

Is everything premium? If everything is premium, then nothing is premium.


Is everything premium? If everything is premium, then nothing is premium.


I think it has to do with how often you pay for it. With Office, you just buy it, then you own it. With Office 365, you have to pay for it 365 days a year. You just never stop paying for it.


OnlyOffice and LibreOffice are still called OnlyOffice and LibreOffice.
If it hasn’t happened already, Netflix is dropping the new She-Ra show from their service, and they’ve never released a physical form.
Therefore, it is illegal to watch She-Ra.
You actually are (kind of) burning the disc. At least, a layer of organic dye within the disc. With a laser.
Fun fact: It actually is kind of burning. With a laser.
https://en.wikipedia.org/wiki/CD-R#Writing_methods
Not enough to set it on fire, but enough to change a dye from translucent to opaque.
My spoon is too big.
That’s silly. Here, I added an actual to-scale banana to this photo:



That’s what happens when idiots are in charge.


deleted by creator
Giving them the benefit of the doubt, I would think it’s to resist corrosion, but there are plenty of cheaper metals to plate with that don’t corrode, so even that’s a stretch.
Or, you know, plastic.


A lot of people just want a browser that works. They don’t care at all about anything else in the OS. For them, Linux can be perfect. So if they’re disgruntled that Windows keeps shoving ads and AI bullshit in their eyeballs, when all they want to do is check their email and watch YouTube, a preinstalled Linux laptop is a great answer.


Oh come on! I could get through that in just over four days.
I like that one guy’s drug trip from 2000 years ago has caused this hilarious internet meme.
Basically, in public key cryptography, you can generate a set of two big numbers that are mathematically related, one called the private key and one called the public key, collectively called a key pair.
Through a lot of fancy math, you, with your private key, can take a number I give you and give me back another number called a signature. I, with your public key, can do even more fancy math to prove that you do, in fact, have the corresponding private key to the public key I have, based on this signature.
If you give me the wrong signature, I can’t trust that you have the private key, and you don’t get authenticated, but if you give me the right signature, I can trust that you’re you, and you get authenticated.
A number of things. The key is stored on and accessed by a separate coprocessor from the CPU, so the CPU doesn’t even know the private key. That takes its own protocol, over i2c, usb, Bluetooth, etc. Then the browser has to coordinate that protocol to communicate with the web protocol from the frontend JS. There’s also the concept of server verification, so it’s a more complicated handshake than just one signature going one way. Then, of course, there’s the inherent complexity of public key cryptography in general, but you only need to worry about that if you’re writing it from scratch with no library.
From a basic web dev perspective, it’s not much more complex than a password, but that’s because the complexity of the protocols is hidden behind the libraries. A password actually isn’t complex, even when you remove the libraries.
(The private key does not have to live in a separate coprocessor, but that’s the most secure method, and the one covered by the protocol.)
Here, these specs are what they’re based on:
Do they not make cap guns anymore?