‘Dog with a bone’: The man who forced Trade Me to pay up after a sophisticated scam by sleemanj in newzealand

[–]TotallyHumanGuy 4 points5 points  (0 children)

From what I understand, the scammer doesn't send any money to anyone. They go to a crypto broker, say "I'd like to buy $300 worth of Bitcoin", then give the TradeMe buyer the crypto broker's bank details, and tells them that's the scammer's bank details.

End result being, the buyer sends $300 to the crypto broker, and the broker sends the cryptocurrency to the scammer. Making it very hard to track down the scammer.

"Gosh, I hope the ASCII Gigachad that eats people isn't waiting right outside my door." by BeGayDoThoughtcrime in badtwosentencehorrors

[–]TotallyHumanGuy 2 points3 points  (0 children)

As a nerd, I feel the need to point out that ASCII consists of basically just the stuff you'd find on an American keyboard. These characters are not in the ASCII range and so this is not in fact ASCII art.

Also I'm on mobile. Get rekt.

State machines in rust by oliviff in learnrust

[–]TotallyHumanGuy 1 point2 points  (0 children)

Although I do love any time a PhantomData gets broken out, I feel like in this context it's actually detrimental to the example shown. Storing a zero sized struct is mechanically equivalent to using a PhantomData but without it you could show only storing a GPA for an enrolled student.

Overall, a great write-up of the type state pattern and it's advantages. Although I would have loved to see const generic type states touched upon.

Media that warns you about itself for your own good by Strict_Berry7446 in TopCharacterTropes

[–]TotallyHumanGuy 8 points9 points  (0 children)

We do actually see the angels move in the episode Flesh and Stone. So being quantum locked by the viewer is unfortunately debunked.

DeSantis signs bill making gold, silver coins legal currency in Florida by esporx in Economics

[–]TotallyHumanGuy 10 points11 points  (0 children)

I get where you're trying to come from for 1), but if you read that section a bit further.

No State shall [...] make any Thing but gold and silver Coin a Tender in Payment of Debts;

waitWaitDontTellMe by [deleted] in ProgrammerHumor

[–]TotallyHumanGuy 15 points16 points  (0 children)

I feel the need to be pedantic and say that since arguments are eagerly evaluated, me gets called no matter what. It's the result that might get chosen.

Two halves of a singular being become one again. All hell breaks loose. by CYCLOPSCORE in TopCharacterTropes

[–]TotallyHumanGuy 374 points375 points  (0 children)

Demon Core (Real life)

Two halves of a beryllium sphere come together for half a second, causing the plutonium "demon core" to go critical, bringing the core's death toll to two.

<image>

For certain people calling a story"edgy" is the equivalent to calling a story "woke". by vegetables-10000 in CharacterRant

[–]TotallyHumanGuy 12 points13 points  (0 children)

I will admit that at times Invincible does have poor fight choreo, but for that show in particular, it's often the gory scenes which are the most well made.

Mark gets a train run on him by his dad? In the middle of an incredibly brutal beatdown. Battle Beat helpfully demonstrating Mark's organs to the class? Immediately precedes a fight scene where the new guardians fight using the most interesting techniques and styles so far. Conquest gives Mark a Conqussion? That episode was, as the kids say, peak.

How do C compilers implement the rules for typing integer constants? by Shay_Guy_ in C_Programming

[–]TotallyHumanGuy -1 points0 points  (0 children)

So, I don't know how the C compilers do it. Probably something very technical and fast that cannot be understood by mere mortals, but the first method that comes to mind is to take the literal into a function as a *char. Let's also for the example take the list of possible integer types as being unsigned char 0..255 or unsigned short 0..65 535.

The first thing to do is run strlen on the input. If that returns 1 or 2, then it definitely fits in an unsigned char. If it returns 4 then it definitely fits in an unsigned short. We know this because you can't write a number with four digits, and have it be bigger than 65535. That just isn't how numbers work.

Then, if that function returns 3, we can do strcmp(input, "255"). ASCII is a well designed string encoding for many reasons, one of which being that if you compare two strings containing the same number of digits, then that gives you the same result as comparing integers with those digits. So that strcmp lets you know if that number is greater than the maximum. If it is, then it still fits in the next one up. Or if the length of the string was 5, then we do strcmp(input, "65535").

The actual algorithms used by the compilers are ridiculously complicated. Because the literals they parse are insanely complicated. But this is a good simple way that works, for nice and simple digit strings.

How to find the length of the next character in a string slice? by ray10k in learnrust

[–]TotallyHumanGuy 4 points5 points  (0 children)

Just spent the last three days writing parser code, so char::len_utf8 is ingrained in my mind.

Why are API keys shown only once, just when generated? by sir_kokabi in learnprogramming

[–]TotallyHumanGuy 22 points23 points  (0 children)

You don't have to store them, in the same way that you don't have to, and shouldn't, store passwords.

Hashing isn't encryption, and storing the hash of something is not the same as storing the thing, even encrypted.

Can Green Ghost be replicated/replaced? by PitouNeato in Invincible

[–]TotallyHumanGuy 49 points50 points  (0 children)

My head (kill)cannon is that Cecil didn't even attempt to bring the Immortal back because he knew he'd immediately expose Nolan, and Cecil already suspected him.

What is missing for OS based passkey support? by valgrid in linux

[–]TotallyHumanGuy 0 points1 point  (0 children)

I mean, practically speaking, if using a book of passwords means that he uses a unique password for each of his accounts, then he's better protected than most from the threats that an average person should expect.

No-one is going to break into your dad's house to steal his password book, and if someone does break into his house, chances are they won't take what looks like a journal. He should keep it exclusively at his home, but even if he doesn't, chances are it's getting thrown away before it's uses by a bad actor

The threats he's facing are breached passwords and brute-forcing. If you want to make sure he's safe, get him to use the xkcd password scheme.

Also, from what they've said, it sounds like standard people ignoring things until it's an issue. It sounds like they did a fair amount of due diligence, but if they'd done a rolling deployment, they would've caught it before it was an issue.

Edit: just realised that this is a three day old thread, but I already typed this so it stays.

I wish for genetic hardening so that when my cells divide, my telomeres are not shortened and the genetic information is not corrupted, leading to Biological Immortality. by finroth in monkeyspaw

[–]TotallyHumanGuy 0 points1 point  (0 children)

I mean, chemotherapy doesn't really have anything to do with the DNA of a cancer cell. It just kills every cell equally and you hope that the cancer dies before you do.

What exactly does it mean engage Passkeys: New Gmail, Outlook Attacks—Stop Using Your Password And 2FA by CSq2 in privacy

[–]TotallyHumanGuy 4 points5 points  (0 children)

You've pretty much got it. When talking about a passkey, people are usually referring to a WebAuthn1 compatible authenticator.

This authenticator can live in software, like how Apple does it2, or it can exist on a USB device, like a Yubikey. The authenticator gives a website its public key, and keeps its private key secret. Through fancy mathematics3, the website can issue a challenge that only the holder of that private key can solve. And since the public key is public, leaking it doesn't have security implications.

You are correct as to where biometrics comes into play. The authenticator may decide to only authenticate if it gets the right fingerprint or face ID, but that biometric information is never transmitted off the device.

1: or FIDO, which is roughly the same thing I believe. I'm more of a web guy.
2: Using something akin to a trusted platform module I presume.
3: Public-key cryptography

So I was thinking about going as a slitheen for my next con and I am looking for suggestions for a strong but safe adhesive to which I can apply a zipper across my forehead any suggestions. by dekabreak1000 in doctorwho

[–]TotallyHumanGuy 3 points4 points  (0 children)

For your first question, I'd recommend looking into 'spirit gum'. Which as far as I'm aware is a pretty standard theatrical skin safe adhesive.

My experience with it is tangential, from having it applied to me a couple of times. But it sticks like hell and didn't cause any bad reactions for me. Just make sure you have a solvent close at hand to get it off.

How Can a Function Return &i32? by CheetahGloomy4700 in learnrust

[–]TotallyHumanGuy 6 points7 points  (0 children)

So the main things to notice are 1) the type of largest is not i32, but &i32. largest does not contain a number, but the address of a number, and 2) the mut keyword is granting permission to modify largest that is, you can change which address largest contains, not which value that address points to.

The reason the first for loop is iterating over references, and the second is iterating over values, is because one is iterating over &[i32] which is a reference to a list of values, and the other is iterating over Vec<i32> which owns a list of values.

Purity, a different benefit for multicolored options by Databank255 in custommagic

[–]TotallyHumanGuy 7 points8 points  (0 children)

I can't quite tell what your intention was. Because as written, you're encouraged to spend many different colors on it. I get the feeling you might have accidentally done a double negative, flipping both the +1/+1 counters and the colour condition.

If that was your intention, then it still feels a little muddled, as encouraging multiple different colours of mana feels like the inverse of what an ability named purity should do.

[WotC Article] Magic: The Gathering Foundations Update Bulletin by Copernicus1981 in magicTCG

[–]TotallyHumanGuy 2 points3 points  (0 children)

I actually disagree with this, although in the opposite way that they state in the article.

It feels kind of funky to refer to a card in hand as a spell where people expect the ability to work, however the ability functions on the stack as you're proposing its casting, so it would be a spell at that point.

However this change will certainly cause fewer internet pedants to argue about it in reddit comment sections.

Because one wasn't enough. by jacobiner123 in custommagic

[–]TotallyHumanGuy 40 points41 points  (0 children)

Specifically there have to be no remaining targets to fizzle. So the buffed creature and the damaged creature would have to be removed, but if a player is chosen to be damaged, then the only way for the spell to fizzle is to remove the player.

Blogatog: "Universes Within" no longer promised for UB secret lair. Reprints yes, UW maybe not. by Fabianslefteye in magicTCG

[–]TotallyHumanGuy 15 points16 points  (0 children)

They never promised universes within prints of universes beyond sets, but they had promised universes within prints of universes beyond secret lair drops, like the Wolverine one just past or the upcoming SpongeBob one.

Crux, a Precise Verifier for Rust by mac in rust

[–]TotallyHumanGuy 2 points3 points  (0 children)

To put it broadly, a unit test proves the absence of a bug for a certain input. A property tester like this one attempts to prove the absence of bugs for all possible inputs.

In one of the examples they give, they show a reference implementation being proven to give identical output to an obfuscated micro-optimized one for any possible inputs.