[-] colournoun@beehaw.org 1 points 4 days ago

How is actual with direct bank imports? Are you in the US or EU?

[-] colournoun@beehaw.org 16 points 2 months ago

Ah, yes, I live on “St Mary’ ; DROP TABLE street”

[-] colournoun@beehaw.org 9 points 3 months ago

Do you perhaps have Resist Fingerprinting or Strict Enhanced Tracking Protection turned on?

I was never able to get videoconferencing sites working with any combination of those (on Linux), so I just use a vanilla Chrome instance just for videoconferencing.

[-] colournoun@beehaw.org 15 points 3 months ago

Isn’t this basically how lisp works?

[-] colournoun@beehaw.org 17 points 8 months ago

Don’t kink-shame the furries!

[-] colournoun@beehaw.org 8 points 9 months ago

I think the glass doors on the refrigerated coolers that were electronic displays that showed you an ideal image of the drink or whatever was supposed to be inside, but you couldn’t see through them to see if there were any actually on the shelf.

[-] colournoun@beehaw.org 16 points 9 months ago

He did say he was doing it to learn. Maybe when he’s done he will be able to appreciate what goes into making a viable browser.

[-] colournoun@beehaw.org 12 points 10 months ago

https://mbasic.facebook.com/ still works. It's missing some modern niceties, but usable. That's what I use for occasional messages.

[-] colournoun@beehaw.org 11 points 11 months ago

Like Myst? I love those. Have you tried The Witness?

[-] colournoun@beehaw.org 9 points 1 year ago

If you get the sha256 from the same place you got the main file, then anyone tampering with the main file could also recalculate the sha256 to match the tampered file. A signature signed with a certificate uses complex math (public-key asymmetric cryptography) to give some certainty that the signed content (the sha256) is the same sha256 that the original file author created. It’s not mathematically feasible to recalculate the certificate signature. Why don’t we just sign the whole original file with the public-key crypto and skip the sha256? Because asymmetric crypto is much, much slower than plain symmetric crypto or hash functions. It’s faster and easier to generate the valid hash or key, then sign or encrypt just the smaller key.

[-] colournoun@beehaw.org 9 points 1 year ago

Real programmers curl unverified shell scripts into bash.

view more: next ›

colournoun

joined 1 year ago