

Ahkshually that would be the K’Chain Nah’ruk, not the Che’Malle
Ahkshually that would be the K’Chain Nah’ruk, not the Che’Malle
Only if they aren’t using customer provided encryption keys (is using blob/bucket storage) or an equivalent approach to encryption at rest, and make sure they’re doing standard TLS for encryption in flight.
It’s absolutely possible, and standard for any decent organization, to build their cloud architectures to fully account for the cloud provider potentially accessing your data without authorization. I’ve personally had such design conversations multiple times.
Yes, ICE, the 22 year old agency is definitely something the US can’t do without. Certainly didn’t manage fine without it for the vast majority of our history as a country. Fucking hell.
Brother Ali don’t miss
Yup, because that’s how adjectives work
The real complaint is people who refer to women as “females” which makes them sound like ferengi. Saying a “female engineer” is just correct grammar. Some folks have instead, lacking a capacity for nuance (and language) taken this to mean that there is an issue with the word “female” in general.
crazy people need dick too
There are literally dozens of us!
basedpyright includes some nice features that Microsoft has otherwise gated behind the closed source Pylance. There’s also (in development) ty from Astral that I’m pretty excited for (ruff and uv have made writing python so much better for me).
I tried, and failed, to get into audio books for years. Then I listened to Dungeon Crawler Carl narrated by Jeff Hayes and what an absolute delight it was. There’s no way I would’ve gotten even 10 minutes in if it was one of those soulless AI voices instead.
That’s my understanding as well, with some “Roman” origin claimed, possibly as propaganda given how the Nazi party liked connecting themselves to ancient Rome as some kind of claim to legitimacy.
I’d love to be able to add the Bellamy salute inspiration bit in when I do have this conversation with folks, but I’d need a better source before I do.
Zero argument on the larger point of Hitler’s idolization of America (the worst bits), quite familiar with it already. Hitler also admired Jim Crow laws and wrote about them specifically.
My point is that I’ve never encountered a reliable source to the specific claim that the Nazi salute took inspiration from the Bellamy salute, rather than being coincidentally similar. The wiki page linked even purports the origin of the Nazi salute to be the “Roman salute”, albeit itself based on bad history.
It’s a point I’d love to be able to make when having this same argument with folks, but I’m not going to tell people that the Nazi salute was based on the Bellamy salute without a better source than a Wikipedia article that claims otherwise.
Your link does not support your claim
Later, during the 1920s and 1930s, Italian fascists and Nazi Germans adopted a salute which was very similar, which originated with the so-called Roman salute, a gesture falsely attributed to ancient Rome.
Do you know of any other accounts that would support the Bellamy salute as being the inspiration for the Nazi salute, apart from looking similar?
them:
this is wild oversimplification
you:
cortisol bad
checks out
Knew a guy named Randy Cox when I was in middle school. Many. Jokes.
yo what the fuck, that is bullshit
There are plenty of things in a normal home that can cause serious signal attenuation (just installed new energy efficient windows? whoops! those IR blocking coatings severely attenuate microwave signals too). Poor AP placement is a very common cause of “slow wifi” and has nothing to do with your internet uplink.
It’s really not even converting, as percent is literally “1/100” (per-cent = per 100). It’s purely convenient shorthand.
If you extract a key from a proprietary client to decrypt a private API, it definitely is illegal. If you do this as a corporation, it would also be easy to detect by abnormal usage patterns tied to your account and presents you as a nice big set of pockets to get sued.
Just screen scraping isn’t illegal, but is fragile as fuck and will break at the worst time and you have no ability to implement version control to manage it.
Measured boot requires secure boot to be enabled as one of its components.
The real value of measured boot is when paired with full disk encryption as it protects against boot loader attacks that can compromise your sealed keys.