![](/static/253f0d9/assets/icons/icon-96x96.png)
![](https://programming.dev/pictrs/image/170721ad-9010-470f-a4a4-ead95f51f13b.png)
deleted by creator
deleted by creator
deleted by creator
One from JWZ: mysqldump writes out a date that it cannot parse (and more)
Just be careful naming your function “stdout()” or things could get weird…
And then notice the spelling error.
Is this just an article from The Register inside an msn wrapper with additional enshittification on top?
Original article and comments: https://www.theregister.com/2024/04/06/register_kettle_xz/
Is that supported in any common operating systems?
The only downside of being in GMT is that programmers here almost never notice their timezone bugs when developing systems in the winter.
Still, avoiding a whole other class of bugs would be nice.
deleted by creator
Unix timestamp is always in UTC
Careful with the exact phrasing here - while the epoch was at midnight in GMT, the time from which time_t is measured also exists in other timezones.
there are 24 time zones
Cunningham’s law says that this will generate some discussion in the replies!
Why did GitHub suspend Lasse’s account? Isn’t having that account open the quickest way to fix the problem when he gets back from holiday?
The prominent one was called Marutukku - and the developer turned out to be someone who might actually need the feature.
One possible countermeasure being https://en.wikipedia.org/wiki/Deniable_encryption
“oh, the line you are typing is incomplete and therefore the whole file is invalid which means there is nothing to suggest for autocomplete”
The human in this protocol fixes the “false-positive” problem:
Consider the case where the technical system has just sent an alarm that “ransomwarelettuce hasn’t been following their usual internet routine for the last week, and therefore they must be dead”
ransomwarelettuce meanwhile is unconscious in a hospital after an accident that destroyed their phone and all of its 2FA methods, but will eventually wake up and be super-embarassed if their documents were published!
If the technical system is primary, it immediately publishes your “don’t publish this while I’m alive” documents.
If the technical system is filtered through some human system such as the remote lawyer, they try to phone you, contact your family, contact the hospitals, search for news stories about you, before publishing the “don’t publish this while I’m alive” documents.
Tech people are overthinking this. You pay a lawyer to do something when certain conditions are met.
Deviant has a talk about setting up a similar protocol for their group of friends to access passwords - https://m.youtube.com/watch?v=6ihrGNGesfI
In that case the protocol involved the lawyer contacting certain people to ensure consensus that the person is really in need of help, but the protocol can be whatever you want.
When someone copies from stack overflow, a reviewer’s first question should be “did you copy the question or the answer?”
That is essentially what the “Post-Open Source” idea is trying to do.