Lately, I’ve been starting with “share” and then react accordingly. It’s just a very good set of letters. Oddly, I really like starting with “h” because of the very common two letter combos: ch, gh, ph, sh, th, and wh.
The configuration is often committed to the repo. And some repos heavily rely on the precommit actions running before you can push or have pipelines function correctly
I know a guy that considers git pre-commit hooks a form of code injection and thus a security risk. So he disables them on repos he works with. And to be fair, it’s absolutely a viable vector for attacking developer machines. I think a tasks.json fits into that exact same bucket.
These kinds of automations are suuuper useful and I do like to use them. But also review a code base before cloning!
I just watched the video. There is absolutely nothing noteworthy about it at all. Did I miss something? Why does this event matter?
It’s literally a very slow video of Biden walking on the plane and later walking off the plane. And there’s a lot of nothing happening as well. I don’t get it
I like that Meta is fined for this bad practice. But why are they paying the state? How does this help anyone that was actually victim of the facial recognition?
I can see an argument based on how state funds help state residents. But it still doesn’t really feel right to me.
A real tangential thought: What if fines claimed by the state didn’t increase the states fund? What if those funds reduced the tax burden of residents from the bottom up?
I listened to a bit of the speech to see if the context helps at all. It doesn’t. He was just asking people to go vote, which is totally fine. But that’s it. Nothing else to warrant a comment like this one. And it sure sounds like no more voting is the plan. Literally. Maybe it’s a thoughtless comment? Yikes
I largely agree. The title and opening words are misleading. The rest of the article is much more clear that they are defending their position of using VPN software that relies on storage and securing it with full disk encryption.
Also, full disk encryption doesn’t solve everything. If an attacker has access to the running server, the disk is unencrypted. At that point, reading files is much easier than reading RAM from a running process.
Don’t worry, it’s much more fair than you may suspect. Some of these are near impossible for me, a native speaker.
ConnectionsPuzzle #439🟨🟨🟨🟨🟪🟩🟩🟩🟪🟪🟩🟩🟪🟦🟪🟪🟩🟦🟦🟪