Obsessed with the POV choice in Imperial Radch as well, both because Leckie does some really wild stuff with how expansive the strict first-person is able to become due to the worldbuilding and who her narrator is, and because it's SO entangled with the central thematic concepts of identity. In the first book flashbacks when the narrator is still a warship, "I" can encompass so many things, and sometimes explicitly refers to different facets in the narration--is "I" Justice of Toren, or One Esk, or a specific segment, or Breq narrating from twenty years in the future? "I" isn't simple, isn't unified, and while this is most literal and obvious with Breq/One Esk/Justice of Toren and Anaander Mianaai's split factions it's true constantly throughout the work at every level of scope. Individual characters struggle with internal conflicts and hit their breaking points--what is it that makes someone decide they have to disobey orders and make a stand or they won't be themself anymore? How do you know who you are if you've been forcibly changed (Tisarwat) or if the world you knew has moved on and become unrecognizable (Seivarden)? How does a character on a colonized world navigate the split identity that comes from the pressure to assimilate to the dominant culture? And then there's the Radch writ large, all the Radchaai so deeply invested in the idea that there is only one true concept of Radchaai society, of civilization, but of course there isn't! It changes based on location and over time, and Breq muses that the Radchaai empire would be largely unrecognizable to the isolated sphere of the Radch itself. In these books, even if you aren't the last remnant of a destroyed spaceship and its legion of bodies, "I" is such a complicated concept and the narrative never lets you forget it.
203 notes
·
View notes
YOU DESERVE PRISON BUT YOU WON'T GET TIME!!!! DELETE THIS PLEASE PEOPLE ARE ASKING YOU TO DELETE
i'm more than half asleep and forgot about this the second i clicked post and i was like what did i do?? oh just regular sad posting hours. 💋 i'm sorry my darlings, but it's true. that suit was not designed with a survival strategy in mind. ❤️🩹 and also i like to inflict pain 🫡 like, how steve probably carried him off the battlegrounds and they had to peel the suit off him and extract his body. removing it piece by piece and hating it for failing him whilst knowing it's the very thing that saved his life 15 years ago. saved it for this, so he can fulfill his destiny. one in fourteen million chances. one man in eight billion. the story was always gonna end like this etcetera :)
13 notes
·
View notes
well I just became aware of the existence of “amazon one” a few minutes ago and, aside from the other entire pile of Nope going on with that, there’s always just... a few questions I have for the marketing teams at biometrics companies.
because every one of them that I’ve seen always seems to have a statement along the lines of (in amazon’s case), “your [insert relevant body part] is a unique part of you; it doesn't go anywhere you don't and can't be used by anyone but you” as one of their selling points.
and the only conclusion I can come to at this point is that they must a) lack a certain kind of imagination, and b) all clearly be suffering from terminal Didn’t-Read-The-Artemis-Fowl-Books-As-A-Kid disease
20 notes
·
View notes
STOP USING BIOMETRICS TO UNLOCK YOUR TECH BEFORE GOING TO A PROTEST, RALLY, OR ACCESSING BIRTH CONTROL OPTIONS
Encrypt your tech. If you are US based, or in a country that does not protect your rights when it comes to cops, please read these article. There are not currently laws stopping the police from using your thumb or face to unlock your phone without consent or a warrant. Especially if you are taking any part in any protests throughout America, or accessing birth control needs.
Or you're, you know, queer, disabled, a person of colour, a woman, or generally just know how horrible the cops and government can be. They can pull you over for no reason, unlock your phone, and look for something to charge you with later. They can and will and have.
Cops will do ANYTHING they want, and chances are, the courts will let them.
(this might be relevant for other countries, too-- the protest rights are completely fucked here in the UK, so please be careful out there!!)
Helpfully, there is also a cop-proof your phone article as well:
5 notes
·
View notes
I cannot express emphatically enough how much I hate requirements to sign in, in this case signing into a microsoft account to set up windows.
Seriously what the fuck do you need this for. Just give me a local account. Why the fuck do I need to be internet connected. Is it because you're bad engineers and designers? Well, yes. But also is it because you're trying to hold me and my data captive through monopolistic practices and surveillance which is also used to push ads and steal my data? Why yes.
Every time I touch one of these disgusting products I feel like flying out to Seattle, breaking into the microsoft building, and covering every surface in gorilla glue.
0 notes
Exploring the Future of Security: A Deep Dive into Biometric Authentication Systems!
In the realm of security, advancements in technology have continually pushed the boundaries of what's possible. One such innovation that has garnered significant attention is biometric authentication. Gone are the days of relying solely on passwords or PINs; biometric authentication systems offer a more secure and convenient way to verify identity. In this series of articles, we'll explore the intricacies of biometric authentication systems, from their fundamental principles to their real-world applications and future prospects.
Types of Biometric Authentication
Biometric authentication encompasses various methods for verifying an individual's identity based on unique physiological or behavioral characteristics. From widely recognized fingerprint recognition to sophisticated facial recognition technology, biometric systems leverage a range of modalities to authenticate users securely.
How Biometric Authentication Works
At the heart of biometric authentication lies the process of capturing, storing, and matching biometric data. Whether it's the intricate patterns of a fingerprint or the distinct features of an iris, biometric sensors, and algorithms work in tandem to ensure accurate identification while safeguarding sensitive information.
Benefits of Biometric Authentication
The adoption of biometric authentication brings forth a multitude of benefits. Beyond enhancing security measures, biometric systems offer unparalleled convenience and user experience, reducing reliance on cumbersome passwords and mitigating the risks associated with credential-based authentication methods.
Challenges and Limitations
Despite its promise, biometric authentication is not without its challenges. Privacy concerns loom large, as the collection and storage of biometric data raise questions about individual rights and data protection. Moreover, the susceptibility to spoofing attacks and the high implementation costs present significant hurdles for widespread adoption.
Applications of Biometric Authentication
From access control systems to mobile devices and financial transactions, the applications of biometric authentication span across various industries and sectors. Whether it's streamlining time and attendance tracking or bolstering border control measures, biometric technology plays a pivotal role in shaping the future of security.
Future Trends and Developments
Looking ahead, the future of biometric authentication holds immense promise. With advancements in technology, we can expect to see greater integration with artificial intelligence and machine learning, paving the way for more sophisticated and resilient authentication systems. Moreover, emerging biometric modalities and their applications in fields like healthcare and retail hint at a future where identity verification is seamlessly woven into the fabric of everyday life.
Case Studies and Examples
Real-world implementations of biometric authentication offer valuable insights into its efficacy and impact. From multinational corporations to government agencies, organizations worldwide are leveraging biometric technology to enhance security measures and streamline operations. By examining these case studies, we can glean valuable lessons and best practices for successful deployment.
Best Practices for Implementing Biometric Authentication
As organizations embrace biometric authentication, it's essential to adhere to best practices to ensure its effective implementation. From implementing robust security measures to educating users about the technology's capabilities and limitations, a proactive approach is key to maximizing the benefits of biometric authentication while mitigating potential risks.
Conclusion
In conclusion, biometric authentication systems represent a significant leap forward in the realm of security. By harnessing the unique characteristics of individuals, these systems offer a secure, convenient, and reliable means of identity verification. As technology continues to evolve, so too will the capabilities of biometric authentication, ushering in a future where security is not just a necessity but a seamless part of our daily lives.
Through this series of articles, we aim to provide a comprehensive understanding of biometric authentication systems, empowering readers to navigate the evolving landscape of security with confidence and insight. Join us on this journey as we unravel the complexities and possibilities of biometric authentication in the digital age.
1 note
·
View note