Whole-known-network
Fedi when you tell them to take a shower
<p>Here’s more info about chromosomes and biological sex in a trans context including a thread from a biologist on the subject <a href="https://genderdysphoria.fyi/en/chromosomes" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">genderdysphoria.fyi/en/chromos</span><span class="invisible">omes</span></a></p>
<p><span class="h-card" translate="no"><a href="https://mastodon.online/@danirabbit" class="u-url mention">@<span>danirabbit</span></a></span> Neither is an afterlife, but (social) science can’t ignore its power.</p>
<p><span class="h-card" translate="no"><a href="https://mastodon.online/@danirabbit" class="u-url mention">@<span>danirabbit</span></a></span> It's too bad that people who believe those never took science classes beyond high school...</p>
@eal@post.ebin.club @cell@pl.ebin.zone @lanodan@queer.hacktivis.me 嫑
reminder that im streaming hamsterball this evening!!!
https://time.is/0800PM_18_Nov_2023_in_ET
twitch.tv/z00pster
keep an eye on this space :)
tonight's agenda
<p><span class="h-card" translate="no"><a href="https://mastodon.online/@danirabbit" class="u-url mention">@<span>danirabbit</span></a></span> Even if you accept an absolute correspondence between chromosomes and binary sex, there are thousands of X and Y variations, implying thousands of biological sexes.</p>
<p>There's a whole thread I need to write about reckoning with whether, as a progressive, advocating for more secure software is consistent with my political ideals. Far too often, users must act under a threat model where both malicious third parties and the producers of their software are hostile threats. Secure software helps against one of those but makes the other worse.</p>