![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/1457718c-43b7-41df-b443-85747c9c5396.jpeg)
“fucking” for fucks sake.
“fucking” for fucks sake.
Moving back to a city!
I’m using value in the loosest sense, like how all objects are values.
So now if you have three implementations of IProductService
, how do you know which one is configured?
I’m not exactly sure what you mean. Doesn’t all dependency injection work the way I described?
Without being familiar with the framework, you can’t trace your way from the class getting injected into to the configuration, even if you’re experienced with the language.
Dependency injection is so much worse. Oh, hey, where’d this value come from? Giant blob of opaque reflection code.
Ha, abusing fork
for asynchronous saves is clever. I hope they are aware of the following restriction:
After a fork() in a multithreaded program, the child can safely call only async-signal-safe functions (see signal-safety(7)) until such time as it calls execve(2).
I don’t know about the rest of the world, but it seems like this could be legal in Canada if the employee agrees in writing: https://www.canada.ca/en/employment-social-development/programs/laws-regulations/labour/interpretations-policies/deductions-wages.html
That said, I’d nope the hell out of that contract, legal or not.
Right? That’s the thing. Car thieves don’t care if the tool is illegal; they’re already planning on stealing a car.
If you make the tool illegal, you’re just making it harder for security experts who do care about the law.
Yes we should allow them, because the problem isn’t that this tool is available. The problem is that cars and other devices aren’t more secure.
If you broke into a bank vault with a screwdriver, you don’t ban screwdrivers; you get mad at the bank.
You use cards for offline authentication (bars/festivals/etc.), and use a different process for online authentication.
Proving someone has the physical card in their possession (which is what a reader does) isn’t really useful for proving identity when you can’t also check the picture.
If you haven’t already, take a peek at Harry Potter and the Methods of Rationality. It’s fanfiction, but absolutely worth a read.
Pine and BeagleBoard have some decent options, but they’ll always be more expensive than rpi because of the economy of scale.
Basshunter, obviously.
There’s https://foundation.mozilla.org/en/privacynotincluded/ for privacy, at least.
Is there a nocontext community on Lemmy yet? This belongs there.
Blockchains aren’t exactly the best at proof of personhood. Usually all they can do is make masquerading as multiple people (a Sybil Attack) more expensive.
That’s not to say interesting approaches haven’t come out of blockchain-adjacent work, like https://passport.gitcoin.co/.
https://en.wikipedia.org/wiki/Ares I think? Don’t understand the quotes though.
A VPN does this, but for your internet connection:
Who’s out here censoring tits? The OP? That’s dumb, you can swear on the internet.
Someone else? Maybe go get a fresh screenshot.