

A Klingon bird of prey, or a romulan bird of prey?


A Klingon bird of prey, or a romulan bird of prey?


An object is a poor man’s closure.
A closure is a poor man’s object.
These are two sides of the same coin, and both of them miss the point. You should be dealing with scale, and you should use a language that allows you to concisely describe how to compute large amounts of data easily. The best part is that once you start writing APL, you’ll feel like a wizard.


this could be better if it used subdomains to an evil extent - extract the main domain intended and use that:
google.com => google.phishy.pc-helper.xyz/whatever-bullshit-key-they-need
Bonus points if it works for any subdomain.
Extra bonus points for a subdomain that includes https and www (e.g. https.www.google.com.phishy.pc-helper.xyz)


My tractor thinks she’s sexy
It really turns it on…


Source: worked on something similar a long time ago
Likely hash based scanning like most virus scanners. It will have a set of signatures for various types of malware (keyloggers, local DNS servers, etc), and looks through the apk (which is just a zip file) for things it knows are bad like financial malware added to the app.
Their process for adding signatures to their database and how they label them is fully opaque and completely up to them, like any other antivirus company. So they could incorrectly label things intentionally and you’d have no way to know.
given your device is now compromised you should probably get a new one unless you trust android is able to fully remove the app. Because some financial malware will intercept 2fa sms from your bank.


You’re forgetting the part where they had an option to disable this fuckery, and then proceeded to move it twice - exposing containers to everyone by default.
I had to clean up compromised services twice because of it.
According to starch cube theory, two pizzas stacked on top of each other is a cake, same as lasagna.
Clearly you didn’t take the axiom of choice. Because otherwise you could have chosen to not make that monstrosity


Google Docs is the worst IDE ever
Squirrel vs snail - who wins?
The amount of ink that comes with an inkjet printer is tiny. So a new printer comes with 10mL of ink, and the refills are 35mL or more. You quite literally get what you pay for.
The other reason is that inkjet printers need to be used on a regular basis, or the ink can dry out. But manufacturers have handled this by having the printer drip out tiny bits of ink all the time, so it’s literally using the ink even when you aren’t using it.
For the vast majority of people, a cheap laser printer is the far better option. Unless you want to produce art prints, but at that point you’re looking at spending a ton of money anyways.


I get very far by just keeping a set of folders for each piece of equipment in a git repo.
Pictures, etc, and sometimes the PDF manual if I bother.
The difficult part here is being consistent over time - making sure you mark down when you bought things, serial numbers, etc. a proper website/app will force you to do this, but there is flexibility in having whatever convention you like most


My favorite is from reading through a military analysis of the siege of Gondor, I learned that Tolkien included a reference to the Song of Roland
Strongly agree. A guide for dead simple setups would be incredibly useful (e.g. gsuite as idp, oauth for a single app).
It took me a few days to get that basic setup working, and a few days more to improve it. But once it was up, it was rock solid.
Keycloak might seem a little daunting to start with, but is basically glue between your idp (ldap) and whatever apps need to authenticate.
A møøse once bit my sister


Is this 4k77, or something else?
That’s what binfmt is for