![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/h1ChnLuBHr.png)
Reading thoughts remotely is a no-go, you need very precise measurements of the brain’s electrical activity and that just can’t be done with distant sensors.
Reading thoughts remotely is a no-go, you need very precise measurements of the brain’s electrical activity and that just can’t be done with distant sensors.
Did you mean to leak your email in that screenshot?
I hear WebP can often offer much better compression than PNG in lossless mode so that could be an alternative.
This isn’t a graph, it’s a phylogenetic tree. It doesn’t need units or labeled axes (and they wouldn’t make much sense anyways).
I’ve never had them ask for a photo ID so idk.
No need for all these new-fangled tools when good ol’ dd
does the job just fine. (Though they certainly reduce the chance of accidentally nuking the wrong disk).
I’ve had that a few times on my accounts (I scrape content so they get suspended relatively often) and I always just grab a photo from thispersondoesnotexist.com and crop out the watermark. It hasn’t failed me yet.
Who needs private variables when you can generate cryptographically secure variable names? Much better security.
It’s great, just give your cloud servers public IPs and you get tons of completely free vulnerability scans! This life hack has saved me tens of thousands of dollars in pentesting.
Gotta review the 5 line PR ten times just to make absolutely totally sure there’s nothing wrong with it before submitting it.
It can if you set up proper security but, well, the US government isn’t exactly known for that.
so just don’t take pictures of classified stuff while carrying around a weirdly warm battery bank an unusually attractive eastern European girl gave you as an engagement gift and you’re good.
Lmao, I really hate it when that happens.
Gotta put on those invisible tracking codes.
You could encrypt the backup codes with a strong password using something like AES, then print the encrypted data out in hexadecimal or base64.
What’s even up with that guy? What’s he trying to accomplish? Spammers confuse me.
Now recursively create more layers until you have barely any free space left on the disk, then do some performance benchmarks. ;)
Seems like it would be fairly inefficient having to encrypt and decrypt data twice.
I just grabbed the original program from Wikipedia and put it in a code block.
Looks like the backticks in the program messed up the formatting a bit, here’s it with fixed formatting.
(=<`#9]~6ZY327Uv4-QsqpMn&+Ij"'E%e{Ab~w=_:]Kw%o44Uqp0/Q?xNvL:`H%c#DD2^WV>gY;dts76qKJImZkj
Not that it’s any more intelligible. :D
I’m no expert in biology but the way I understand it our brains all work in roughly the same way, so I don’t think that would be possible.