Skip to main content

美帝分裂成几个国家才会稳定

 标  题: 美帝分裂成几个国家才会稳定?
发信站: BBS 未名空间站 (Mon Dec 13 21:24:11 2021, 美东)

叔觉得美帝不久以后有可能进入内战和分裂,当然不是我一个人想法,Ray Dalio也有
类似说法。帝国最后都会分裂,中国就是合久必分,罗马帝国也分裂了。

美帝现在的意识形态和种族构成,至少需要下面几个独立国家:

1。美利坚洪波共和国,主要人口组成是白人右派,地区是中部州,大概占现在领土的
一半。阿拉斯加也可能在里面
2。美利坚左派共和国,主要人口组成是白左,但是黑人和其他少数族裔包括亚裔也可
能占non-trivial的minority。地点是东西海岸州的一部分。
3。劳模共和国,主要人口组成是劳模,地点是加州大部分,可能还有Arizona,New
Mexico,Texas等靠近宗主国墨西哥的地方。
4。黑人共和国,主要人口组成是黑人,地点是东南几个州。这个国家有可能跟左派共
和国合并,但是取决于白左内部对吸纳黑人的愿意程度和其他族裔的态度,比如亚裔。

三哥,穆斯林,小黄人很不幸无法凑足足够人口建立一个独立国家,除非有逆天的领袖
人物领导各自族裔杀出一条血路,在合适时间地点建国。就算这样,这些族裔也只能建
立一个地盘不大的国家,很可能在沿海州。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...