Skip Navigation

Posts
1
Comments
116
Joined
2 yr. ago

  • Great article and one I always share when this argument comes up. It can happen with one simple mistake.

  • My group plays pretty loose goosy with the rules. We just look at it and make a quick estimate of whether something looks in range. They also have little range finder tools that are helpful for quickly determine cones, spheres, etc. We're also the kind of party that doesn't really keep track of gold. Apparently gold has a weight?

    For this reason I actually don't like playing one shots with people I don't know, because they don't play by all of our house rules, lol.

  • "anonymized" sure. I highly doubt they read every message. I'm sure there is lots of de-anonymizing information in the messages themselves

    For example--

    Anon1: "hey jeff, wanna play Minecraft?"

    Anon2: "sure"

    Thus we know Anon2's name is Jeff. I imagine there's a lot of this.

  • Yeah it's honestly way more likely for someone to change the file type and break the file while renaming it, than it is for malware to get past Defender.

  • Isn't that kinda dangerous? Also potentially illegal depending on where you live.

  • Funny, I already had feddit.uk instance blocked so this is nice, lol.

  • I assumed all distilled alcohol was gluten free. Perhaps there are some odd production exceptions.

  • This is my first time reading about this. I'm very curious to hear a lawyer's thoughts on this.

    If you change the bootloader to some other software, how could the company be expected to provide support for something they may have no knowledge of? Suppose I develop some theoretical SnowsuitOS and then complain to Samsung support when it doesnt run on my smartphone? It seems very likely that some conflict in my code could be causing problems, as opposed to an issue with my hardware.

    I feel like to require this, you'd have to prove that the software is functionally equivalent to their software, right? (Side note, isn't this problem undecidable? Program equivalence?)

    If you replace a wheel on a tractor you can pretty easily define what it should and should not do. Determining equivalence seems simpler with a physical situation. On the other hand, I'm pretty sure program equivalence is not a solved problem.

    My point here is that I don't think it's reasonable to legally require a software company to offer support without limits, because they cannot be sure that there is not an issue with the (unsupported) software you are using.

  • What's the signal issue? I use signal on my desktop. Can you not create an account without a phone number? I thought they added usernames a while back.

    Edit: nevermind, it appears you do still need to provide a phone number to sign up, even with the usernames and desktop clients.

  • rule

    Jump
  • Searching "PC tower carrying strap" brings up numerous options on Google. Looks like you can pick one up for ~$20.

  • I'm confused. At a sit down restaurant you can't just walk into the kitchen and make your meal, yet that is a standard place to tip.

  • Permanently Deleted

    Jump
  • They're part of Department of Homeland Security. NSA is part of Department of Defense. So they're actually not, unless you meant this figuratively.

  • Who is the artist? I have seen multiple posts with this art style

  • I've always thought it was so funny when people say tHe aLgOrItHM like it's a bad word or something. I know they mean social media & marketing, but it's funny to think that they're very concerned about something like bubble sort.

  • Esc > E > S > Q

  • I've found on my android phone that the bitwarden prompt comes up more reliably if I tap on the password field instead of the username field.

  • 196 @lemmy.blahaj.zone

    jazz rule