Skip to main content

关于西藏的事实回归

 发信人: wewill2009 (daluobe), 信区: History
标  题: 关于西藏的事实回归
发信站: BBS 未名空间站 (Sun Jul 18 17:01:28 2021, 美东)


我的原文出现在菌版的一个主题里:

假若没有二战,大多数中国大陆人(包括以傀儡国国民的形式)会被日本更长期统治,
是第三等公民,在朝鲜人和台湾人之后。

说马关条约是老将废除的是很可笑的
实际是依仗国际战争被美苏英三国主导方胜利的大背景而迫使日本放弃了侵占领土,马
关条约涉及的土地(和人民)只是其中的一部分

中国基本能够为自己做主,不是在破裂的民国期间,而实际是在共产党执政以后

否则西藏都会被事实独立下去

西藏被英国视为非完属于中国,中国是西藏的宗主国(大致类似于中国与朝鲜的传统关
系)。因此,在清朝倒塌后,英国和西藏在1914年最后绕开中国政府签订了会约,并且
说拒绝会约的中国本部中央政府(在签会约前)在达赖实际统治的西藏/“外藏”(不
包括青海、四川藏区和/或康区人口大部地区)不拥有特权。

毛在(”东突国“取消后的)1946年中共介入新疆后,西藏实际回归才成了可能,中国
的完全主权也不得不被英国最终承认。1950年解放军进入了阿里地区是真正把西藏完完
全全让英国最终都毫无争议”让“西藏纳入中国的开始。。。

邓小平也让英国在“法理”上已经拥有主权的一部分香港土地回归了中国,而不仅仅是
租借地

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...