Okay but someone that works in IT will have the same answer.
You have to scroll a bit to get to the main article. That’s the missing interactive content in the blank spaces.
And some of critics’ worst fears have not materialized: The dollar remains the world’s top reserve currency, at least for now.
Imagine throwing this advantage away. As an American, this has no doubt been beneficial to me and I think it’s dumb to just throw that away for short-sighted gains. Though maybe decentralizing the banking system a bit more would be a greater good in the long run for everyone.
You lose some of the nice interactive elements but here it is: How four U.S. presidents unleashed economic warfare across the globe
I feel called out
That’s been changing for me lately. All of a sudden youtube is throwing me curve-balls and it’s great.
Even if you’re poking at a black box and are reporting that “it acts funny when I poke it this way.” I’m my opinion, a reporter should send along a script or at least explicit instructions on how to repro.
I take the report more serious since it demonstrates you have an understanding of the issue or exploit. It will also save my time and it’s likely a trivial effort for the reporter since they’ve the context and knowledge of the issue loaded up and ready to go.
Missing key info. Read the article.
Agree that people like to fluff the severity of bugs they report. It’s better for prestige and bounty payouts. But this is a little more nuanced.
“While I didn’t really intend the module to be used for any security related checks, I’m very curious how an untrusted input could end up being passed into ip.isPrivate or ip.isPublic [functions] and then used for verifying where the network connection came from.”
It’s interesting, that it would be hard to make a case that there was a “vulnerability” in the ip
package. But it seems like this package’s entire purpose is input validation so it’s kind of weird the dev thinks otherwise.
Recurring incidents like these raise the question, how does one strike a balance? Relentlessly reporting theoretical vulnerabilities can leave open-source developers, many of who are volunteers, exhausted from triaging noise.
The researchers need to provide proofs of concept. Actual functional exploits.
It’s not gay if it’s through the hole in the Dude Wipe
No clue what that means. I was thinking more along the lines of how there’s 3+ techniques for async functions. Or that there’s a handful of syntax implementations, versions, and supersets of the language. Or that there are many interpreters all with different standard libraries and quirks.
It’s an annoyingly flexible language.
Oh, and there’s at last 2 other ways to do it too.
The primary source article is way better. The Internet’s Final Frontier: Remote Amazon Tribes
Engineers are often the most territorial bastards I’ve met.
It’s noticeably nice when working in a team of well adjusted folks that can work together.
The red line somehow miraculously moves along with the tank about 10 meters in front of it.
I think the biggest implication here is that they didn’t earn it entirely. That they at least inherited something from their parents. Which would have given them a leg up and they refuse to pay it forward.
Obviously that’s not the case for everyone. For instance, my entire family was poor as far back as I am aware of. None of them had shit or got shit or were able to have a good retirement. So obviously I don’t expect anything from them.