<a rel="me" href="https://layer8.space/@helix">Mastodon</a>

  • 0 Posts
  • 16 Comments
Joined 1Y ago
cake
Cake day: Jul 27, 2024

help-circle
rss

You’re not as intelligent or elitist as you think you are. Grow up and leave Lemmy if you don’t want to be here.


So apparently he’s doing something. What else should he do? Why spread thin when he has more time than a few weeks?


Is Mamdani a member of the People’s Republic of Judea or Judea’s People Republic? 🤔


You could also generate thumbnails with much smaller sizes and only load hi-res images on click. Did you consider using more JPEG or another algorithm?


Pretty cool demonstration on how streamlined a social network can be. It doesn’t look like much, but then again, it’s not a lot of code and simple enough to have a small attack surface.

I can see this being a good candidate for teaching people how social networks work. I don’t think I’d use it with a friend group when other applications exist (see: network effect) but imagine the whole internet is down and you find a mirror of the python libraries used in the rubble.

Could be used off-grid, for groups of informants to a journalist or in disaster scenarios aswell. Looking forward to a proper release :)


I didn’t question the reviewability of your code, but best practices regarding software development. I don’t mistrust the safety of your code, but the quality of its development process.

You can simply create another account with your Lemmy username to publish your code in a repository.

It’s fine if you have a local or private git repository and publish via pastebin, but you didn’t write that’s the case.


This sentence shows me I shouldn’t trust what you upload yet. Usually software developers put everything on a repository which they can then clean up later if a history rewrite is needed.


Your local craigslist equivalent, face2face


You don’t need to buy from Google if you buy your pixel used.


I’m pretty sure he’s far from the only one. Databases with such a vast amount of “forbidden” knowledge will always be misused.

That’s why we shouldn’t have global surveillance, espionage and “highly classified material” wherever it’s possible for agencies to do their jobs without them.

And I’d argue most of the data the contractor had access to was neither relevant for his own work, nor for the work of all of the CIA.





Chipolo. Small company but it works. Doesn’t really help you find stolen stuff but you can be notified and the things can beep loudly if they are distanced from you.

It helps me find my keys and not forget anything when I leave the house. I guess they already paid for themselves by reducing the time I spend backtracking.

They also have an airtag compatible version.


Or a very very old database system, possibly DB2, where you can’t change the column limits or data types after the fact.