![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
It seems to me like a MITM hacker can just redirect all requests to a Blockchain node towards their malicious node.
It seems to me like a MITM hacker can just redirect all requests to a Blockchain node towards their malicious node.
Actually, that’s not quite as clear.
The conventional wisdom used to be, (normal) porn makes people more likely to commit sexual abuse (in general). Then scientists decided to look into that. Slowly, over time, they’ve become more and more convinced that (normal) porn availability in fact reduces sexual assault.
I don’t see an obvious reason why it should be different in case of CP, now that it can be generated.
How do you declaratively apply the configuration? Is that a feature of Kvaesitso?
I see there an access violation…
What social contract? When sites regularly have a robots.txt
that says “only Google may crawl”, and are effectively helping enforce a monolopy, that’s not a social contract I’d ever agree to.
Let’s be fair, it’s actually about all those people whose password is “password”. But it is annoying to those who use 15-character random strings for passwords.
That’s not very deep. Closer to plain old logistic regression, really.
Never tried magit, but it doesn’t matter. It couldn’t possibly be good enough to be worth using an inferior editor.
The ease with which I can only commit separate hunks with lazygit has ensured I use it for commits, too. And once I’ve opened it to do the commit, I may as well also press P
.
Learning git is very easy. For example, to do it on Debain, one simply needs to run, sudo apt install lazygit
I’m somewhat skeptical. What if LetsEncrypt decided to misbehave tomorrow? Would the browsers have the guts to shut it down and break all sites using it?