Quotulatiousness

June 30, 2015

Extending the ADA to the web

Filed under: Law,Liberty,Politics,Technology,USA — Tags: , — Nicholas @ 02:00

Amy Alkon discusses why the notion of expanding the Americans with Disabilities Act to cover the internet would be a terrible idea:

So few people understand how laws passed can be used — and easily misused. Stretched into something they were never supposed to be (or not what they were said to be about, anyway).

For example, Title IX was supposed to be about allowing girls equal participation in school sports. The Obama admin has turned it into a system of campus kangaroos courts removing due process from men accused of sexual assault.

Next in line for strrretching is the Americans with Disabilities Act.

[…]

Bader gives some examples from Walter Olson, from his testimony to Congress, of awful changes that would ensue, like that amateur publishing would become “more of a legal hazard.” They’d go after websites like mine, that make a few shekels from Amazon links and a few more from Google ads. I need this money to supplement the money that’s fallen out of newspaper writing; also, I love the people who comment here and the discussion that goes on. It’s what keeps my eyes pried open at 11 p.m. when I need to post a blog item half an hour after I should have gone to bed for my 5 a.m. book- and column-writing wakeup time.

Also, added in the morning, after waking up worrying about this all night — making something “accessible” for a tiny minority could ruin it for everyone.

And what sort of understanding do we really owe people? I don’t do well with complex physics and I have limited attention for things I don’t understand that don’t grab my interest enough to figure them out. Should physics websites dumb themselves down for Amy Alkon’s brain? How many scientific websites will be brought down by disabled people going around to them like the quadriplegic lawyer in the wheelchair filing profit-making suits and closing classic hamburger stands and other businesses in California over ADA claims?

June 19, 2015

The EFF’s Privacy Badger

Filed under: Liberty,Technology — Tags: , , — Nicholas @ 05:00

Earlier this month, Noah Swartz exhorted the Mozilla folks to put some energy and effort behind the Firefox Tracking Protection technology. While we wait for that to come to fruition, he also recommends the Electronic Frontiers Foundation’s Privacy Badger for Firefox users:

In her blog post, [Monica] Chew flags the need for Mozilla’s management to ensure that this essential protection reaches users, and to recognize that “current advertising practices that enable ‘free’ content are in direct conflict with security, privacy, stability, and performance concerns.” Since advertising industry groups flatly refused to respect the Do Not Track header as a privacy opt-out from data collection, the only line of defense we have against non-consensual online tracking is our browsers.

Safari and Internet Explorer have taken important steps to protect their users against web tracking: Safari blocks third party cookies out of the box, and IE offers a prominent tracker-blocking option. But mainstream users of open source browsers are out of luck. Until that changes, our Privacy Badger add-on for Firefox and Chrome remains perhaps the only one-click solution for users who want to protect their privacy as they browse the web. Since Privacy Badger requires no configuration, we encourage any user who is concerned about online tracking to add it to their browser.

EFF Privacy Badger

June 14, 2015

More on that Reason grand jury subpoena

Filed under: Law,Liberty,Media,USA — Tags: , , , , — Nicholas @ 04:00

At the Foundation for Economic Education, Ryan Radia discusses the free-speech-quashing subpoena issued by a federal prosecutor in New York state:

In late May, Judge Katherine Forrest, who sits on the US District Court for the Southern District of New York, sentenced Ulbricht to life in prison. This sentence was met with mixed reactions, with many commentators criticizing Judge Forrest for handing down what they perceived as an exceedingly harsh sentence.

A few Reason users, some of whom may have followed Reason’s extensive coverage of the fascinating trial, apparently found Ulbricht’s sentence especially infuriating.

One commenter argued that “judges like these … should be taken out back and shot.” Another user, purporting to correct the preceding comment, wrote that “it’s judges like these that will be taken out back and shot.” A follow-up comment suggested the use of a “wood chipper,” so as not to “waste ammunition.” And a user expressed hope that “there is a special place in hell reserved for that horrible woman.”

Within hours, the office of Preet Bharara, the US Attorney for the Southern District of New York, sent Reason a subpoena for these commenters’ identifying information “in connection with an official criminal investigation of a suspected felony being conducted by a federal grand jury.”

This doesn’t mean a grand jury actually asked about the commenters; instead, in federal criminal investigations, it’s typically up to the US Attorney to decide when to issue a subpoena “on behalf” of a grand jury.

[…]

Even if this subpoena is valid under current law — more on that angle in a bit — the government made a serious mistake in seeking to force Reason to hand over information that could uncover the six commenters’ identities.

Unless the Department of Justice is investigating a credible threat to Judge Forrest with some plausible connection to the Reason comments at issue, this subpoena will serve only to chill hyperbolic — but nonetheless protected — political speech by anonymous Internet commenters.

June 2, 2015

QotD: The internet’s public shaming machine

Filed under: Media,Quotations,Technology — Tags: , — Nicholas @ 01:00

In the small groups we evolved to live in, shame is tempered by love and forgiveness. People are shamed for some transgression, then they are restored to the group. Ultimately, the shamed person is not an enemy; he or she is someone you need and want to get along with. This is how you make up with your spouse after one or both of you has done or said something terrible.

In a large group, shame is punishment, but it still has a restorative aspect. One of the most surprising passages of Ronson’s book reveals that the drunken driver who had to stand by the side of the road with a sign detailing his crimes got more compassion and support than bitter catcalls from the people who drove by him.

On the Internet, when all the social context is stripped away and you don’t even have to look at the face of the person you’re being mean to, shame loses its social, restorative function. Shame-storming isn’t punishment. It’s a weapon. And weapons aren’t supposed to be used against people in your community; they’re for strangers, people in some other group that you don’t like very much.

Megan McArdle, “How the Internet Became a Shame-Storm”, Bloomberg View, 2015-04-17.

May 13, 2015

Google search history … and you

Filed under: Business,Technology — Tags: , , — Nicholas @ 04:00

At Reason, Ed Krayewski points out that you now have a way of discovering (and modifying) what Google’s search engine will reveal about you:

In January Google quietly rolled out the capability to view your entire search history with the online service, download a copy of it, and even to delete it from Google’s servers. The new feature wasn’t widely reported online until earlier this month when an unofficial Google blog publicized it.

You can check out your search history here, including web and image searches, and links and images you clicked on as a result. There’s also an option to download under settings (the gear button on the top left of the page), as well as one to “remove items,” including the ability to remove your recent search history or your entire search history.

April 12, 2015

The Great Firewall of China has a new capability

Filed under: China,Technology — Tags: , , — Nicholas @ 04:00

At The Register, Shaun Nichols talks about the new, weaponized Great Firewall of China:

China has upgraded the website-blocking systems on its borders, dubbed The Great Firewall, so it can blast foreign businesses and orgs off the internet.

Researchers hailing from the University of Toronto, the International Computer Science Institute, the University of California Berkeley, and Princeton University, have confirmed what we’ve all suspected: China is hijacking web traffic entering the Middle Kingdom to overpower sites critical of the authoritarian state.

Typically, connections to web servers in the People’s Republic must pass through the nation’s border routers, which may inject malicious JavaScript into the fetched web pages. This code forces victims’ browsers to silently and continuously fire requests at selected targets.

These sites may end up being overwhelmed and crash as a result — a classic denial of service — meaning no one in the world can access them.

It is a clear case of China engineering a way to knock arbitrary websites off the internet for everyone, it seems.

Such an attack was launched last month at California-based GitHub.com, which was hosting two projects that circumvented the Great Firewall’s censorship mechanisms, and GreatFire.org, a website dedicated to fighting China’s web blocking. GitHub mitigated the assault to mostly stay online.

This weaponized firewall has been dubbed the Great Cannon by the researchers, and typically hijacks requests to Baidu’s advertising network in China. Anyone visiting a website that serves ads from Baidu, for example, could end up unwittingly silencing a foreign site disliked by the Chinese authorities.

March 9, 2015

Net neutering … now it’s time to repent at leisure

Filed under: Bureaucracy,Business,Government,Technology,USA — Tags: , , , — Nicholas @ 04:00

Matt Walsh has a message for all those net neutrality warriors doing their fist-bumps of triumph:

Dear Net Neutrality Proponents,

You dear, sweet buffoons.

I know you’re quite impressed that the Federal Communications Commission just passed a sweeping set of regulations granting themselves control over the Internet. President Barack Obama considers this a glorious victory. Liberals and Democrats across the land are delighted. Even some corners of cyber space — the ones populated by masochists and nincompoops — are cheering loudly, excited to finally be under the jurisdiction of an enormous federal bureaucracy. Hallelujah!

Now, Gullible Americans, I realize that you think you’ve just been once again liberated from the shackles of the free market and whisked away to a fanciful land where Father Government makes sure everything is nice and fair and everyone is sharing their toys like good boys and girls. I know you are under this impression. I mean, I can’t blame you. It’s right there in the title. They call it “Net Neutrality,” for goodness sake! It’s neutral! Neutral means fair! Fair Internet! Who can quibble with a fair Internet! Only big bad corporations and their right wing minions, you think. Fox News and the Koch Brothers and Lex Luthor and other scary names.

The FCC tells us that Net Neutrality will give us a free and open Internet by granting them the power to regulate it under laws that were written 60 years before the Internet existed as a common household service. Consumers need to be protected from the possibility that Internet providers will block traffic to certain sites, or set up paid prioritization systems for consumers or web services who pay more. That’s what this is all about, you think. The FCC is looking out for the little guy again.

Good old FCC, always fighting for truth, justice, and bureaucratic control.

But, see, this is where I need you to stop and think, Gullible Americans. It’s too late now, but I need you to finally try to learn something here. The government is not the knight in shining armor you think it is — even when it’s run by Democrats.

March 7, 2015

Browser cosplay day

Filed under: Humour,Media,Technology — Tags: , , , — Nicholas @ 02:00

Joey deVilla posted an image which requires no further explanation:

browser-cosplay

March 4, 2015

The FCC is merely a symptom

Filed under: Government,Technology,USA — Tags: , , , — Nicholas @ 05:00

At Taxicab Depressions, Taxi Hack offers a few thoughts on current events:

If you have read my post The Pig Trap, you know of my absolute bewilderment at the current state of our country. Our government is utterly lawless, just making shit up as they go along, creating regulations and executive edicts to bypass the Congress and the Constitution, committing crimes in the furtherance of those goals, and nobody ever gets in trouble, unless he screwing someone he shouldn’t be, and nobody ever loses their job or goes before a judge, and most importantly, nobody seems to give a fuck. Everything is just fucking dandy, as long as we can binge-watch Girls and Entourage on HBO GO and Katy Perry’s next single doesn’t suck and that hot chick from Club Plush texts me next week…

I wake up every day around two or three in the afternoon, make a cup of coffee and turn on the news, just waiting for the day when it finally happens, the day that something finally snaps, and I am listening to Sheppard Smith breathlessly trying to describe shaky video of a mob of 500,000 or 800,000 pissed off taxpayers that has invaded Washington and are lining every street in D.C., armed to the teeth, and erecting scaffolding on the National Mall.

Actually, that’s not how I think it is going to go, but I promise you… what can not go on, will NOT go on.

A couple days ago, a five member panel of unelected bureaucrats called the FCC voted 3 to 2 to seize control of the internet for the Federal government, without so much as a “by your leave” to the Congress. It’s not like your Congressman or Senator did this, these were three UNELECTED political appointees, all DEMOCRATS, which I think is worthy of mention, and they just decided that they have the power to regulate what you say and what you view on the internet, without asking you what YOU think about that. They came up with a big fat Rule Book For The Internet that they would not show to the public before the vote, and now that they have deemed they have the authority to do this and voted to institute their new Rule Book For The Internet, they STILL won’t show the public their new Rule Book For The Internet.

How is that not a Joe Biden-sized Big Fucking Deal for you? THREE PEOPLE you never heard of and certainly never voted for just took over control of the internet for the government, and they are not showing the public what the new rules will be. Does that mean websites will have to get a government “license”, like radio stations? And will they have a list of bad things they can’t say, or they will be fined and maybe even LOSE their license? Nobody knows, because they will not show the public the rules they are creating.

March 2, 2015

Who “saw” that coming?

Filed under: Media,Technology,USA — Tags: , , — Nicholas @ 03:00

J.D. Tuccille talks about what it takes to turn off the 21st century at least temporarily:

CBS 5 screen capture

CBS 5 screen capture

Some asshole turned off the 21st century in northern Arizona yesterday. The hardest part was probably the hike. The modern world flows to northern Arizona in a cable that runs hundreds of miles through the desert. That cable was cut in an isolated river bed near New River, north of Phoenix. Once the vandals were there, doing damage wasn’t that big a challenge. The cable is about as thick through as a man’s leg, so the right tool in a backpack was all it took. And there went the 21st century, and maybe a few illusions some of us (**cough**) may have about the extent of our independence.

What went with that cable was most cell phone service (every company but Verizon was down), the Internet (multiple ISPs run through the same pipe), the 911 system, and pretty much any digital communications connection you can imagine. Northern Arizona businesses largely became cash only—including the roadside stops vending gas to cross-country travelers. Trucks lined up waiting for the stations to get back online so they could process company credit cards to fill their tanks. It’s not like the drivers could just take out cash — ATMs were down, too.

My wife’s pediatric office was able to examine kids and patch them up. But checking on test results, getting reads on x-rays, scheduling appointments with specialists, and electronically sending prescriptions to pharmacies were all out. Old-fashioned landlines worked, but medical facilities are part of the modern world. Thoroughly digitized and electronic, hospitals, labs, and clinics were reduced to sending couriers back and forth.

There’s a lot to like about the interconnected, digitized modern world. I wouldn’t be telecommuting from a rural area if I didn’t have an electronic link to the world beyond. People like me now have the historical luxury of living where we want while doing work that, not so long ago, required an actual presence in a major population center.

February 25, 2015

Net Neutrality, Title II Proponents “Assume Nothing Has Changed” Since 1995: Daniel Berninger

Filed under: Bureaucracy,Business,Law,Technology,USA — Tags: , , — Nicholas @ 03:00

Published on 23 Feb 2015

“All the logic that we are seeing in the Net Neutrality debate is assuming that nothing has changed; it’s assuming that it’s 1995. What’s actually happened is that people get more and more service, year in and year out,” says Daniel Berninger, a telecom activist who was involved in the early days of internet-phone service of Vonage.

Net Neutrality proponents, including President Obama, argue that internet-service providers (ISPs) need to be regulated by the Federal Communications Commission (FCC) in order to keep the internet “free and open.”

Berninger heads up VCXC, a nonprofit that is pushing for regulatory and policy changes to speed up the transition to IP-based networks for voice and data sharing. He’s an unsparing critic of FCC Chairman Tom Wheeler’s plan to implement Net Neutrality by regulating broadband network operators under Title II or “common carrier” provisions of federal law.

Title II has historically applied to telephone companies, which were regulated as public utilities and subject to government scrutiny regarding every aspect of service, including pricing and universal service obligations. Since the mid-1990s, the internet has been classified as an “information service,” which is subject to much less regulation under Title I of the relevant federal law.

“Title II regulation has been around for 80 years,” says Berninger, “and we know exactly what it can accomplish and what it can’t accomplish … in all the things that it touched, it essentially destroyed innovation.” In 1956, he explains, as part of a consent decree involving ATT, phone service was regulated by the FCC under Title II while “information services” were essentially unregulated. “We split communications and computing and treated them entirely different — essentially as a twin experiment. Well, one twin prospered and one twin did not do very well.” Berninger argues that virtually all the problems that proponents of Title II regulation and Net Neutrality worry over — such as the blocking of specific websites and the deliberate slowing of traffic — haven’t occurred precisely because ISPs are subject to market competition and must constantly innovate to keep customers happy. FCC regulation would hamper that.

The FCC will vote on Wheeler’s proposal later this week and is widely expected to endorse it. The FCC has lost two previous attempts to assert regulatory control over the internet.

February 23, 2015

The “Internet of Things” (That May Or May Not Let You Do That)

Filed under: Liberty,Technology — Tags: , , , , — Nicholas @ 03:00

Cory Doctorow is concerned about some of the possible developments within the “Internet of Things” that should concern us all:

The digital world has been colonized by a dangerous idea: that we can and should solve problems by preventing computer owners from deciding how their computers should behave. I’m not talking about a computer that’s designed to say, “Are you sure?” when you do something unexpected — not even one that asks, “Are you really, really sure?” when you click “OK.” I’m talking about a computer designed to say, “I CAN’T LET YOU DO THAT DAVE” when you tell it to give you root, to let you modify the OS or the filesystem.

Case in point: the cell-phone “kill switch” laws in California and Minneapolis, which require manufacturers to design phones so that carriers or manufacturers can push an over-the-air update that bricks the phone without any user intervention, designed to deter cell-phone thieves. Early data suggests that the law is effective in preventing this kind of crime, but at a high and largely needless (and ill-considered) price.

To understand this price, we need to talk about what “security” is, from the perspective of a mobile device user: it’s a whole basket of risks, including the physical threat of violence from muggers; the financial cost of replacing a lost device; the opportunity cost of setting up a new device; and the threats to your privacy, finances, employment, and physical safety from having your data compromised.

The current kill-switch regime puts a lot of emphasis on the physical risks, and treats risks to your data as unimportant. It’s true that the physical risks associated with phone theft are substantial, but if a catastrophic data compromise doesn’t strike terror into your heart, it’s probably because you haven’t thought hard enough about it — and it’s a sure bet that this risk will only increase in importance over time, as you bind your finances, your access controls (car ignition, house entry), and your personal life more tightly to your mobile devices.

That is to say, phones are only going to get cheaper to replace, while mobile data breaches are only going to get more expensive.

It’s a mistake to design a computer to accept instructions over a public network that its owner can’t see, review, and countermand. When every phone has a back door and can be compromised by hacking, social-engineering, or legal-engineering by a manufacturer or carrier, then your phone’s security is only intact for so long as every customer service rep is bamboozle-proof, every cop is honest, and every carrier’s back end is well designed and fully patched.

February 11, 2015

Farewell to The Dish and Andrew Sullivan as a blogger

Filed under: Media,USA — Tags: , , — Nicholas @ 02:00

Megan McArdle wasn’t a blogchild of Andrew Sullivan (as such relationships used to be known), but still regrets his decision to pack it in:

Long ago, when blogging was a fresh new form that attracted a lot of chin-stroking journalism, Glenn Reynolds said something that stuck with me: Journalism is a lecture; blogging is a conversation. That’s not as true as it used to be, and it gets less true every day, as old bloggers leave and are not replaced. Ezra Klein attributes much of this to social media, which is certainly part of the answer; Facebook does not reward Part Seven of a back-and-forth about affirmative action. It wants neat, self-contained, authoritative statements about The Way the World Is, preferably ones that bolster your ideological commitments by eschewing caveats, ambiguity or serious engagement with the other side. As I frequently joke with my writer friends, the ideal blog post for the social media world would be headlined: “Everything You Already Believe Is Completely Correct, and Here’s Some Math You Won’t Understand That Proves It.”

I imagine that a number of bloggers breathed a sigh of relief when the form became less conversational — no need to respond to all those uncomfortable questions the other side is raising! The great thing about Andrew was that he kept up the conversation. He is passionate in argument, and he and I have had some fierce disagreements over the years. But right up to the end, he kept asking uncomfortable questions and offering answers from both sides. That’s pretty rare, and pretty admirable, and I’m deeply sad that one last vestige of the old days is soon to be no more.

But the problem with the old model of blogging is not just social media; it’s that blogging is exhausting. Two or three items a day doesn’t sound like a lot, but it takes a long time just to find something you want to write about. And the slowly dying ecosystem of other blogs makes it harder, because there’s no longer a conversation you can just easily hook into. Instead of plopping yourself down at a table where people are already talking, you have to wander through a room filled with people who are speaking to an audience through a megaphone and decide which of these oratorial topics might interest your own audience and a few thousand of their Facebook friends. It’s much lonelier, and consumes more energy, than it was in days of yore. This is why I spend so much time on my comments section; it is the one remainder of the old back-and-forth that made me love blogging in the first place.

Most of us, one way or another, stopped doing what we used to do. I write fewer, longer items; others stopped blogging entirely. Andrew kept up the volume, even increased it, but by the end, it took a staff of 10 to do it. It’s no wonder he burned out; the wonder is that it took so long.

February 9, 2015

The fantasy that CSE/CSIS oversight will actually protect the privacy of Canadians

Filed under: Cancon,Law,Technology — Tags: , , , , — Nicholas @ 04:00

Michael Geist on the rather disturbing news that Canadian intelligence agencies are busy watching the uploads of every internet user (including the Canadian users that CSE/CSIS are theoretically banned from tracking by the letter of the law):

… the problem with oversight and accountability as the primary focus is that it leaves the substantive law (in the case of CSE Internet surveillance) or proposed law (as in the case of C-51) largely unaddressed. If we fail to examine the shortcomings within the current law or within Bill C-51, no amount of accountability, oversight, or review will restore the loss of privacy and civil liberties.

First, consider the Snowden revelations that the CSE has been the lead on a surveillance initiative that gathers as many as 15 million uploads and downloads per day from a wide range of hosting sites that even appear to include the Internet Archive. The goal is reputed to be to target terrorist propaganda and training materials and identify who is uploading or downloading the materials. The leaked information shows how once a downloader is identified, intelligence agencies use other databases (including databases on billions of website cookies) to track the specific individual and their Internet use within hours of identified download.

The Levitation program, which removes any doubt about Canada’s role in global Internet surveillance, highlights how seemingly all Internet activity is now tracked by signals intelligence agencies. Note that the sites that host the downloads do not hand over their usage logs. Rather, intelligence agencies are able to track who visits the sites and what they do from the outside. That confirms a massive surveillance architecture of Internet traffic operating on a global scale. Is improved oversight in Canada alone going to change this dynamic that crosses borders and surveillance agencies? It is hard to see how it would.

Moreover, these programs point to the fundamental flaw in Canadian law, where Canadians are re-assured that CSE does not – legally cannot – target Canadians. However, mass surveillance of this nature does not distinguish between nationalities. Mass surveillance of a hundred million downloads every week by definition targets Canadians alongside Internet users from every corner of the globe. To argue that Canadians are not specifically targeted when it is obvious that the personal information of Canadians is indistinguishable from everyone else’s data at the time of collection, is to engage in meaningless distinctions that only succeed in demonstrating the weakness of Canadian law. Better oversight of CSE is needed, but so too is a better law governing CSE activities.

February 7, 2015

Now afflicting Chinese internet users – “Straight Man Cancer”

Filed under: China,Media,Technology — Tags: , , , — Nicholas @ 04:00

At The Diplomat, Nancy Tang explains a sudden outbreak of “Straight Man Cancer” among China’s Weibo users:

“A woman only has one ambition. In her heart, she sees love and childrearing as the most important thing in life.” On January 12, 2015, scholar Zhou Guoping thus tweeted on Weibo, the popular Chinese microblogging platform. Zhou later responded to the backlash, saying, “I agree with women’s liberation and equality between women and men… However, no matter how talented [women] are or what achievements they reach, if [a woman] refuses to, or doesn’t know how to be a gentle lover, a caring wife, a loving mother, the sense of beauty she gives me will be greatly reduced.” Both tweets were subsequently removed by Zhou.

Chinese commentators quickly diagnosed Zhou, a popular public intellectual at the state think tank Chinese Academy of Social Sciences, with “Straight Man Cancer.” The term “Straight Man Cancer,” coined in mid-2014, refers to chauvinist, judgmental behavior and language that propels sexist double standards or belittles women. Zhou’s controversial tweets exposed him to public scrutiny and attracted state attention. Communist Party mouthpiece People’s Daily re-posted an editorial, calling for the use of law and public opinion in order to “prevent ‘Straight Man Cancer’” in the private realm from “spreading into the public domain.” State news agency Xinhua also published the transcript of a newspaper interview with Zhou, in which he shamelessly called himself a “feminist.”

Zhou is by no means the sole Chinese straight man afflicted with Straight Man Cancer. In the aftermath of Zhou’s tweets, Chinese netizens have dug up other notable cases of public figures infected by the “epidemic.” Han Han, popular author-blogger and youth icon, is another representative of the cancerous straight male among Chinese millennials. He has stated in an interview that “there is no way that my girlfriend would [be allowed to] work outside of the household.” The renowned Chinese translator of Haruki Murakami, Lin Shaohua, has warned men against housework, which he thinks of as detrimental to masculinity and having the potential to make men effeminate or gender-bent. Tsinghua University sociologist Sun Liping has suggested that decreasing female employment and facilitating earlier female retirement would alleviate the social pressure caused by China’s large population. New Confucian scholar Qi Yihu has also advocated that women work only half-time so that they can rear children. Meanwhile, even these infuriating sexist remarks are eclipsed by intolerable misogynistic violence: While most sexists perpetrate unfair stereotypes, some actively hate on women and harm women’s well-being. For instance, the celebrity English teacher Li Yang, misogynist and perpetrator of domestic violence, is considered a “terminally ill” case of Straight Man Cancer.

Older Posts »

Powered by WordPress