A well-made and safely launched firework has a way lower chance of returning to earth than a 7.62 bullet.
A well-made and safely launched firework has a way lower chance of returning to earth than a 7.62 bullet.
Split meaning equal shares, or split as in each person pays for what they ordered?
Canadian checking in.
Biggest oddity to me is that the default for restaurants is one bill, and waiters get annoyed if you ask them to split it by person.
Like why would I want to either:
It’s complete insanity to me.
I will never not be jealous of the pure joy a cat must feel stretching.
Shit, that’s where my sex drive went. Can I have it back please?
Bah, real power users only need a magnet and a pin.
You don’t need reproducible builds. You can get by if you trust whoever compiled it, like your distro’s maintainers or the pidgin developers.
The risk of mis-ordering your layers is a security issue.
There are two ways to layer a VPN and tor:
In the first option, you gain little. Tor already encrypts your traffic, so your ISP can’t see inside them. Technically, Tor over a VPN hides the fact that you’re using Tor from your ISP, but Tor’s snowflake does something similar if you need that.
In the second option, you’re revealing your VPN account information, which could theoretically be associated back to you. Tor adds nothing over just a VPN in this case.
Don’t mix tor plus VPN.
If you’re using tor browser without tor for some reason, carry on.
Copyleft means: “if you modify the program and share it, you also have to include the source code for your modifications.”
The owner of the copyright (usually the developers or their employer) can still change the license later.
I am aware. What processing is only possible in the cloud, and not locally?
Edit: My apologies, I didn’t realize you weren’t the same person I originally replied to. Please disregard!
Until homeomorphic encryption becomes a thing, cloud can’t be secure or private.
Why do you need homeomorphic encryption? Isn’t client-side encryption good enough for most use cases?
I’m using value in the loosest sense, like how all objects are values.
So now if you have three implementations of IProductService
, how do you know which one is configured?
I’m not exactly sure what you mean. Doesn’t all dependency injection work the way I described?
Without being familiar with the framework, you can’t trace your way from the class getting injected into to the configuration, even if you’re experienced with the language.
Dependency injection is so much worse. Oh, hey, where’d this value come from? Giant blob of opaque reflection code.
If you haven’t already, take a peek at Harry Potter and the Methods of Rationality. It’s fanfiction, but absolutely worth a read.
While I’m not entirely sure I agree with these points, I do understand them. I only meant to convey that firing guns into the air is on another level of stupid compared to fireworks.