Preferably after enslaving them and sucking out as much surplus labor as possible
Preferably after enslaving them and sucking out as much surplus labor as possible
So many don’t understand just how wildly inefficient bureaucratic hierarchies are; what happens isn’t the most profitable thing, it’s the whim of whoever managed to claw their way highest up.
Basically, the decisions are the manifestation of the artificial stupidity of brute force.
The second-highest hit gives a clue as to why:
Relevantly to Lemmy’s existence in the first place, it suggests Reddit as a pretty pivotal training data source, which Reddit tries to cash in on while also killing 3rd party apps due to apathy
How did you find this post? It’s outdated
Can’t believe relevant xkcd hasn’t been posted.
Wow, I thought for sure this was DALL-E.
Shows, I suppose how the existence of these things cheapens what would otherwise be a sense of awe or appreciation.
vertical_horizon_everything_you_want.mp3
Lmao, I remember trying to do that dance and skinning my foot on a jagged floorboard
My friends’ parents were mad but in retrospect, sorta on them for having that janky floor
So it’s basically “some stuff is E2EE, other stuff is not” which, absent knowing which is which, boils down to no E2EE at all.
c/misleadingthumbnails
What if the malady is mere pain and inadequate well-being perception?
Covering edge cases in leetcode be like
Both are <
HTML:
Oh shit, I forgot they used to do unlimited minutes only to the same carrier, so long-distance gf and I had to coordinate our carrier choices
Oh is that why the first android phone was so good? I had a developer edition of that and it slapped. Keyboard was amazing
This was the very top of my “top 6 hours” feed. Checks out
Like anything, depends on the threat model. Private from your little sister? Probably. Private from your boss, at least in the next few months prior to them being leaked? Also probably. Private enough?
That’s to some extent a question that can only be answered individually, as everyone’s threat models differ. I suppose this fact (everyone having differing threat models) is one of the reasons that so many arguments occur over security.
Does Signal back up in plaintext in the cloud? (If so that doesn’t sound like E2E encryption… unless the ‘ends’ are uh… also constituted as the cloud itself which is… defeating the purpose).
Where do the pub/ private keys live, exactly, tbh. (Assuming it is asymmetric encryption that they use?)
Edit: ah, misread. I thought you said that you were not joining it due to it storing plain text in the cloud.
tig