I would think that role is filled by constants.
I would think that role is filled by constants.
Now, I don’t functional (at all), but if you call a function with no parameters, doesn’t it imply side effects?
How does this exploit work? I understand that inputs were not sanitized, but what did the injected code do?
Fox news called them out??
Jesus. That’s rough.
Apologies for being lazy
I have a vita that ultimately stopped working, and gets stuck in a boot loop (original os, no modding/tampering done). Do you think it’s hardware related? Or could I still flash a new os on that puppy.
Oh boy. I have such a terrible relationship with energy drinks. At one point last summer I was drinking like 4 Rockstar’s and working 10-14hrs a day.
One day I got home after a long stint of 12hr days (11 in a row?) Shotgunned a beer and almost immediately fainted. My roommate saw me go down and get clotheslined on a lawn chair. He rushed out and got me off the chair. I came to with him standing over me with a very concerned look on his face asking me what happened. (Still very out of it) I said, very dismissively and half pissed off, idk man, I was dreaming!
Fun times. Sore neck.
If I can drink 1L of coffee inside an hour I’m in the zone
The tilted text makes me nauseous
Have you ever drank so much coffee it feels like you’re medicated?
Unfortunately, I’m not really equipped to answer your question, but in sure if you reached out to behaws admins they’d point you in the right direction
I think the issue that beehaw had was one of insufficient moderation tooling. Very solvable, and the admins even say that, but they also said they can’t stand around waiting for mod tools to become available, so they’re using the tool they have for the time being. If Lemmy catches on, I’m sure these issues will be solved in due time.
In large part I agree, however, it leaves a problem unsolved.
In the case of cp possession/production, how do you effectively sanitize a person’s internet traffic?
I think providing devices that only connect to state DNS servers, and only serve approved content could be one way. But it also raises privacy concerns.
Except for the “instantaneous” and “Lightspeed” observations, which I think are the real key here. Also, commiting a book crime would require conscious cooperation and coordination with another person/people (the publisher), whereas internet crimes can be done completely solo.
I think a more sensible comparison could be made between computers and telephones or telegraphs
Covenant Eyes doesn’t just block pornography. Though the app is designed to block traffic to adult sites, Hannah shared reports that show she was unable to access The Appeal, a nonprofit news organization that focuses on injustice in the criminal-legal system
LMAO.
the irony is so depressing.
I agree that this is cruel and unusual punishment, however, I strongly dislike the paper == computer metaphor. The two are hardly comparable.
Compared to paper, it is easy to comit serious crimes from the comfort of your own home with a computer. Computers facilitate Lightspeed communication, and can be used for instantaneous financial transaction. They can be used to collect information anonymously, and deseminate information publically.
Very very different risk levels.
That said, subjecting an entire family to 24/7 electronic surveillance (and making them pay for it!?!) Is fucked up. I think we need a different paradigm for dealing with “e-criminals” like perhaps the state provides state-administered devices to those charges with electronic crimes? Idrk, but this ain’t it cheif.
Java 2: you can program anything you want but it has to be a function.