Kurt Cobain dancing to Sonic Youth
If you ever feel weird, remember that this is how Kurt Cobain dances
So it’s official! We settled on Pinballz as the meeting spot. I’m not really sure how this all works but I’m excited to find outttt
Reblogging to get the word out! If you’re weird and wanna hang out with other weird tumblerers (tumblrites?) then you best be there!
Diane Ravitch on The Daily Show.
Ravitch is the queen. If only the government would listen…
We would also address poverty directly. We would increase the minimum wage and make post-secondary education cheap or free, and we’d improve improve unemployment benefits and offer free job-training to the unemployed.
Poverty is one of the few social ills where throwing money at the problem really does seem to work.
These are not radical, liberal ideas. In fact, in Europe most of them are associated with the more conservative parties, and many of them were associated with the American Republican party in the 80s. But the United States’s political climate is so different from anywhere else in the industrialized world that I fear we will just continue to get farther behind in education (and in % of people living in poverty) until we decide to make some big domestic investments.
"For a rich country, this is ridiculous"
Nelson Mandela (via writersrelief)
Yes. For politicians. For writers. For artists. For anyone who wants to make a difference in the world.
The Twitter Mandela Hall Of Shame
The GOP tweeted that Rosa Parks had ended racism. That, of course, led to the creation of the hasthag #racismendedwhen and the rest is history.smdh
I, too, am an old man.
174,000 people value cheap humour over the mental well-being of underpaid and mistreated staff
This picture is all kinds of amazing
quick question kissing isnt all that amazing why are you all obsessed with kissing literally everyone
Steff and I like to laugh about how kissing is so pointless, but built up so much
It’s true what he says though - there is no subject position from which it’s ok to talk about inequality - if you’re poor you are doing it out of jealously, if you’re not poor you’re doing it out of guilt/saviour complex, if you are young it’s just a phase, if you’re old you are hankering for times long gone and trying to recapture your youth, if you’re not well educated you just don’t understand the complexity of the situation, if you are well educated you’re in an academic bubble divorced from reality, if your politically apathetic you’re not allowed to complain, if you’re politically active you’re just trying to push your own sectarian agenda…
For every possible type of person there’s an established reason why your opinions on inequality are invalid. That’s not an accident.
Relevant, and important to understand.
Russell Brand, continuing to earn my respect
If all of the known National Security Agency surveillance wasn’t enough, the organization infected 50,000 computer networks with malware that could “steal sensitive information,” according to new slides published by Dutch paper NRC.
The information published this weekend is another revelation courtesy of leaker Edward Snowden. The 50,000-figure comes from a 2012 presentation slide explaining how the NSA acquired information worldwide. It described an initiative called “Computer Network Exploitation” (CNE), which NRC reports as “the secret infiltration of computer systems achieved by installing malware.” The slide shows that CNE’s reach spans five continents worldwide.
As CNET noticed, an NSA webpage for job applicants describes the CNE strategy as well as other “Computer Network Operations.” The CNE function includes “enabling actions and intelligence collection via computer networks that exploit data gathered from target or enemy information systems or networks,” according to the page.
NRC connects this most recent piece of information to a series of Washington Post reports on the NSA-TAO (Tailored Access Operations) group (the latest story on that is from August). The NSA allegedly had 20,000 implants for cyber operations in 2008—so this figure grew significantly in just four years. The NRC writes that this type of operation has been happening since 1998, and the malware at this point can be remotely activated and deactivated at the push of a button.