• 0 Posts
  • 27 Comments
Joined 2 years ago
cake
Cake day: July 2nd, 2023

help-circle

  • Sure. For the fact that many jurisdictions outside of the US also consider freedom of speech and other human rights to apply between private parties: this is called “horizontal effect” and covered extensively in case law by e.g. the European Court of Human Rights. See also this chapter for an international comparison and this paper for a European perspective.

    As for the specific rules in the EU for platforms: Article 17 of the Digital Services Act requires that users who are banned or shadowbanned from any platform are provided with specific information of what rule they broke, which they can then appeal internally or in court. Article 34 and 35 requires very large platforms (such as X) to take broad measures to protect i.a. the users’ freedom of speech.

    More to the point, one person who was shadowbanned by X in a similar way used the DSA and won in court

    (Edited to add the last paragraph)



  • I’m of the opinion that having a lot of money shouldn’t, in fact, allow you to do what you want. No person should have this power to do mass censorship, not in the last place because manipulating online discourse means manipulating a fundamental aspect of democracy.

    Musk specifically is meddling in elections, both in the EU and the US by e.g. bribing voters. Turning the dials of the algorithm lets him do this even more effectively.







  • Your proposal is just an idealistic version of early US. You claim that corruption is fundamentally impossible, but assume that magically “the monarchs aren’t allowed to own property” without regard to enforcement. You claim to have an alternative to democracy but still propose majority voting on replacing rulers and constitutions. You simply assume that monarchs will keep each other in check and not devolve into the conspiring, warmongering tyrants that history is full of.

    Power can always be abused to get more power and go against all your original ideals. The only way to definitely prevent corruption is to ensure power is never concentrated in the hands of few.








  • Even if you computer is not exposed to the internet: are you certain that every other device on the network is safe (even on public wifi)? Would you immediately raise the alarm if you saw a second printer in the list with the same name, or something like “Print to file”? I think I personally could fall for that under the right circumstances.