#role-based access control
Explore tagged Tumblr posts
Text
Safeguarding Student Data: MeraSkool.com Security in School Management Software
# Safeguarding Student Data: MeraSkool.com Security in School Management Software ## Introduction Ensuring the highest level of data security is crucial for any school management software. Protecting sensitive information is not just a legal obligation, but also an essential aspect of maintaining trust and privacy among students, parents, and staff. This article will explore the importance of data security in school management software and highlight how MeraSkool.com addresses these concerns through its robust security features. ## Why Data Security Matters in School Management Software Data security breaches can have far-reaching consequences for schools, including financial losses, legal repercussions, and damage to reputation. Schools handle a vast amount of personal information, including student records, grades, attendance, and communications with parents. A breach could lead to identity theft, loss of privacy, and even legal action. ## Best Practices for Data Security in School Management Software To mitigate these risks, school management software should implement the following best practices: ### 1. Encryption Encryption is a critical component of any data security strategy. It ensures that sensitive information is unreadable to anyone who does not have the decryption key. MeraSkool.com uses industry-standard encryption protocols to protect all data transmitted and stored within its platform. ### 2. Access Controls Access controls are essential for preventing unauthorized access to student data. MeraSkool.com implements strict access control measures, including multi-factor authentication (MFA) and role-based access control (RBAC). Only authorized personnel can view and modify sensitive information, ensuring that it remains secure. ### 3. Regular Audits Regular security audits are necessary to identify vulnerabilities and ensure compliance with data protection regulations. MeraSkool.com conducts regular security audits and penetration testing to identify and address any weaknesses in its systems. ### 4. Compliance with Regulations Schools must comply with various data protection regulations, including GDPR, FERPA, and COPPA. MeraSkool.com is committed to ensuring compliance with these regulations through its built-in features and expert support. ## MeraSkool.com: A Secure School Management Solution MeraSkool.com understands the importance of data security in school management software. Our platform offers a range of features designed to protect student data, including: ### 5. Multi-Factor Authentication (MFA) MeraSkool.com implements MFA to ensure that only authorized personnel can access the platform. This adds an extra layer of security by requiring users to provide two forms of identification before gaining access. ### 6. Role-Based Access Control (RBAC) RBAC ensures that each user has access to only the information they need, based on their role within the school. For example, teachers can view student grades and attendance records, while administrative staff can manage the entire system. ### 7. Secure File Sharing MeraSkool.com provides secure file sharing capabilities, allowing users to share documents and files with other authorized personnel in a controlled manner. This helps prevent unauthorized access and ensures that sensitive information remains confidential. ## Discount Offers for Secure Software Solutions To further demonstrate our commitment to data security, MeraSkool.com is currently offering a 40% discount on our school management software for the month of December. Additionally, when you sign up and onboard your school in November, you won’t have to pay for this remaining session. ## Support and Feature Delivery MeraSkool.com takes pride in its exceptional customer support and commitment to delivering new features within 7 days. Our team is available via phone call or email to address any concerns or issues you may encounter. ## Conclusion Ensuring the highest level of data security is essential for school management software. MeraSkool.com offers a range of features designed to protect student data, including multi-factor authentication, role-based access control, and secure file sharing. With its commitment to compliance with regulations and exceptional customer support, MeraSkool.com stands out as a secure and reliable solution for schools. [Learn more about MeraSkool.com and its security features](https://www.meraskool.com/security) ## Tags Data Security in School Management Software, Best Practices, Multi-Factor Authentication, Role-Based Access Control, Secure File Sharing, Compliance, Discount Offers, Support ## Featured Image search query string to search stock image: school management, whiteboard, classroom
#Data Security in School Management Software#Best Practices#Multi-Factor Authentication#Role-Based Access Control#Secure File Sharing#Compliance#Discount Offers#Support
0 notes
Text
Identity and Access Management (IAM): Strengthening Security and Streamlining Access
Identity and Access Management (IAM) is a critical technology framework designed to manage digital identities and control organizational resource access. By using IAM, businesses can ensure that only authorized users can access sensitive systems and data, reducing the risk of breaches and unauthorized access. IAM solutions offer centralized control over authentication, authorization, and user privileges, providing enhanced security, regulatory compliance, and operational efficiency. With features like single sign-on (SSO), multi-factor authentication (MFA), and role-based access control (RBAC), IAM empowers organizations to protect digital assets in today's increasingly connected world.
More info: https://ahalts.com/products/hr-management

#Identity and Access Management#IAM#Access Control#Authentication#Authorization#Cybersecurity#Data Security#Digital Identity#Role-Based Access Control
0 notes
Text
A Comprehensive Guide To Role-Based Access Control (RBAC)
When installing an application, do you carefully review all permissions or just click "allow" until it launches? While tech-savvy individuals might navigate these permissions easily, many people overlook their significance. Knowing who has access to what information is crucial, particularly with organizational data.
Simply verifying an employee’s identity isn't sufficient; controlling their actions within the system is essential. Employees should access only the necessary features and information for their roles. As data and IT systems grow more complex, a unified access management solution is needed. This is where Role-Based Access Control (RBAC) comes in, offering a strategic approach to streamline and secure access across an organization.
What is Role-Based Access Control (RBAC)?
RBAC is an advanced permissions management model that assigns access levels to users based on their roles within an organization. By linking permissions to a user's job position, RBAC helps prevent unauthorized access and reduces data theft and leaks.
In RBAC, a role is defined as a collection of permissions aligned with specific job responsibilities, complementing other security policies and enhancing overall security. Before implementing RBAC, it’s essential to understand its working principles.
How Does Role-Based Access Control Work?
Assigning a unique access policy to each individual isn't practical in large enterprises. Automated RBAC allows administrators to create users and user groups, assign roles, and define resource access based on these roles. This simplifies access management and establishes a clear access policy. Employees get access based on their departmental needs and job responsibilities, ensuring they have only the necessary permissions.
For example, administrators might access system settings, specialists might use advanced features, and end-users might have basic functionalities. Implementing RBAC enhances data protection and operational efficiency.
Types of Role-Based Access Control Models
There are three main RBAC models:
Core RBAC: The foundation of all RBAC systems, with primary rules like role assignment, role authorization, and permission authorization, ensuring users perform actions their roles permit.
Hierarchical RBAC: Builds on the core model by introducing role hierarchies. Higher-level roles inherit permissions from lower-level roles, simplifying permission management.
Constrained RBAC: Adds separation of duties with Static Separation of Duty (SSD) and Dynamic Separation of Duty (DSD). SSD prevents users from holding conflicting roles, while DSD allows conflicting roles but not conflicting duties in the same session.
These models help organizations tailor their access control strategies to specific needs, enhancing security and efficiency.
Benefits of Role-Based Access Control
RBAC offers numerous advantages:
Easier Access Management: Simplifies access management by using predefined roles instead of individual permissions, saving time and reducing errors.
Simplified Compliance: Helps meet data privacy regulations by restricting access based on roles, reducing the risk of exposing sensitive information.
Better Visibility and Control: Provides a clear picture of who has access to what, aiding in tracking resource usage, adhering to security protocols, and simplifying audits.
Zero Trust Security: Fits well with the zero-trust model, minimizing data breach risks by granting minimal necessary permissions.
Separation of Duties: Tracks access attempts, monitors activity, and enforces separation of duties, reducing the risk of internal fraud.
Challenges of Role-Based Access Control
While RBAC is beneficial, it also presents challenges:
Complexity for Large Organizations: Managing RBAC in large organizations with numerous users, roles, and resources can be challenging.
Limited in Dynamic Environments: RBAC relies on well-defined roles and responsibilities, which can be difficult to maintain in fast-paced environments with evolving workflows.
Risk of Role Explosion: As the number of users and resources grows, so does the number of roles, potentially leading to confusion and errors.
By understanding and addressing these challenges, organizations can effectively implement RBAC. Despite its complexities, RBAC is crucial for modern organizations to safeguard assets and maintain regulatory compliance confidently.
Conclusion
RBAC streamlines privileged access management and enhances compliance, helping businesses protect sensitive data effectively. Despite challenges like scalability and complex role management, RBAC remains a vital tool for modern organizations. The key takeaway? Be mindful while granting permissions, whether for smartphone apps or enterprise employees.
0 notes
Text
Implementing Role-Based Access Control in Django
Learn how to implement Role-Based Access Control (RBAC) in Django. This guide covers defining roles, assigning permissions, and enforcing access control in views and templates.
Introduction Role-Based Access Control (RBAC) is a method of regulating access to resources based on the roles of individual users within an organization. Implementing RBAC in Django involves defining roles, assigning permissions, and enforcing these permissions in your views and templates. This guide will walk you through the process of implementing RBAC in Django, covering user roles,…
#Django#Django templates#Django Views#permissions#Python#RBAC#role-based access control#Security#user roles#web development
0 notes
Text
Unlock Data Governance: Revolutionary Table-Level Access in Modern Platforms
Dive into our latest blog on mastering data governance with Microsoft Fabric & Databricks. Discover key strategies for robust table-level access control and secure your enterprise's data. A must-read for IT pros! #DataGovernance #Security
View On WordPress
#Access Control#Azure Databricks#Big data analytics#Cloud Data Services#Data Access Patterns#Data Compliance#Data Governance#Data Lake Storage#Data Management Best Practices#Data Privacy#Data Security#Enterprise Data Management#Lakehouse Architecture#Microsoft Fabric#pyspark#Role-Based Access Control#Sensitive Data Protection#SQL Data Access#Table-Level Security
0 notes
Text
Mesh it Up Monday: Authorization - The Key to Secure Network Access
Welcome to another Mesh it Up Monday, where we delve into the world of networking with a sprinkle of humor and a whole lot of knowledge! Today, we’re going to unlock the secrets of authorization and discover how it acts as the key to secure network access. So grab your virtual keychain and let’s dive in! Chapter 1: The Magical Key 🔑✨ Imagine you’re at the entrance of a fabulous party. You…
View On WordPress
#access control#authentication#authorization#authorization methods#biometric authentication#digital signatures#network access#network dance floor#network security#RBAC#role-based access control#two-factor authentication#username and password
0 notes
Note
can you explain family abolition in a few words?
sure. there is no one unitary 'family abolitionist' perspective so be aware that i'm explaining this as a marxist and not as an anarchist or a radical feminist.
basically, "the family" is a social construct rather than a fixed self-evident truth. the family has been created and can be shaped, altered, or--indeed--abolished. this is evinced by the broad anthropological and historical record of radical transformations in what constitutes 'the family' (cf. clans, the extended family, the nuclear family). viewing the family as such opens it up to critique and also to the concept that it could be replaced with something better (in much the same way that, for communist and anarchist, refusing to accept the timelessness / naturalization of the bourgeois state opens up new horizons of political thought outside of engagement with electoral politics.)
among these critiques of the family are:
that it is a tool of patriarchal control over women and children by creating an economic dependence upon spouses / parents
ergo, that it enables and causes 'abuse' -- that child abuse, spousal abuse, and intimate partner violence are not abberations of 'the family' but in fact a natural consequence of its base premises re: power and control
that it serves as a site of invisiblised economic labour (e.g. housework)
that it is a tool of the capitalist (formerly the feudal) economy's reproduction of inequality via e.g. inheritance laws
that it serves as a site of normalization and reproduction of hegemonic ideology--i.e. that it is the site where heteronormativity, cisnormativity, gender roles, class positionality, & more are ingrained in children
among solutions family abolitionists propose to remedy it are:
the total dissolution of any legal privilege conferred by romantic or blood relationship in favour of total freedom for any group of people to form a household and cohabitate
the recognition of housework, the work of childrearing, & the general tasks of social reproduction as 'real' labour to be distributed fairly and not according to formal or informal (feminized) hierarchies
the economic and legal freedom of children--(i.e., allowing children unconditional access to food and shelter outside 'the family', allowing children the legal right to informed consent and self-determination)
similarly, the emancipation of women from economic dependence on their partners--both of these can only really be achieved via socialism (as marx put it, 'women in the workplace' only trade patriarchal dependence upon a husband for patriarchal dependence upon an employer)
communal caretaking of children, the sick, & the elderly
yeah. i know. this is a lot of words. its not few words. sorry. it's a complex topic innit. this is a few words For Me consideri ng that i've got a long-ass google doc open where i'm writing up a whole damn essay on this exact topic.
tldr: the family is not inevitable, it is constructed & can be replaced with something better. full economic freedom from dependence on interpersonal familial relationships for everybody now. check out cuba's 2022 family code for an idea of what this could look like as practical legislation.
3K notes
·
View notes
Text
Safeguarding Student Data: MeraSkool.com Security in School Management Software
# Safeguarding Student Data: MeraSkool.com Security in School Management Software ## Introduction Ensuring the highest level of data security is crucial for any school management software. Protecting sensitive information is not just a legal obligation, but also an essential aspect of maintaining trust and privacy among students, parents, and staff. This article will explore the importance of data security in school management software and highlight how MeraSkool.com addresses these concerns through its robust security features. ## Why Data Security Matters in School Management Software Data security breaches can have far-reaching consequences for schools, including financial losses, legal repercussions, and damage to reputation. Schools handle a vast amount of personal information, including student records, grades, attendance, and communications with parents. A breach could lead to identity theft, loss of privacy, and even legal action. ## Best Practices for Data Security in School Management Software To mitigate these risks, school management software should implement the following best practices: ### 1. Encryption Encryption is a critical component of any data security strategy. It ensures that sensitive information is unreadable to anyone who does not have the decryption key. MeraSkool.com uses industry-standard encryption protocols to protect all data transmitted and stored within its platform. ### 2. Access Controls Access controls are essential for preventing unauthorized access to student data. MeraSkool.com implements strict access control measures, including multi-factor authentication (MFA) and role-based access control (RBAC). Only authorized personnel can view and modify sensitive information, ensuring that it remains secure. ### 3. Regular Audits Regular security audits are necessary to identify vulnerabilities and ensure compliance with data protection regulations. MeraSkool.com conducts regular security audits and penetration testing to identify and address any weaknesses in its systems. ### 4. Compliance with Regulations Schools must comply with various data protection regulations, including GDPR, FERPA, and COPPA. MeraSkool.com is committed to ensuring compliance with these regulations through its built-in features and expert support. ## MeraSkool.com: A Secure School Management Solution MeraSkool.com understands the importance of data security in school management software. Our platform offers a range of features designed to protect student data, including: ### 5. Multi-Factor Authentication (MFA) MeraSkool.com implements MFA to ensure that only authorized personnel can access the platform. This adds an extra layer of security by requiring users to provide two forms of identification before gaining access. ### 6. Role-Based Access Control (RBAC) RBAC ensures that each user has access to only the information they need, based on their role within the school. For example, teachers can view student grades and attendance records, while administrative staff can manage the entire system. ### 7. Secure File Sharing MeraSkool.com provides secure file sharing capabilities, allowing users to share documents and files with other authorized personnel in a controlled manner. This helps prevent unauthorized access and ensures that sensitive information remains confidential. ## Discount Offers for Secure Software Solutions To further demonstrate our commitment to data security, MeraSkool.com is currently offering a 40% discount on our school management software for the month of December. Additionally, when you sign up and onboard your school in November, you won’t have to pay for this remaining session. ## Support and Feature Delivery MeraSkool.com takes pride in its exceptional customer support and commitment to delivering new features within 7 days. Our team is available via phone call or email to address any concerns or issues you may encounter. ## Conclusion Ensuring the highest level of data security is essential for school management software. MeraSkool.com offers a range of features designed to protect student data, including multi-factor authentication, role-based access control, and secure file sharing. With its commitment to compliance with regulations and exceptional customer support, MeraSkool.com stands out as a secure and reliable solution for schools. [Learn more about MeraSkool.com and its security features](https://www.meraskool.com/security) ## Tags Data Security in School Management Software, Best Practices, Multi-Factor Authentication, Role-Based Access Control, Secure File Sharing, Compliance, Discount Offers, Support ## Featured Image search query string to search stock image: school management, whiteboard, classroom
#Data Security in School Management Software#Best Practices#Multi-Factor Authentication#Role-Based Access Control#Secure File Sharing#Compliance#Discount Offers#Support
0 notes
Text
When someone really loves you, their biggest fear isn’t losing you, it’s hurting you ❤️
Love is one of the most complex emotions, yet psychology gives us a simple way to tell the difference between real love & conditional attachment.
When someone truly loves you, their biggest fear isn’t losing you—it’s hurting you. When someone only loves the way you make them feel, their biggest fear is losing access to you.
Real love is rooted in deep care and respect. When someone genuinely loves you, they are mindful of their words, actions & how they impact your emotional well being. They don’t just want to keep you; they want you to be happy, safe & at peace—even if that means letting you go when necessary.
They consider your feelings before acting.
They take accountability and own up to their mistakes and making an effort to grow
You are able to express yourself without fear of judgment or manipulation.
In this dynamic, love is about you, not just what you bring to the table. On the other hand, when someone is more attached to the way you make them feel rather than who you are, their biggest concern isn’t your well being—it’s what they stand to lose. These people might claim to love you, but their actions revolve around keeping their needs met.
Guilt tripping when you set boundaries.
Love bombing when they feel you pulling away.
Prioritizing their feelings over yours.
They don’t fear hurting you because, in their mind, your role in their life is to fulfill their needs. Their love is conditional—based on what you can give rather than who you are. And yes, all love has a level of conditions, but a healthy loves conditions revolve around the duty of acts of love, not who you are or what you do where the benefit is a single sided aspect.
When love is real, it’s selfless, patient and kind. When it’s conditional, it’s controlling, inconsistent and centered on the other person’s needs.
Love should feel safe, not like an obligation. True love protects, nurtures and respects. So next time you’re questioning someone’s intentions, watch what they fear most. If their fear is hurting you, they love you. If their fear is losing access to you, they love what you do for them. Know the difference. It will save you from confusing attachment for love.
237 notes
·
View notes
Text
Happy late birthday spm, this is my love letter to this damn game asdhdjgk
Screenshots from here and source here
Notes and easter eggs list below
Mario and Luigi's usernames are the only one that use _
Timpani and Blumiere are the only username that use -
Luvbi's name is "The Pure of Heart" in elizabeth English
For Jaydes, Asphodel Meadows is one of the greek mythology afterlife, specifically the one the underwhere is based on
Merlon's numbers are because there's canonicaly multiple Merlon, so they're seperating each others' accounts with numbers. The number are spm's release date
Tiptron was brave enough to publicly take the username "Tippi" because it's not like Timpani"s gonna use it again. So she pretty much went "it's free real estate"
Peach is keeping her names serious due to her status. Bowser does not care lmao
Blumiere's mouth and eye are blue like how when he was defeated, rather than when he was hateful and corrupted
Timpani's hair band mimics butterfly antennas, her colours are from me putting a sepia filter on her pixl form
Mimi is wearing her post game outfit. The form she shape-shifted into is also important and related to her backstory, though I'm not sharing that just yet : 3c
Nassy's design is based on Swoops, which is what i hc she was before she ate Bleck's dreams, and transformed into a Swoop/Human/Tribe of darkness mix from Bleck's dreams of Timpani, in the hope on getting him to love her if she looked more similar to them. Her eye colour is from the square effect when she uses her mind control power. She's not wearing her glasses due to it being postgame, and thus the start of her development into accepting herself and hiding away less, they're not reading glasses but sunglasses due to being sensitive to light (and also hiding some of her face and facial expressions)
Peach and O'Chunks know how to cook/bake, so they're the one commenting on how she made it/how Peach couldn't replicate it despite being a master baker
Luvbi, Grambi and Jaydes are here because, if the witches have tv, then they must also have internet access, and it is canon in my post game that they keep up with what the gang is up to online, since it's not everyday they meet people that can come and go from the afterlife and who they owe their life to. Though obviously it would be from myspace rather than tiktok since they have 2007 technology. Jaydes and Grambi wouldn't post or comment anything, but Luvbi is actively making friends. Also the idea of god himself coming to your comment section to go "what the hell" at your cooking skills is too funny
Nassy is in Saffron's kitchen and wearing an appron designed like hers, since the post game shows she lives in Flopside now. I decided on Sweet Smile rather than Hot Fraun because i thought Dyllis' temperament might scare away Nassy since she's never cooked before, and Saffron would be more supportive
And, well, you saw one of her first attempts GSXGDHI Do not let her in da kitchen
She clearly got the role of secretary just because of how attached she was to Bleck and wanted to be useful. But the whole point is that's she's living for someone else (him), while also trying to be someone else (timpani)
So her not being the "perfect girlfriend" is important to me
Bad at encouragement, bad at team spirit, bad at cooking, bad at comforting, bad at advice
Just, take the cliche of the nurturing perfect mom-friend, and make it the opposite
She's trying to get on Timpani's level, when she doesn't even really want to or enjoy any of this new persona she'd need to use. Because she's not Timpani, and faking who you are to get someone to date you is such a bad move that will crash in the long run
ALSO ALSO TIPTRON SAYING SHE'S ALSO TIPPI, YET TIMPANI REPLIED WITH SASS AND SARCASM, WHILE SHE MADE A JOKE CONNECTED TO ANALYTICAL KNOWLEDGE
TIPTRON IS MORE ANALYTICAL PIXL THAN SASSY TIMPANI
@ooftale @jester--addict get yall's butts over here fqhdhfjf
#Literaly the only non-canon thing in that is the fact that it's tiktok. and that Dimentio. Timpani and Blumiere are available#You remove these three and make it myspace or something and it's canon to my post game /gen#.i got the Sweet Smiles backgrounds from the no.clip website#such a helpful goldmine#shitpost#HB draws#headcanon#Nastasia#Dimentio#O'Chunks#Grambi#Bowser#Mario#Luigi#Merlon#Queen Jaydes#Timpani#Tippi#Tiptron#Luvbi#Mimi#Count Bleck#Blumiere#Princess Peach#Super paper mario#highest effort shitpost so far
157 notes
·
View notes
Text
🤍A basic rundown of my beliefs as a radical feminist 🤍
(I don’t represent every radical feminist, but these are usually the standard opinions you’ll find of many radfems. Hate or disagree with them, that’s fine! But know the truth of who I am and what I stand for beforehand)
- there are 2 sexes, the male sex is oppressing the female sex
- femicide, rape, child sex abuse, hijab laws, female genital mutilation, domestic labor, trafficking, war crimes, revenge porn, prostitution… women and girls around the world are being exploited, tortured, and killed because of this oppression, and it must end.
- female oppression is sex based oppression, meaning a woman can’t just identify out of her oppression (for example hijab laws)
- sex is biological and an immutable truth, gender is a social construct
- gender should be done away with because gender roles are male supremacist and result in women and girls being stereotyped, dehumanized, barred from education, safety, bodily autonomy, etc.
- defining women with anything other than biology is misogynistic and relies on stereotypes
- the biological differences between men and women must be acknowledged in order to effectively end patriarchal oppression
- radical feminism is getting to the root of female oppression (radical -> root)
- misandry is not real and is just an extension of misogyny (for example, “men are told not to cry!” Yes because women are seen as inferior and any trait associated with us is seen as degrading/emasculating for men. This is why there is no female equivalent to emasculation.)
- all current religions are patriarchal and made by men to exploit and control women
- access to abortion is a human right and should never be threatened, women are the creators of life and deserve to gatekeep it, as well as exercise full autonomy over our own bodies
- Using sexist gender roles to define yourself is giving these misogynistic stereotypes power (wearing makeup or dresses doesn’t make anyone less or more of a woman, this is misogyny)
- the beauty industry is patriarchal and exploits women, our bodies and our money
- sex work is not work, it’s always exploitation (consent can not be bought)
- the porn industry is patriarchal and relies on trafficking, coercion, and rape to function. It also conditions its watchers to be aroused by violence against women, and results in more real life consequences for women and girls
- women’s spaces and institutions must be protected. Women’s safety is more important than catering to male feelings
- marriage is a patriarchal institution made to exploit the domestic labor of women for her entire life
- BDSM/kink are patriarchal and only center the pleasure and well being of men.
- hookup culture is patriarchal and the risk to reward is not worth it for women to engage in it
- gender ideology is patriarchal and is a direct hindrance to female liberation (we can��t define ourselves or our oppressors, we can’t create spaces away from our oppressors, we can’t create laws and policy based on these definitions, people who are gender non conforming / have gender dysphoria are pressured to alter their bodies to conform to a rigid standard and become lifelong medical patients, etc)
- choice feminism and liberal feminism caters to conforming to patriarchal standards and institutions, and refuses to examine why women make choices under patriarchy
- women of color face oppression on the axis of our sex and race, men of color only face oppression on the axis of their race
- non white patriarchal institutions must be criticized: a mullah is just as dangerous to the liberation of women as a pastor is
- women should decenter the men in their lives just as men have done with women. That means prioritizing us! Engaging in women’s media, art, stories, fostering female communities and support networks, uplifting and empowering their sisters around the world
- being a radical feminist means consistently taking radical action, big or small, we all can do it! Go support a female artist, go donate menstrual products to a shelter, go tell off a man when you see him making a woman uncomfortable. We all can make a difference!
…My feminism focuses on criticism of Islam and middle eastern patriarchy, but there are radfems with many focuses/passions… some in eco feminism, some on uplifting Romani women, black women, neurodivergent women, women with disabilities, prostituted women… some are passionate about women’s sports, women’s art, women’s writing, women’s history, lesbian and bisexual women’s stories… everyone has their passion on here, so before you come to attack, just check out my blog and click around at the different profiles on this corner of the internet…. maybe we might not be the terrible witches you thought us to be. Or maybe we are, but witches are awesome so who cares lol
539 notes
·
View notes
Text
TL;DR Project 2025
Project 2025 has crossed my dash several times, so maybe tumblr is already informed about the hellish 900-page takeover plan if Trump wins office again. But even the articles covering Project 2025 can be a LOT of reading. So I'm trying to get it down to simple bulleted lists…
Navigator Research (a progressive polling outfit) found that 7 in 10 Americans are unfamiliar with Project 2025. But the more they learn about it, the more they don't like or want it. When asked about a series of policy plans taken directly from Project 2025, the bipartisan survey group responded most negatively to the following:
Allowing employers to stop paying hourly workers overtime
Allowing the government to monitor people’s pregnancies to potentially prosecute them if they miscarry
Removing health care protections for people with pre-existing conditions
Eliminating the National Weather Service, which is currently responsible for preparing for extreme weather events like heat waves, floods, and wildfires
Eliminating the Head Start program, ending preschool education for the children of low-income families
Putting a new tax on health insurance for millions of people who get insurance through their employer
Banning Medicare from negotiating for lower prescription drug costs and eliminating the $35 monthly cap on the price of insulin for seniors
Cutting Social Security benefits by raising the retirement age
Allowing employers to deny workers access to birth control
Laurie Garrett looked at the roughly 50 pages within Project 2025 that deal with Health and Human Services (HHS) and other health agencies, and summarized them on Twitter/X in a series of replies. I've shortened even more here:
HHS must "respect for the sacred rights of conscience" for Federal workers & healthcare providers and workers broadly who object to abortions, contraception, gender reassignment & other issues - ie. allow them to deny services based on religious beliefs
HHS should promote "stable and flourishing married families."
Require all welfare programs to "promote father involvement" – or terminate their funding for mothers and children.
Prioritize adoptions via faith-based organizations.
Redefine sex, eliminating all forms of gender "confusion" regarding identity and orientation.
Eliminate the Head Start program for children, entirely
Ban all funding of Planned Parenthood
Ban birth control services that are "egregious attacks on many Americans' religious & moral beliefs"
Deny pregnancy termination pills, "mail-order abortions."
Eliminate Office of Refugee Resettlement; move all refugee matters to the Department of Homeland Security
Healthcare should be "market-based"
Ban all mask and vaccine requirements.
Closely regulate the NIH w/citizen ethics panels, ensuring that no research involves fetal tissue, leads to development of new forms of Abortions or brings profits to the researchers.
Redirect the Office of Global Affairs to promoting "moral conscience" & full compliance w/the Mexico City policy
The CDC should have no role in medical policies.
"Because liberal states have now become sanctuaries for abortion tourism," HHS should use every available tool, including the cutting of funds, to ensure that every state reports exactly how many abortions take place within its borders, at what gestational age of the child, for what reason, the mother’s state of residence & by what method.
I'm still looking for a good short summary of the environmental horrors that Project 2025 would bring if it comes to fruition…
311 notes
·
View notes
Text
Conservatives are fringe outliers - and leftists could learn from them

The Republican Party, a coalition between Big Business farmers and turkeys who’ll vote for Christmas (Red Scare obsessed cowards, apocalyptic white nationalists, religious fanatics, etc) has fallen to its bizarre, violent, noisy radical wing, who are obsessed with policies that are completely irrelevant to the majority of Americans.
As Oliver Willis writes, the views of the radical right — which are also the policies of the GOP — are wildly out of step with the US political view:
https://www.oliverexplains.com/p/conservatives-arent-like-normal-americans
The press likes to frame American politics as “narrowly divided,” but the reality is that Republicans’ electoral victories are due to voter suppression and antimajoritarian institutions (the Senate and Electoral College, etc), not popularity. Democrats consistently outperform the GOP in national races. Dems won majorities in 1992/6, and beat the GOP in 2000, 2008, 2012, 2016 and 2020. The only presidential race the GOP won on popular votes since 1988 was 2004, when GW Bush eked out a plurality (not a majority).
But, as Willis says, Dems “act like it is 1984 and that they are outliers in a nation of Reagan voters,” echoing a stilted media narrative. The GOP’s platform just isn’t popular. Take the groomer panic: 71% of Americans approve of same-sex marriage. The people losing their shit about queer people are a strange, tiny minority.
Every one of the GOP’s tentpole issues is wildly unpopular: expanding access to assault rifles, banning immigration, lowering taxes on the rich, cutting social programs, forcing pregnant people to bear unwanted children, etc. This is true all the way up to the GOP’s coalescing support for Trump as their 2024 candidate. Trump has lost every popular vote he’s ever stood for, and owes his term in the Oval Office to the antimajoritarian Electoral College system, gerrymandering, and massive voter suppression.
Willis correctly points out that Dem leaders are basically “normal” center-right politicians, not radicals. And, unlike their GOP counterparts, politicians like Clinton, Obama and Biden don’t hide their disdain for the radical wing of their party. Even never-Trumper Republicans are afraid of their base. Romney declared himself “severely conservative” and McCain “put scare quotes around ‘health of the mother’ provisions for abortion rights.”
The GOP fringe imposes incredible discipline on their leaders. Take all the nonsense about “woke capitalism”: on the one hand, it’s absurd to call union-busting, tax-dodging, worker-screwing companies “woke” (even if they sell Pride flags for a couple of weeks every year).
But on the other hand? The GOP leadership have actually declared war on the biggest corporations in America, to the point that the WSJ says that “Republicans and Big Business broke up”:
https://www.wsj.com/articles/republicans-corporations-donations-pacs-9b5b202b
But America is a two-party system and there are plenty of people who’ll pull the lever for any Republican. This means that when the GOP comes under the control of its swivel-eyed loon wing, the swivel-eyed loons wield power far beyond the number of people who agree with them.
There’s an important lesson there for Dems, whose establishment is volubly proud of its independence from its voters. The Biden administration is a weirdly perfect illustration of this “independence.” The Biden admin is a kind of referee, doling out policies and appointments to its competing wings, without any coherence or consistency.
That’s how you get incredible appointments like Lina Khan at the FTC and Jonathan Kanter at the DoJ Antitrust Division and Rohit Chopra at the Consumer Finance Protection Bureat — the progressive wing of the party bargained for these key appointments and then played their cards very well, getting incredible, hard-charging, hyper-competent fighters in those roles.
Likewise, Jared Bernstein, finally confirmed as Council of Economic Advisers chair after an interminable wrangle:
https://prospect.org/blogs-and-newsletters/tap/2023-06-16-team-biden/
And Julie Su, acting labor secretary, who just delivered a six-year contract to west coast dockworkers with 8��10% raises in the first year, paid retroactively for the year they worked without a contract:
https://www.whitehouse.gov/briefing-room/statements-releases/2023/06/14/statement-from-president-biden-on-labor-agreement-at-west-coast-ports/
But the Biden admin’s unwillingness to side with one wing of the party also produces catastrophic failures, like the martyrdom of Gigi Sohn, who was subjected to years of vicious personal attacks while awaiting confirmation to the FCC, undefended by the Biden admin, left to twist in the wind until she gave it up as a bad job:
https://doctorow.medium.com/culture-war-bullshit-stole-your-broadband-4ce1ffb16dc5
It’s how we get key roles filled by do-nothing seatwarmers like Pete Buttigieg, who has the same sweeping powers that Lina Khan is wielding so deftly at the FTC, but who lacks either the will or the skill to wield those same powers at the Department of Transport:
https://pluralistic.net/2023/02/11/dinah-wont-you-blow/#ecp
By refusing to stand for anything except a fair division of powers among different Democratic Party blocs, the Biden admin ends up undercutting itself. Take right to repair, a centerpiece of the administration’s agenda, subject of a historic executive order and FTC regulation:
https://pluralistic.net/2022/10/18/administrative-competence/#i-know-stuff
Right to Repair fights have been carried out at the state level for years, with the biggest victory coming in Massachusetts, where an automotive R2R ballot initiative won overwhelming support in 2020:
https://pluralistic.net/2020/11/13/said-no-one-ever/#r2r
But despite the massive support for automotive right to repair in the Bay State, Big Car has managed to delay the implementation of the new law for years, tying up the state in expensive, time-consuming litigation:
https://pluralistic.net/2021/05/26/nixing-the-fix/#r2r
But eventually, even the most expensive delaying tactic fails. Car manufacturers were set to come under the state right to repair rule this month, but they got a last minute reprieve, from Biden’s own National Highway Traffic Safety Administration, who sent urgent letters to every major car manufacturer, telling them to ignore the Massachusetts repair law:
https://www.vice.com/en/article/m7bbkv/biden-administration-tells-car-companies-to-ignore-right-to-repair-law-people-overwhelmingly-voted-for
The NHTSA repeats the car lobby’s own scare stories about “cybersecurity” that they blitzed to Massachusetts voters in the runup to the ballot initiative:
https://pluralistic.net/2020/09/03/rip-david-graeber/#rolling-surveillance-platforms
The idea that cybersecurity is best maintained by letting powerful corporations gouge you on service and parts is belied by independent experts, like SecuRepairs, who do important work countering the FUD thrown off by the industry (and parroted by Biden’s NHTSA):
https://securepairs.org/
Independent security experts are clear that letting owners of high-tech devices decide who fixes them, what software they run, etc, makes us safer:
https://www.schneier.com/essays/archives/2022/01/letter-to-the-us-senate-judiciary-committee-on-app-stores.html
But here we are: the Biden admin is sabotaging the Biden admin, because the Biden admin isn’t an administration, it’s a system for ensuring proportional representation of different parts of the Democratic Party coalition.
This isn’t just bad for policy, it’s bad politics, too. It presumes that if some Democratic voters want pizza, and others want hamburgers, that you can please everyone by serving up pizzaburgers. No one wants a pizzaburger:
https://pluralistic.net/2022/10/23/narrative-warfare/#giridharadas
The failure to deliver a coherent, muscular vision for a climate-ready, anti-Gilded Age America has left the Democrats vulnerable. Because while the radical proposals of the GOP fringe may not enjoy much support, there are large majorities of Americans who have lost faith in the status quo and are totally uninterested in the Pizzaburger Party.
Nowhere is this better explained than in Naomi Klein’s superb long-form article on RFK Jr’s presidential bid in The Guardian:
https://www.theguardian.com/commentisfree/2023/jun/14/ignoring-robert-f-kennedy-jr-not-an-option
Don’t get me wrong, RFK Jr is a Very Bad Politician, for all the reasons that Klein lays out. He’s an anti-vaxxer, a conspiracist, and his support for ending American military aggression, defending human rights, and addressing the climate emergency is laughably thin.
But as Klein points out, RFK Jr is not peddling pizzaburgers. He is tapping into a legitimate rage:
a great many voters are hurting and rightfully angry: about powerful corporations controlling their democracy and profiting off disease and poverty. About endless wars draining national coffers and maiming their kids. About stagnating wages and soaring costs. This is the world — inflamed on every level — that the two-party duopoly has knowingly created.
RFK Jr is campaigning against “the corrupt merger between state and corporate power,” against drug monopolies setting our national health agenda, and polluters capturing environmental regulators.
As Klein says, despite RFK Jr’s willing to say the unsayable, and tap into the yearning among the majority of American voters for something different, he’s not running a campaign rooted in finally telling the American public “the truth.” Rather, “public discourse filled with unsayable and unspeakable subjects is fertile territory for all manner of hucksters positioning themselves as uniquely courageous truth tellers.”
We’ve been here before. Remember Trump campaigning against a “rigged system” and promising to “make America great again?” Remember Clinton’s rejoinder that “America was already great?” It’s hard to imagine a worse response to legitimate outrage — over corporate capture, declining wages and living conditions; and spiraling health, education and shelter costs.
Sure, it was obvious that Trump was a beneficiary of the rigged system, and that he would rig it further, but at least he admitted it was rigged, not “already great.”
The Democratic Party is not in thrall to labor unions, or racial equality activists, or people who care about gender justice or the climate emergency. Unlike the GOP, the Dem establishment has figured out how to keep a grip on power within their own party — at the expense of exercising power in America, even when they hold office.
But unlike culture war nonsense, shared prosperity, fairness, care, and sound environmental policies are very popular in America. Some people have been poisoned against politics altogether and sunk into nihilism, while others have been duped into thinking that America can’t afford to look after its people.
In this regard, winning the American electorate is a macrocosm for the way labor activists win union majorities in the workplaces they organize. In her memoir A Collective Bargain, Jane McAlevey describes how union organizers contend with everything that progressive politicians must overcome. A union drive takes place in the teeth of unfair laws, on a tilted playing field that allows bosses to gerrymander some workers’ votes and suppress others’ altogether. These bosses have far more resources than the workers, and they spend millions on disinformation campaigns, forcing workers to attend long propaganda sessions on pain of dismissal.
https://doctorow.medium.com/a-collective-bargain-a48925f944fe
But despite all this, labor organizers win union elections and strike votes, and they do so with stupendous majorities — 95% or higher. This is how the most important labor victories of our day were won: the 2019 LA teachers’ strike won everything. Not just higher wages, but consellors in schools, mandatory greenspace for every school in LA, an end to ICE shakedowns of immigrant parents at the school-gate, and immigration law help for students and their families. What’s more, the teachers used their unity, their connection to the community, and their numbers to get out the vote in the next election, winning the marginal seats that delivered 2020’s Democratic Congressional majority.
As I wrote in my review of MacAlevey’s book:
For McAlevey, saving America is just a scaled up version of the union organizer’s day-job. First, we fix the corrupt union, firing its sellout leaders and replacing them with fighters. Then, we organize supermajorities, person-to-person, in a methodical, organized fashion. Then we win votes, using those supermajorities to overpower the dirty tricks that rig the elections against us. Then we stay activated, because winning the vote is just the start of the fight.
It’s a far cry from the Democratic Party consultant’s “data-driven” microtargeting strategy based on eking out tiny, fragile majorities with Facebook ads. That’s a strategy that fails in the face of even a small and disorganized voter-suppression campaign — it it’s doomed in today’s all-out assault on fair elections.
What’s more, the consultants’ microtargeting strategy treats people as if the only thing they have to contribute is casting a ballot every couple years. A sleeping electorate will never win the fights that matter — the fight to save our planet, and to abolish billionaires.
If only the Democratic Party was as scared of its base as the Republicans are of their own.
If you’d like an essay-formatted version of this post to read or share, here’s a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2023/06/16/that-boy-aint-right/#dinos-rinos-and-dunnos
[Image ID: The title page of Richard Hofstadter's 'Paranoid Style in American Politics' from the November, 1964 issue of Harper's Magazine. A John Birch Society pin reading 'This is REPUBLIC not a DEMOCRACY: let's keep it that way' sits atop the page, obscuring the introductory paragraph.]
#pluralistic#tgop#politics#centrism#centrism kills#qgop#democrats in disarray#trumpism#conservatives#robert f kennedy#Massachusetts#climate emergency#naomi klein#oliver willis#right to repair#pizzaburgers
2K notes
·
View notes
Text
How history directly plays a part in the colonization of Palestine
"The modern claim that Joseph's Tomb is directly related to the biblical Joseph appears to have emerged as a result of claims by William Cooke Taylor in the 1830s. Cooke was an Irish journalist traveling in the area motivated by interest in biblical history but with no expertise in the field. Although in his writings he claims the site was believed be the tomb of the patriarch and that all the religions agreed as much, no other geographers who ventured into the area in the decades that followed reported anything of the sort. And it is unclear from his writings what local Palestinians, the people who were actually living in and around the shrine and worshipping there, believed about the shrine. British geographers subsequently took up Taylor's claim, however, and over the years it was forgotten that it had been more or less made up based on conjecture.
But the claims of biblical archaeologists had a strong role in how the Zionist movement would come to understand and conceive of the landscape.6 As European Jews migrated to Palestine in the first half of the twentieth century, they drew upon biblical archeology's claims. They adopted archeologists' claims that Palestinian holy sites were directly linked to ancient biblical figures. In many cases, they focused on occupying those sites in order to legitimize the colonial endeavor by giving it a sense of deeper history. In many cases, this would mean evicting the Palestinians who actually frequented these holy sites.
When Israel occupied the West Bank in 1967, religious Zionists began flocking to Joseph's Tomb. The tomb, which was previously open to pilgrims of all faiths, began to fall under exclusively Jewish control. As growing numbers of armed Jewish settlers were escorted to the tomb under military escort, the area became increasingly viewed with apprehension by Palestinians living around the site. In 1975, the Israeli military banned Palestinians – that is, the Samaritans, Muslims, and Christians living around the site – from visiting, a ban that has remained in place until this day. When I visited in summer 2015, the tomb was shut closed, but a sympathetic guard allowed me and a friend to look around, under his close watch.
Unsurprisingly, the ban has ignited intense anger over the years. This is true particularly given that frequent visits by Jewish settlers to the shrine are accompanied by hundreds of Israeli soldiers, who enter the area and run atop the rooftops of local Palestinians to “secure” the tomb. As a result, Joseph's Tomb has increasingly become associated with the Israeli military and settlement movement in the eyes of Palestinians. Its presence has become an excuse for frequent military incursions that provoke clashes and lead to arrests and many injuries in the neighborhood.7
Some fear that Israelis will attempt to take over the shrine to build an Israeli settlement around it. This fear is not unfounded, given the fact that Israeli settlers have done exactly that all across the West Bank in places they believe are connected in some way to Jewish biblical history. The notoriously violent Jewish settlements in Hebron, for example, were built there due to the location of the Tomb of the Patriarchs in that southern West Bank town. Following the initial years of settlement, settlers even managed to convince Israeli authorities to physically divide the shrine – which is holy to local Palestinians – and turn the whole area into a heavily-militarized complex. Other shrines have become excuses for the Israeli military to build army bases inside Palestinian towns, like Rachel's Tomb in Bethlehem – which is surrounded by twenty-foot high concrete walls on three sides to block Palestinian access. The village of Nabi Samwel near Jerusalem, meanwhile, was demolished in its entirety to provide Jewish settlers access to the tomb at its heart."
—Excerpt from Why Do Palestinians Burn Jewish Holy Sites? The Fraught History of Joseph's Tomb by Alex Shams
785 notes
·
View notes
Text
Shatabhisha- Stuck in a loop!?⭕️
Ruled by Rahu and situated in a sign governed by Saturn, Shatabhisha Nakshatra intertwines the themes of Rahu and Saturn.
Rahu represents obsession, addiction, perfectionism, illusion, desires, and the material world. Saturn, on the other hand, symbolizes restriction, ambition, delays, and discipline. This nakshatra is intriguing to observe because Saturn is often seen as the only planet capable of controlling and restricting Rahu. Addiction is a recurring theme for those heavily influenced by Shatabhisha Nakshatra.
Rahu, symbolizing the insatiable head/mouth, constantly seeks satisfaction. People with strong Shatabhisha influence may struggle with feeling perpetually unfulfilled.

The main symbol of Shatabhisha is an empty closed circle, representing restriction, karma, and limits. ⭕️
This reminds me of a snake eating its own tail, a metaphor for self-destruction often seen in these natives. They may feel stuck in a loop, constantly desiring more than they have, feel, or can access. This symbol illustrates their urge to break free from patterns and limitations.
Shatabhisha also embodies the power to heal, represented by the 100 physicians and healers. Individuals influenced by this nakshatra often have a strong desire for self-improvement, healing, and spiritual growth. They are driven to push boundaries and explore their limits, often oscillating between extremes—addiction to unhealthy behaviors or a "perfect" lifestyle.
Lewis Hamilton is an excellent example of someone who effectively harnesses the energy of Shatabisha. His ascendant lord, Venus, is in Shatabhisha, conjunct his Mars in the 5th house. His Rahu is in Krittika of Taurus, with Venus as the dispositor. Lewis follows a plant-based diet and is very strict with his fitness regimen, as even a small weight gain can affect his racing performance.
This year, he launched a non-alcoholic Blue Agave Spirit, Almave, produced in Mexico.🥃

Krittika, associated with the deity Agni, the god of fire, governs cooking, drinks, and digestion. Agni has the power to burn/purify, reflecting his disciplined approach to diet and lifestyle.🔥

Another example, she’s Shatabhisha Moon.

Another example that comes to mind is Emily Blunt, who has her Sun in Shatabhisha, fittingly playing a role in “Edge of Tomorrow” that mirrors the themes of this nakshatra, as well.
In the film, her character, Sergeant Rita Vrataski, helps Major William Cage (Tom Cruise) break free from a time loop by repeatedly facing and overcoming challenges. Rita’s journey in the movie reflects the Shatabhisha themes of perseverance, healing and ultimately, breaking the cycle to achieve a greater purpose.

Dealing with Rahu's influence can lead to excess, a desire to experience, feel everything or nothing.
However, understanding one's restrictions and seeing the bigger picture can bring freedom. Recognizing and accepting personal limitations allows one to channel obsessive desires into sustaining something meaningful in the material world.
By acknowledging and respecting these restrictions, individuals can transform Rahu's chaotic energy into focused ambition and disciplined action, leading to significant achievements and personal growth.
#astrology notes#vedic astro observations#vedic astro notes#astrology#vedic astrology#astro notes#shatabhisha#rahu
208 notes
·
View notes