Now, I don’t functional (at all), but if you call a function with no parameters, doesn’t it imply side effects?
Now, I don’t functional (at all), but if you call a function with no parameters, doesn’t it imply side effects?
How does this exploit work? I understand that inputs were not sanitized, but what did the injected code do?
Ok, so I looked at 4get’s faq, and before I even got throught the first question, I was stopped in my tracks by the word ‘Globohomo’. I looked it up on urban dictionary and it’s a portmanteau of ‘globalist’ and ‘homosexual’.
Wtf?
Who are these people?
E: after reading the whole FAQ, it seems to be one person’s FOSS project. They seem cool, although, I still wonder about their political affiliations.
Apologies for being lazy
I have a vita that ultimately stopped working, and gets stuck in a boot loop (original os, no modding/tampering done). Do you think it’s hardware related? Or could I still flash a new os on that puppy.
The tilted text makes me nauseous
Unfortunately, I’m not really equipped to answer your question, but in sure if you reached out to behaws admins they’d point you in the right direction
I think the issue that beehaw had was one of insufficient moderation tooling. Very solvable, and the admins even say that, but they also said they can’t stand around waiting for mod tools to become available, so they’re using the tool they have for the time being. If Lemmy catches on, I’m sure these issues will be solved in due time.
In large part I agree, however, it leaves a problem unsolved.
In the case of cp possession/production, how do you effectively sanitize a person’s internet traffic?
I think providing devices that only connect to state DNS servers, and only serve approved content could be one way. But it also raises privacy concerns.
Except for the “instantaneous” and “Lightspeed” observations, which I think are the real key here. Also, commiting a book crime would require conscious cooperation and coordination with another person/people (the publisher), whereas internet crimes can be done completely solo.
I think a more sensible comparison could be made between computers and telephones or telegraphs
Covenant Eyes doesn’t just block pornography. Though the app is designed to block traffic to adult sites, Hannah shared reports that show she was unable to access The Appeal, a nonprofit news organization that focuses on injustice in the criminal-legal system
LMAO.
the irony is so depressing.
I agree that this is cruel and unusual punishment, however, I strongly dislike the paper == computer metaphor. The two are hardly comparable.
Compared to paper, it is easy to comit serious crimes from the comfort of your own home with a computer. Computers facilitate Lightspeed communication, and can be used for instantaneous financial transaction. They can be used to collect information anonymously, and deseminate information publically.
Very very different risk levels.
That said, subjecting an entire family to 24/7 electronic surveillance (and making them pay for it!?!) Is fucked up. I think we need a different paradigm for dealing with “e-criminals” like perhaps the state provides state-administered devices to those charges with electronic crimes? Idrk, but this ain’t it cheif.
I would think that role is filled by constants.