Don’t listen to this guy at all.
Don’t listen to this guy at all.
I’ve long held that my phone is a single point of failure and that I should be able to function without it. So I don’t do banking on my phone, I still carry a wallet even if I do have Apple Pay and I will certainly carry physical identification until I’m legally unable to.
I honestly thought the number of concurrent users was a lot higher a lot longer ago, but either way, it’s come a long way since ~2003?
I don’t know about the history of the project, but it sounds like those blobs have been there for quite some time. When in reality, the PR that added the blobs in the first place shouldn’t ever have been approved.
Actually just checked 3+ years.
This isn’t a knock against opensource programming, but there shouldn’t ever be precompiled blobs in the repo unless they are the official builds for the various OS’s and if you want to build from source, the pre-compiled blobs shouldn’t be part of that, otherwise you can’t really claim you are opensource.
Hey guys open source is great you can look at all the code and therefore there are no security backdoors etc. Also here are a bunch of pre-compiled blobs in the repo, don’t worry about those, but they are required to run the program.
Yes. EVs shouldn’t exist, just like all vehicles.
Indeed, and currently there exist several cities that execute that ideal more-or-less. NYC is the obvious one, but Washington DC, Chicago, hell even the worst city in America, San Francisco does it adequately. The only reason we can’t have that kind of public transit everywhere is because no one is forcing city officials to plan for the long-term, and reduce sprawl.
Zero Growth Lines are a great way to mandate density, without any other policies needed.
The idea of needing specialized transport as an individual beyond just walking is a failure of society. Replacing cars with “not-cars” isn’t really helping that aspect. You should be structuring society so that cars or “not-cars” have no need to exist for almost everyone.
Vanguard. You can either invest directly with them, or open whatever brokerage service if you want to gamble on stocks in addition to being responsible.
Invest around 30k in each of VEA VSS VYM, enable DRIP and then you can have 10k to yolo on GME or whatever if you want.
The genetic science is cool, the consequences of the science are non-existent. The consequences of using them as bio-engineering agents is obviously an open question, but a distraction at this point of time since governments around the world have no appetite for environmental science that doesn’t directly make someone money.
As for “what happens next,” it either becomes commercially viable and wolly mammoths are seen as mundane and numerous in the next few decades, or it becomes a one-off like Dolly the sheep and the herd population of woolly mammoths stays <10 plus maybe a few zoos.
Extremely poor road design. That is a simple T-intersection and it should be a 3-way stop, nothing more. A roundabout is completely inappropriate there.
I guess having a thick provisioned VM image on your laptop means that you are hiding something. Again if the evil government you are trying to hide something from doesn’t need reasonableness as a reason to detain you, then who cares? No matter what you do you are rolling the dice every time you interact with them.
Which is of course similar to the US today, so if I needed to hide something from them I’d make sure that once i’m legally compelled to give my password they at the very least wouldn’t have what they are looking for, since there is no way I could prove I didn’t have it anyway.
Beat what out of you? You already gave them a password that decrypts a specific file/volume/etc. If they want to beat you, they will beat you regardless of your possession of any encrypted materials.
They know it exist as a concept. They can’t prove that the specific decrypted message contains a super-secret encrypted message as well.
I have no idea how that keeps happening. But eitherway, bollards are the solution (also closing down the road). https://www.google.com/maps/place/Royal+Phoenix+Chinese+Restaurant/@53.7490938,-2.3905702,126a,35y,210.48h,45t/data=!3m1!1e3!4m6!3m5!1s0x487b98d2cee0c6c3:0x6781aa673871b8cf!8m2!3d53.748291!4d-2.3917403!16s%2Fg%2F1td64vyh?entry=ttu
Did you know that potential attackers can pinpoint your location if they are in the same public place as you?
This really seems like complaining that a location enabled app that explicitly shares your location with other users is sharing your location with other users. That is 100% the purpose of the app to begin with!
I’m a network engineer and I run ipv6 natively in all of our datacenters. There are even a handful of end systems that have ipv6 native networking stacks with ipv4 sockets for our non-ipv6 compatible applications. IPv6 issues are basically self-inflicted at this point by companies that see their IT systems as cost centers, or by basilisk directors who’s knowledge stopped in the 90’s.
Seems novel. But from a security aspect, if OpenSSH has security vulnerability that allows an unauthenticated user to login, via whatever means, once you are in the system as a non-privileged user, you are now free to use the same vulnerability to get root.
Basically this exercise is like using two locks that have the same key to open them. If the same key opens them, then a weakness in one, is now a weakness in the other so why bother with two identical locks?
If you want privacy and you drive a car, I got bad news for you. Public Transit is privacy.