

Horrible article, just repeating Apple’s PR with some irrelevant anecdotes. Zero substance


Horrible article, just repeating Apple’s PR with some irrelevant anecdotes. Zero substance


Just because I know what a valid IP is doesn’t mean I’m not an idiot 😎


Don’t get me wrong, I’m not disappointed they did this experiment. I’m disappointed they didn’t find a good way to get out of it. After reading this I still can’t tell if you could have your friend lick your tongue to get you unstuck, or your tongues would stick together instead.


Summary for people who, like me, want to know the solution in case this happens:
Panic only a little
If you’re asking: Then what was the point of this study?


Remember? Did it ever stop? I don’t understand the obsession with making a worse version of something that already exists. Go make your own music


Same with behind blue eyes cover by limp bizkit. They are both watered down version of the original, yet more popular


Does it actually get deleted? I have seen too many cases of ‘Somehow deleted data has returned’ to believe that request does anything.
Of course it’s @[email protected]


pebis


Is chess a roguelike?


Right, as if anyone actually cares about the children ™️


Nepartment of Iomeland Hecurity
That’s a weird hill to die on, I should know I die on weird hills every day


I apologize if my comment came off as an attack, that was not my intention.
I appreciate you putting in the effort to bring up a concern, but I still don’t get it.
Hope you enjoy your weekend


I not sure what you are trying to argue.
Even if you audit the code yourself, you still need to trust your OS, you need to trust the hardware the OS is running on, and you need to trust the proprietary drivers of each component in that hardware. Then at that point you gotta trust the person who sold you the hardware hasn’t modified it.
Ok and?


Was it Changes?


Haha right! That’s a good idea, don’t use dd actually
How can you find a sword mid-battle in the dirt? Black and white dirt nonetheless!