@Buttons@programming.dev avatar

Buttons

@Buttons@programming.dev

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Buttons,
@Buttons@programming.dev avatar

To become a real programmer, you must install Copilot and let it copy and paste for you.

Buttons,
@Buttons@programming.dev avatar

How about we create some data and privacy laws that benefit everyone and this will benefit now and for their whole life.

Buttons,
@Buttons@programming.dev avatar

We should measure size of files/storage as a function of how many standardized png’s of an american flag would fit in the same amount of space.

Fixed it, I will not be oppressed by your standards

Buttons,
@Buttons@programming.dev avatar

<span style="color:#323232;">if random() > 0.5:
</span><span style="color:#323232;">    x = 2
</span><span style="color:#323232;">else:
</span><span style="color:#323232;">    x = "hello"
</span>

Where is the definition of x? What is the type of x? If you can’t identify it, neither can the LSP.

This kind of thing actually happens when implementing interfaces, inheritance, etc. Thus, LSPs in dynamic languages are best effort both theoretically and in practice.

Buttons,
@Buttons@programming.dev avatar

then x is created in the scope in your snippet

Saying “x is defined somewhere in the entire program” isn’t satisfactory to many users. Also, you didn’t tell me what type x has. Can I do x + 5?

Israel quietly rolled out a mass facial recognition program in the Gaza Strip (www.theverge.com)

Israel has deployed a mass facial recognition program in the Gaza Strip, creating a database of Palestinians without their knowledge or consent, The New York Times reports. The program, which was created after the October 7th attacks, uses technology from Google Photos as well as a custom tool built by the Tel Aviv-based company...

Buttons,
@Buttons@programming.dev avatar

If Israel can play the “criticizing the Government of Israel is the same as opposing the Jewish ethnicity” card, then we can play the “you especially should know better” card.

Buttons,
@Buttons@programming.dev avatar

It’s weird that when it comes to security companies are like “we got too many important things to be doing, like adding this quarters new shiny feature, we don’t have time to encrypt user data”.

You would think that when it comes to adding obscure tracking codes companies would be like “we don’t care what people print, it’s not our problem, we aren’t going to bother with tracking watermarks”. But, no, every company has tracking watermarks while cutting every other corner possible.

I mean, half the companies out there are barely able to get their software to work, meanwhile printer companies have this robust watermark system that never fails. I don’t understand these priorities.

Where’s my tinfoil hat?

Buttons,
@Buttons@programming.dev avatar

The only thing keeping them a powerhouse would be a number on a computer that can be stolen. Question is, would people try to steal from a nation rich enough to be a powerhouse and how sophisticated would those theft attempts be?

Buttons,
@Buttons@programming.dev avatar

That’s my point. If a country really did build up enough Bitcoin it became a world power, those Bitcoin would probably be stolen. If it can happen to gold, it can happen to Bitcoin even easier.

Buttons,
@Buttons@programming.dev avatar

It has to be easy enough to move the Bitcoins that it can be done when needed. For example, if you split the password up among too many people, then you could “disappear” one of those people and then the Bitcoins suddenly cease to exist (or practically so).

So there’s a balance. If it’s easy to move the Bitcoins, then a thief can find a way to move all the Bitcoins into their own wallet. Or, if it’s very difficult to move the Bitcoins, then an adversary can find a way to make it impossible to move the Bitcoins, essentially destroying them.

Buttons, (edited )
@Buttons@programming.dev avatar

If I can steal your cryptographic key (a number), I can write to the Bitcoin ledger “I Mubelotix give Buttons840 all my Bitcoin”, and then it’s done, the transaction is complete, it’s written on the immutable public ledger with your own private key. If I can get your private key then I can take all your Bitcoin and you cannot stop me, nobody can, no court, no nation.

What I’m saying is that if a country did built up a world altering amount of Bitcoins, a James Bond 007 Super Secret Agent Man would come and steal the cryptographic key associated with your Bitcoins and as soon as they have that it’s over, all your Bitcoin are gone.

Buttons, (edited )
@Buttons@programming.dev avatar

Is it? Like, when any one of the people with access to the key has a standing offer of 1 billion dollars and a life a luxury in another country, are you sure none of them will take the offer? What about when their families are threatened? What about when they get kidnapped and hit with a wrench?

I’m just saying, if we’re talking about so much Bitcoin that it alone makes a country a world power, that’s enough Bitcoin that things have moved beyond law and order and is in the ugly and dangerous realm of war and espionage.

Buttons,
@Buttons@programming.dev avatar

I’m not familiar with those, I’ll do some research. How would you explain what those are?

Buttons, (edited )
@Buttons@programming.dev avatar

Can the lawyers on the receiving end of a DMCA takedown take the other party to court for a frivolous suit? I thought one of the problems was that there is no recourse for those on the receiving end of a bad DMCA takedown?

What I think would happen is the modders send a DMCA takedown, and EA either does take it down, or they file a “we’re not violating copyright, promise” form and then that’s the end of the DMCA. If they file the “we’re not violating copyright” form, then from there the modders can file a normal copyright violation suit if they choose.

Buttons,
@Buttons@programming.dev avatar

Their art, their copyright.

They don’t expect to be paid, but they do expect that their copyright not be violated.

They might expect pay in exchange for granting a license to use their copyright art.

Buttons, (edited )
@Buttons@programming.dev avatar

I worked in an office building that had a dot matrix printer on the 4th floor. You could always tell when it was printing because the whole building would vibrate as it laid down characters with power and authority. If you moved an HP printer within 15 feet of the dot matrix printer the cheap plastic parts on the HP printer would spontaneously break which would cause HP to raise their monthly fees.

Buttons,
@Buttons@programming.dev avatar

If I were the reporter my next question would be:

“Do you feel that not knowing the most basic things about your product reflects on your competence as CTO?”

Buttons,
@Buttons@programming.dev avatar

“No… Hell no… Man, I believe you’d get your ass kicked if you said something like that…”

Buttons,
@Buttons@programming.dev avatar

That’s basically the same thing. They know they’re whole life they’re going to die so they just hang out in the graveyard patiently waiting. (/s)

Buttons,
@Buttons@programming.dev avatar

According to g.2.A.ii (in the definition of “covered company”), the law only applies to social media with more than 1,000,000 monthly active users. Not sure why that’s included.

I’m glad clauses like this are common. We don’t want some teenager who wants to experiment with creating a “social media” website for his friends to have the full weight of the law immediately fall on their shoulders. People should be free to create website with minimal legal requirements, especially if it’s a small website.

Buttons,
@Buttons@programming.dev avatar
Buttons,
@Buttons@programming.dev avatar

On this particular topic, I think “both sides” is true. Both sides want to proceed down this “ban websites by name” road.

Buttons,
@Buttons@programming.dev avatar

Every commit lists one or more parents, possibly several parents, like 8 parents. These commits thus form a graph structure.

Branches and labels are just references to commits in this graph structure; they are commit alias, just a name that references a specific commit. Branches and tags are the same, except by convention the CLI will move branches when you commit to a branch, but tags are not moved by the CLI.

(Commits may have many names, they have their commit ID, and they may also be named by a branch or tag. Commit IDs are hashes of the contents of the commit. This ensures, cryptographically, that a commit and it’s ID can never change.)

Git never deletes a commit that is less than 90 days old. If you commit something, rest assured your work is in there somewhere, it’s just that no mortal being may be able to find it. Deleting a branch removes a reference to a commit, but the commits in the branch are still there. The GUI tools usually hide commits that are not part of a branch, but you can see them using “reflog” related commands.

Buttons,
@Buttons@programming.dev avatar

But at least you wouldn’t download a car, right?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • rosin
  • thenastyranch
  • GTA5RPClips
  • tester
  • InstantRegret
  • DreamBathrooms
  • ngwrru68w68
  • magazineikmin
  • everett
  • Youngstown
  • mdbf
  • slotface
  • kavyap
  • JUstTest
  • cisconetworking
  • khanakhh
  • normalnudes
  • osvaldo12
  • cubers
  • tacticalgear
  • Durango
  • ethstaker
  • modclub
  • anitta
  • provamag3
  • Leos
  • lostlight
  • All magazines