this post was submitted on 10 Mar 2025
396 points (98.1% liked)

Not The Onion

14592 readers
2226 users here now

Welcome

We're not The Onion! Not affiliated with them in any way! Not operated by them in any way! All the news here is real!

The Rules

Posts must be:

  1. Links to news stories from...
  2. ...credible sources, with...
  3. ...their original headlines, that...
  4. ...would make people who see the headline think, “That has got to be a story from The Onion, America’s Finest News Source.”

Comments must abide by the server rules for Lemmy.world and generally abstain from trollish, bigoted, or otherwise disruptive behavior that makes this community less fun for everyone.

And that’s basically it!

founded 2 years ago
MODERATORS
 

cross-posted from: https://lemmy.world/post/26592059

Summary

Donald Trump is upset after King Charles warmly welcomed Ukrainian President Volodymyr Zelensky at Sandringham, making Trump’s own state visit invitation seem “less special.”

Trump’s allies allegedly asked the British government to intervene, but officials stated the king makes his own decisions.

Relations may also be strained by Trump’s criticism of Canada, where Charles remains head of state.

The U.K. government denied tensions, reaffirming strong U.S.-U.K. ties.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 11 points 15 hours ago (1 children)

Remember when the traitors illegally seized all the voting machines for their bullshit audits in 2020?

The voting machines that are known to have first hand attack vulnerabilities were in the hands of America's enemies.

[–] [email protected] 1 points 7 hours ago (1 children)

What vulnerabilities are you referencing?

[–] [email protected] 1 points 6 hours ago

https://apnews.com/article/2022-midterm-elections-technology-georgia-election-2020-a746b253f3404dbf794349df498c9542

"One of the most serious vulnerabilities could allow malicious code to be spread from the election management system to machines throughout a jurisdiction, Halderman said. The vulnerability could be exploited by someone with physical access or by someone who is able to remotely infect other systems that are connected to the internet if election workers then use USB sticks to bring data from an infected system into the election management system."