iirc his VP want to summon jesus via armageddon
ich hab ein paar mal versucht instagram zu benutzen, weil da coole leute unterwegs sind, die ich auf reisen oder cons getroffen habe ,aber jedes mal hat die app mir haufenweise schrott vorgeschlagen, der mich nicht interessiert, und wenn dann doch mal was interessantes kam, war es zu schnell weg, oder ich ich habe versehentlich weitergeklickt und bin nicht wieder zurückgekommen, oder ich könnte es nirgends abspeichern, oder es war am ende nur clickbait.
keine ahnung. bin vielleicht zu alt für sowas. und vielleicht ist das auch gut so.
Here are the steps:
- The attacker creates a standard Git repository.
- They commit a single symbolic link pointing to a sensitive target.
- Using the PutContents API, they write data to the symlink. The system follows the link and overwrites the target file outside the repository.
- By overwriting .git/config (specifically the sshCommand), the attacker can force the system to execute arbitrary commands--
amazing.
. But it is trained well enough to correlate left and right together
eliza could do that 60 years ago
Our societies have not previously tolerated spaces that are beyond the reach of law enforcement, where criminals can communicate safely and child abuse can flourish.
I am pretty sure, churches were "tolerated spaces" bevor e2ee was a thing.
its zero-trust architecture is programmed in a memory-safe language with no supply chain to monitor!
this is good.
- Users are finally figuring out that some Linux distros are easy to use
so recommending arch linux to newbies was counter productive all along?
suprised_pikachu.bmp
As usual, the US is already one step ahead: they cut out the middleman by skiping a step.
the linux-file-deletion is used as a example for good software design. It has a very simple interface with little room for error while doing exactly what the caller intended.
In John Ousterhout's "software design philosophy" a chapter is called "define errors out of existence". In windows "delete" is defined as "the file is gone from the HDD". So it must wait for all processes to release that file. In Linux "unlink" is defined as "the file can't be accessed anymore". So the file is gone from the filesystem immediately and existing file-handles from other processes will life on.
The trade-off here is: "more errors for the caller of delete" vs "more errors due to filehandles to dead files". And as it turns out, the former creates issues for both developers and for users, while the later creates virtually no errors in practice.
Latex: Problem --> \def\please@#1#2#3#4{\e@kill#2#3{\me#1}#4@now} --> 

sorry for the snark, but