To add some more context. Microsoft (and a lot of tech companies) have a relatively big presence in Israel, and that includes a lot of Israeli employees and acquired business.
To add some more context. Microsoft (and a lot of tech companies) have a relatively big presence in Israel, and that includes a lot of Israeli employees and acquired business.
I understand your take and mostly agree with you. I just want to emphasize I’m not trying to call anyone a dummy or anything, just that it’s OK to like what you like.
If companies aren’t going to cater to you, yeah that’s annoying in most scenarios.
Java when you don’t put in a try catch, vs Template<typename T> in Cpp
If you ordered a cookie and didn’t get what you want, that sucks and is indeed frustrating.
However I don’t know what that has to do with anyone else. If someone wants to eat an almost raw cookie, or a too soft cookie or whatever, I don’t think that should bother you.
I don’t know who needs to hear this, but Python, like most languages, can be as complex as you make it.
Brother, life is too short not to leave when you want.
Can someone ELI5 how searx works and if it’s worth the hassle of hosting? I’m privacy conscious but not paranoid.
Very informative, I think people will learn from what you’re saying, but it doesn’t really matter to what I’m saying.
Yes, absolutely, consider the human element in your data encryption and protection schemes and implementations.
Beating someone with a pipe is a joke, but not really defeating an algorithm.
I appreciate the explaination, that’s a cool scheme, but what I saying is the human leaking the key is not the fault of the algorithm.
Everyone and everything is, on a very pedantic level, weak to getting their ass beat lol
That doesn’t make it crypt analysis
Doesn’t break the algorithm though, you would just have the key and then can use the algorithm (that still works!) to decrypt data.
Also you’re talking about one class of cryptography, the concept of key knowledge varies between algorithms.
My point is an attacker having knowledge of the key is a compromise, not a successful break of the algorithm…
“the attacker beat my ass until I gave them the key”, doesn’t mean people should stop using AES or even RSA, for example.
No, really though, where’s it from?
Where is this from? I don’t think exposing the key breaks most crypto algorithms, it should still be doing its job.
Employed
I know this is supposed to be humorous, but there’s a reason why these languages can, and are doing what they’re doing.
Core dumps are also worth learning about, they’re really helpful if you understand them.
Listen, I see from what you said, what your worldview and values are, and I’m here to remind you that they’re wrong.
/s
Does this function like RDP? It’s one of the better products to come out of Microsoft.
Nvidia does the same shit for GPU drivers, it’s obnoxious