That is essentially what the “Post-Open Source” idea is trying to do.
That is essentially what the “Post-Open Source” idea is trying to do.
deleted by creator
deleted by creator
Deviant has a good talk about this kind of thing (including some other situations to think about) in “A Talk About Risk & Preparedness” - https://m.youtube.com/watch?v=6ihrGNGesfI
One from JWZ: mysqldump writes out a date that it cannot parse (and more)
Just be careful naming your function “stdout()” or things could get weird…
And then notice the spelling error.
Do you have an elected representative who can put this question to them?
Is that supported in any common operating systems?
The only downside of being in GMT is that programmers here almost never notice their timezone bugs when developing systems in the winter.
Still, avoiding a whole other class of bugs would be nice.
deleted by creator
Unix timestamp is always in UTC
Careful with the exact phrasing here - while the epoch was at midnight in GMT, the time from which time_t is measured also exists in other timezones.
there are 24 time zones
Cunningham’s law says that this will generate some discussion in the replies!
The prominent one was called Marutukku - and the developer turned out to be someone who might actually need the feature.
One possible countermeasure being https://en.wikipedia.org/wiki/Deniable_encryption
“oh, the line you are typing is incomplete and therefore the whole file is invalid which means there is nothing to suggest for autocomplete”
The human in this protocol fixes the “false-positive” problem:
Consider the case where the technical system has just sent an alarm that “ransomwarelettuce hasn’t been following their usual internet routine for the last week, and therefore they must be dead”
ransomwarelettuce meanwhile is unconscious in a hospital after an accident that destroyed their phone and all of its 2FA methods, but will eventually wake up and be super-embarassed if their documents were published!
If the technical system is primary, it immediately publishes your “don’t publish this while I’m alive” documents.
If the technical system is filtered through some human system such as the remote lawyer, they try to phone you, contact your family, contact the hospitals, search for news stories about you, before publishing the “don’t publish this while I’m alive” documents.
Tech people are overthinking this. You pay a lawyer to do something when certain conditions are met.
Deviant has a talk about setting up a similar protocol for their group of friends to access passwords - https://m.youtube.com/watch?v=6ihrGNGesfI
In that case the protocol involved the lawyer contacting certain people to ensure consensus that the person is really in need of help, but the protocol can be whatever you want.
What they mean is that the variable names and function names are documentation.
For example changing “for( i in getList() )” to “for( patient in getTodaysAppointments() )” is giving the reader more information that might negate the need for a comment.