

Obviously all good questions that those much more informed should weigh in on. I know just enough about blockchain to recognize reasonable vs scam uses for, but I also know enough to not Dunning Kruger the topic.
Obviously all good questions that those much more informed should weigh in on. I know just enough about blockchain to recognize reasonable vs scam uses for, but I also know enough to not Dunning Kruger the topic.
There are actually other comments on this thread that provide other benefits besides trust, like modification tracing. There is more to it than just trust.
I didn’t say distributed. You are absolutely correct though. I was more observing that of all the BS tech bro babble that our Oligarch in Chief could spew into the universe, blockchain would be one that could be implemented reasonably.
I mean, technically SSA data might be a legitimate use of the blockchain. I am one of the biggest opponents of the whole mess, but there are use cases for a persistent immutable data record, and social security numbers would be one of them.
I used Notepad++ for virtually all coding I did (Python, JS, various Markup Languages, Action Script back in the day, etc) for a couple decades. The only reason I use VSCode now is because I inherited a nightmare of a legacy spaghetti bowl and needed the function tracing to attempt to figure out anything. I still prefer N++ for most small projects.
Why? Because they feel the need to have local copies of sensitive financial information because… You know… They are computer security experts.
You seem to think that Trump didn’t add access keys for his idols the instant he got back in the door. He loves Putin and Kim Jun Il. They are like, his favorite drinking buddies.
The big difference between the a relational database and a spreadsheet is that “can do” clause in your sentence. In a relational database they MUST have those constraints to be related.
In the Microsoft ecosystem Access is the relational database. Excel is a table manager with fancy features.
Ohhhhh… I fucking hate this. I use Windows locally, but I do support for a render farm that runs on Linux. The number of times I have recieved “it works locally” tickets from an artist who decided to get clever and embed Windows paths in string literals in their scene makes me want to punch a puppy. They don’t even look at the application logs we provide to see that the paths threw errors. We handle repointing their file paths with symlinks normally, but when they use literals it literally fucks the system with escapes. I will never understand why Microsoft refuses to standardize to POSIX with the rest of the world. Aside from them being a US company with decision makers who still think freedom units make sense.
This is a cultural thing. My wife has studdied German culture, particularly relating to their relationship with their language, pretty extensively and from what she says they are exceedingly resistant to changes to their general language at all. Hence all of the compound nouns for new devices instead of coming up with a new word. Apparently the cultural adoption of “Das handy” for cellphone was a cultural milestone since they actually used something new instead of trying to cram together “Mobile Wireless Vocal Communication Device” into one word.
You assume that the governments of which you speak are not assisting intentionally. These companies did not write the EULA legal frameworks that allow them virtual carte blanch to take and do whatever they want just because the population is trapped in the endless cycle of coercion that is our life.
Why do all of these companies decide they are so tired of existing?
Plus all the political stuff. The man is patantly off his rocker.
My landleech padlocked the basement and attic of the house I rent. I keep a large screwdriver for exactly this eventuality. Something goes wrong in the basement and that lock point is done for. Just slip it in the gap around the padlock and pull. Will only take about 200N to rip the thing off the door and I can get way more than that with a little bit of leverage.
Isn’t a true air gap pretty solid though? Aside from someone actually coming into your house and interfacing directly it would be pretty hard to bypass, or am I on Mt. Dunning-Kruger over here this time?
I prefer the answer of giving the giy the reins and letting him get it so riddled with viruses then when he calls for support replying “sorry, your property your problem. You have absolute dominion over it and thus we give no warranty as we have no responsibility.”
I know it isn’t “always”, but it has been proven that the “overcharging” is a way to launder money into black budget projects and operations. They aren’t always “bad”, the Manhattan Project was a black budget, as was the development of the stealth bomber.
I am also less concerned about a 5k pair of socks and more worried $90 million/plane F-35 that is widely regarded by pilots as a worse plane than the jets being replaced. You know, the one we spent $2 Trillion developing. I’m sure there were some $25k hammers in there, but overall it was so much other waste. Let’s cut some of that type of spending.
Not that I know of. In the end you are editing the browser rendering parameters. Anyone can inspect the page and see that the opacity on the page is being turned down. Finding where it is happening is the only thing you can really make hard. Have a couple of the pass through scripts be machine generated and you can have it use nonsensical variable names and a bunch of dummies that lead on wild goose chases. It could all be fixable, but you can make it a pain in the ass. Add a redundancy or two and it will make debugging a nightmare because even if one is fixed, the others will make it look as though it has not.
The real answer is to have NEVER do freelance web development inside the client’s firewall. Never. If they try to require it, walk away. If it is inside their firewall then they can just take the source code and stiff you. If they try to spout some BS about security, say that is precisely what you are concerned about and point blank ask them what safeguards they are willing to allow you to put in place for developing in their system. If the answer is none, walk. If they are willing to let you VPN in, run the code from a local copy over the VPN and node lock it so if someone attempts to serve it from another machine it fails.
Apologies. I’m tired and hate businesses taking advantage of “Independent Contractors”.
Bury it six JavaScript and 2 php scripts deep so it is a pain in the ass to find.
I like to believe that Billy Ignore instructions is Bobby Tables’ kid.