Yes, because it is never comes at their own expense through self-sacrifice. True leaders eat last, not first.
Yes, because it is never comes at their own expense through self-sacrifice. True leaders eat last, not first.
The difference is that for the people dying under capitalism, the system is working as intended, and for the people dying under communism, it is not. In both cases, the leaders don’t really care, because it works for them.


If it is well known that it is illegal for law enforcement officers to wear masks, and there is an armed man wearing a mask who is threatening a group of people, it would be reasonable to assume they are not a law enforcement officer and a shooting could be justified in self-defense.
Disclaimer: I am not a lawyer.


Also Matthew 6:14-16: “14 For if you forgive other people when they sin against you, your heavenly Father will also forgive you. 15 But if you do not forgive others their sins, your Father will not forgive your sins.” (NIV)
I know it isn’t Biblically supported, but I always thought it would be incredibly poetic if we were asked to pass final judgement on people who had harmed us, only to find out afterwards that we were actually passing judgement on ourselves for our own actions. Makes me wonder how many people would condemn others for their own actions?
This would be a very literally implementation of Matthew 12:36-37: " 36 But I tell you that everyone will have to give account on the day of judgment for every empty word they have spoken. 37 For by your words you will be acquitted, and by your words you will be condemned.” (NIV)
If you like this book, you should also check out: “The cat in Redhat” and “ripgrep and PAM”.
The problem is that influencers have shilled stupid VPN services so much that even legislatures think they know what they are and think the primary use for the technology is circumvention and privacy.
They have no idea about all the IPsec tunnels providing site-to-site VPNs for all their businesses. Or how VPN protocols like GRE, which while providing no security on their own, are still very useful for tunneling protocols through different network stacks.