Sounds like the perfect evolution of pointers then.
Sounds like the perfect evolution of pointers then.
I “understood” on a basic level what pointers were when i was first learning programing as a 12-13year old. But I never understood HOW to use them, or manipulate them, or what functions you use to interact with them, or how to examine them, or how to declare them, etc etc. And since I was young I never got the opportunity to take an actual programming class that taught any of that throughout high school. By the time I got to college I went with Electrical Engineering instead of computer science and so my journey with pointers ended.
Now I do python and never have to think about pointers.
He was killed by a rival, for sure. But the rival is his class rivalry, not whatever shadowy cabal of rich people that you are dreaming up.
This is fundamentally true. However it is possible to limit the bandwidth of data the employee can exfiltrate.
Assuming a privileged employee suddenly becomes a bad actor. Private-keys/certs are compromised, any kind of shared password/login is compromised.
In my case I have a legit access to my company’s web-certs as well as service account ssh-key’s, etc. If I were determined to undermine my company, I could absolutely get access to our HSM-stored software signing keys too. Or more accurately I’d be able to use that key to compile and sign an arbitrary binary at least once.
But I couldn’t for example download our entire customer database, I could get a specific record, I could maybe social engineer access to all the records of a specific customer, but there is no way I’d be able to extract all of our customers via an analog loophole or any standard way. The data set is too big.
I also wouldn’t be able to download our companies software source code in it’s entirety. Obviously I could intelligently pick a few key modules etc, but the whole thing would be impossible.
And this is what you are trying to limit. If you trust your employees (some you have to), you can’t stop them from copying the keys to the kingdom, but you can limit the damage that they can do, and also ensure they can’t copy ALL the crown jewels.
You are disappointed because it doesn’t have to be this way.
The EU can and should ban government and business’s from using twitter as part of their official communications. But if private citizens wants to tweet, then sure go for it, even the EU with it’s less then stellar speech record, particularly with the labeling antisemitism, still allows freedom of association.
If you want privacy and you drive a car, I got bad news for you. Public Transit is privacy.
That is accurate assuming that eye color is defined by only 2 genes, but in actuality it’s more, possibly as many as 50 different genes.
Oh shit. I totally missed the different label on the 3 otherwise identical pictures. Now I get it. I originally thought it was just literally 3 identical pictures.
i don’t understand the comic?
Don’t listen to this guy at all.
I’ve long held that my phone is a single point of failure and that I should be able to function without it. So I don’t do banking on my phone, I still carry a wallet even if I do have Apple Pay and I will certainly carry physical identification until I’m legally unable to.
I honestly thought the number of concurrent users was a lot higher a lot longer ago, but either way, it’s come a long way since ~2003?
I don’t know about the history of the project, but it sounds like those blobs have been there for quite some time. When in reality, the PR that added the blobs in the first place shouldn’t ever have been approved.
Actually just checked 3+ years.
This isn’t a knock against opensource programming, but there shouldn’t ever be precompiled blobs in the repo unless they are the official builds for the various OS’s and if you want to build from source, the pre-compiled blobs shouldn’t be part of that, otherwise you can’t really claim you are opensource.
Hey guys open source is great you can look at all the code and therefore there are no security backdoors etc. Also here are a bunch of pre-compiled blobs in the repo, don’t worry about those, but they are required to run the program.
Turn off broadcast of the SSID
Don’t do this. It provides zero security, and just reduces usability. Now you should call your SSID something non-identifiable. So instead of “$YourName Wifi” call it “pleasure chest” or something. Additionally do not set a ridiculous 64 character + special characters password, because again you are providing next to zero additional security, while hugely reducing usability.
Use a simple password scheme of 3-5 unrelated common words like from here: https://www.correcthorsebatterystaple.net/index.html for your wifi password.
The genetic science is cool, the consequences of the science are non-existent. The consequences of using them as bio-engineering agents is obviously an open question, but a distraction at this point of time since governments around the world have no appetite for environmental science that doesn’t directly make someone money.
As for “what happens next,” it either becomes commercially viable and wolly mammoths are seen as mundane and numerous in the next few decades, or it becomes a one-off like Dolly the sheep and the herd population of woolly mammoths stays <10 plus maybe a few zoos.
https://www.programmingfonts.org/#anonymous-pro Is what I use for terminal sessions. Not sure how I feel about it in an IDE. The color coding the most important part imo.
Here is my shocked pikachu face. 😱