![](/static/253f0d9/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/c0ed0a36-2496-4b4d-ac77-7d2fd7f2b5b7.png)
3·
5 months agoI would think that role is filled by constants.
I would think that role is filled by constants.
Now, I don’t functional (at all), but if you call a function with no parameters, doesn’t it imply side effects?
How does this exploit work? I understand that inputs were not sanitized, but what did the injected code do?
The audio also indicated that many staff members did not know about the anonymous option
I may be mistaken, but I believe GN did refer to it as being a sale later in the video, calling back to the part where they stated the facts of the matter.
That said, an auction is a type of sale, so this distinction is utterly meaningless.
Java 2: you can program anything you want but it has to be a function.