

What are you, 12?


What are you, 12?


Ummm… I’m pretty sure it’s 255.255.255.0 ? …or maybe it’s .256…
No wait, it’s [ABCD::EFGH]


If it’s that good, it’s worth spending some time contemplating.


troyandabedinthemodem


It is 2025 and the Pinkertons are still in business.


30 hard drives of bitcoin, you say? Why are you asking me to turn in 20 hard drives for evidence when there were only 10 hard drives?


Persecuting US citizens exercising their right to free expression is anti-American.


This is a ploy. Cuellar publicly snubs Trump to appeal to anti-Trump voters and drag votes away from other, better candidates.


How is internal company employment policy within the FCC’s jurisdiction?


…states’ rights?


What is that, about 10 minutes of revenue?


I suspect this is what the payment requirement is really about. Like, yes they’re getting money, but they’re also getting a credit card transaction at the gate at the date and time of travel.
It’s always possible that someone else purchased your travel ticket for you (for instance I sometimes travel for work which my employer’s travel agency books for me). But if you have to pay at the moment when your ID would be checked, presumably that has to be your personal card that you have on you in the moment.


but how else will we track where everyone is all the time


OK, sure, but again the claim was:
there is no problem in keeping code quality while using AI
Whether or not human-written code also requires review is outside the context of this discussion, and entirely irrelevant.


OK, sure, but again the claim was:
there is no problem in keeping code quality while using AI
Whether or not human-written code also requires review is outside the context of this discussion, and entirely irrelevant.


Oh, it’s not, the difference is that the SVG is an unexpected delivery vector.
The script on a website might change over time, might be blocked by an extension like uBlock origin that prevents sections of web code from loading in the first place. You can block a website’s JS with an extension that specifically does that, like jshelter. A malicious SVG is static, the malicious code is malicious forever and is embedded in the file. A browser extension can’t selectively block pieces of the file from loading.
Script blocking extensions prevent web page code from loading, but they don’t prevent the application from executing JS. If you open an SVG, the file is downloaded locally (it’s not web code) and the JS in the file will execute locally, with the same permissions and file system access as the user opening the file.


Yup.
There’s always value in understanding risk, and in limiting it.


the security risks associated with JavaScript are not typically seen as significant since your filesystem is not accessible and most any other vulnerable data isn’t either for that matter
go on mate, pull the other one!
Rowhammer is unfixable, by the way, until someone invents a replacement for DRAM.
Hmm… counterpoint: Arm Holdings