it did a variety of mould-related activity. There were still some rolls left, fortunately.

Friday night supper: Gujerati khichchari (with cashew nuts) which I do not seem to have made for absolute yonks.

Saturday breakfast rolls: brown grated apple: Light Spelt flour, molasses, a touch of ginger (this didn't really come through, probably overpowered by the molasses): rose like absolute whoah.

Today's lunch: the smoked haddock and pulses thing - smoked haddock loin fillets baked in cream + water with bay leaf, mace and 5-pepper blend, flaked and then layered with bottled black beans (would buy again), some of the cooking liquid added, top sprinkled with panko crumbs and baked in moderate oven for c. 40 minutes, served with baked San Marzano tomatoes, and slow-cooked tenderstem broccoli, finished with lime, some of which seemed less tenderstemmed than one might have expected.

siderea: (Default)
Siderea ([personal profile] siderea) wrote2025-12-14 08:45 am
Entry tags:

Understanding Health Insurance: The Three-Stage Model [healthcare, US, Patreon]

Canonical link: https://siderea.dreamwidth.org/1891517.html


This is part of Understanding Health Insurance





The Three-Stage Model



When you have health insurance, you have a contract (health plan) with the insurance company that says that for the duration (the plan year) of the contract, you will pay them the agreed upon monthly fee every month (the premium), in exchange for them paying for your health care... some.

How much is "some"? Well, that depends.

To understand what it depends on, you have to understand the three-stage model that health plans are organized around.

This three-stage model is never described as such. It is implicit in the standard terms (jargon) of the health insurance industry, and it is never made explicit. There is no industry term (jargon) for the model itself. There are no terms (jargon) for the three stages. But health insurance becomes vastly easier to understand if you think about it in terms of the three-stage model that is hiding in just about every health plan's terms (agreements).

Read more: 12,170 (sic!) riveting words about health insurance in the US] )

This post brought to you by the 221 readers who funded my writing it – thank you all so much! You can see who they are at my Patreon page. If you're not one of them, and would be willing to chip in so I can write more things like this, please do so there.

Please leave comments on the Comment Catcher comment, instead of the main body of the post – unless you are commenting to get a copy of the post sent to you in email through the notification system, then go ahead and comment on it directly. Thanks!