• 0 Posts
  • 2 Comments
Joined 1Y ago
cake
Cake day: Jun 09, 2023

help-circle
rss

Emacs. It lacks a marketing department, but everything is homebrew and unlimited true hacker territory in the original meaning of the term. You can start with the menus enabled so that you do not need to know all the hotkeys right away. You should probably start with Doom Emacs for much of the configuration stuff done for you, but GNU Emacs is a base configuration. One great blog resource is: https://sachachua.com/

This is one of her creations I reworked and use as a desktop background reference:

Emacs is not just a text editor or IDE, it is much much more and all of these.


I have the unpopular user’s opinion that I expect transparency in my connections and interactions. I won’t use any commercial websites that have ambiguous connections on a whitelist firewall. I expect all businesses to operate like a brick and mortar store in real life. If I enter a grocery store, I’m not entering a bank, a bookstore, and a restaurant to purchase an apple, nor am I selling or giving up any part of my autonomy in my quest to satisfy my fundamental needs.

Personally, in my opinion alone, I view any business that is not transparent and straight forward about who and what I am dealing with as illegitimate and untrustworthy. I view it like inviting someone to a house party that then goes to the bathroom, opens the window, and lets other people enter my home. Or like a retail store that adds a bunch of hidden fees to their products because of something like various distributor logistics costs; stuff that belongs in the back office accounting of running a legitimate business. To me, the practice feels wrong because the default state of the internet being theft of individual autonomy with no freedom of information from determinism. I must assume that everyone is stalkerware, so I must be selective about who I enable in such a system. Micro services remove all accountability and make the problem of digital autonomy exponentially worse in the cases where they are exposed to the end user (data).