“Show my ad to hornly lonely 13 y/o that suffer from Tourette”
vs
“Here is a list of 13 y/o that suffer from Tourette”
One of these options is less profitable for an ad network in the long run.
“Show my ad to hornly lonely 13 y/o that suffer from Tourette”
vs
“Here is a list of 13 y/o that suffer from Tourette”
One of these options is less profitable for an ad network in the long run.
But cracking ed25519, or RSA , is something that state actors can’t do without massive resources… What am I missing here?
Even if I reverse engineer Linux, I can’t know the decryption keys for my encrypted data…
Are you saying that HDCP is not “Secured” but “Jumbled up”? If tomorrow the source code for it get released - then “The jig is up”?
alias johnny="git checkout"
johnny -b goode
They can’t give a reward for a “oh shit we’re running out of hedge fund money, we need to stay solvent , let’s sell out our user’s data”
Oh you want a Lemmy reference? That’s the kind of streetlamp that… Ahh… Lenin…beans…get behind?
That’s the kind of streetlamp that la’mouse can get behind
Man, what a grim screenshot for the app promotion.
Serious question - I haven’t touched my Xbox one for about 4 years , it wasn’t powered and wasn’t connected to the internet - I would love to jailbreak it and run Linux on it. Can it be done?
as it’s seen as a threat to the tech that the US can influence or outright exert control over
Good
No, that’s the one where “everything that can go wrong, will go wrong”
You’re thinking of Godwin’s law
One could make the case that we can transform an k size array to a k-vertex-connected graph
Because traversing from one element to any other element is an O(1) operation using index arithmetics.
Same for n dimensional matrices.
Ohhh a stack that is 4 callback deep, are you running java on a potato?
You may, but the only correct response is “puff… You’re a sandwich!”
Sudo make me a sandwich
Libreboot? Coreboot? UEFI?
Someone should tell killedbygoogle.com about this astounding development
There’s a Hebrew expression that goes like “Because of hatred of Haman , not out of love of Mordecai”
Adjusting for context , it is because of mistrust of Microsoft, not out of love of Linux.
Why do people humble brag about their password strength, but then tell the whole world how to construct rainbow tables designed to crack their passwords?
OK, I’ve read the wiki entry but I still don’t understand what KVM is, or why it’s needed. The last time I visited a data center - every server rack came with a laptop-esque looking control unit. What problem does KVM comes to solve? What does this invention improve upon a traditional KVM?