• 0 Posts
  • 1.16K Comments
Joined 2 年前
cake
Cake day: 2023年6月18日

help-circle


  • I don’t pretend to be any restaurant that has opened in New Orleans. However, want to share a few tips I’ve discerned over a few years:

    • The holy trinity is critical to Creole cuisine, and red beans in particular. The holy trinity consists of onion, Bell pepper, celery, and garlic is “The Pope”. This is perfectly vegan.

    • to a non-vegan red beans and rice, the only ingredients I would add are bacon (or another source of pork fat) and pork ham in some form. I would substitute with any reasonable vegan source of fat

    • sweet potatoes are still good if you absolutely need to turn this into patties for a complete meal at the end.






  • When this country was founded, tariff revenue was enough to fund the entire federal government. Those days are long gone, and they’re not coming back.

    Nowadays, there are basically two reasons to play the tariff game. 1. Extract tariff concessions from your trading partners, and 2. Encourage domestic production. The problem is, if you’re going for #1, you have to be willing to drop your tariffs at the drop off a hat to make a deal. If you’re playing #2, the people that build factories and whatnot want assurances that the tariff supports will be in place for years and years.

    So you can see that there’s an inherent trade-off between #1 and #2. To some extent, you cannot serve both masters. But Trump has been playing both strategies at the same time without a care in the world. There are… consequences… to doing that, which I am sure we will all get to experience.

    Edit: okay, okay. This Bolsonaro thing is a brand new strategy #3 which I’m calling… Oh geez… I gotta go buy some more beer.




  • Encrypted data channels can still be vulnerable to man in the middle attacks. Like when you connect to an unknown host with SSH, and the client pops up a big warning.

    In this case, ICE or whomever sets up a “valid” cell tower that your phone connects to, and they (law enforcement) route your packets onto the rest of the Internet. They can decrypt the 5G data, and see all of the IP headers. They can’t necessarily read the TLS traffic, such as https. But most important of all, they can log all of the IMEIs that connect, which effectively gives them a database of all of the protestors.