wyrmroot

joined 2 years ago
[–] wyrmroot@programming.dev 4 points 4 months ago

This was an awesome read!

[–] wyrmroot@programming.dev 17 points 4 months ago

Converted to electric? This thing is incredible.

[–] wyrmroot@programming.dev 24 points 5 months ago

Oh shit we making beans again?

🫘

[–] wyrmroot@programming.dev 1 points 5 months ago

Right now, a lot of MUNYA

[–] wyrmroot@programming.dev 49 points 5 months ago (1 children)

Whereas eclairs what??

[–] wyrmroot@programming.dev 19 points 5 months ago

No thank you I am allowing these wild fan theories to beam directly into my skull.

[–] wyrmroot@programming.dev 3 points 5 months ago

Make sure you get fast-setting concrete. It’s the difference between the time being about an hour vs about a day.

[–] wyrmroot@programming.dev 3 points 5 months ago

The video game that taught me how good video games could be. I still replay it every few years.

[–] wyrmroot@programming.dev 2 points 5 months ago

I agree! These have a cork cushion inside, I’m a big fan after wearing for 1 year.

[–] wyrmroot@programming.dev 4 points 6 months ago (4 children)

A pair of Lems Chillum shoes. They have a wide toe box and zero drop but still look and act like a real shoe compared to something more “barefoot”. My current daily driver.

[–] wyrmroot@programming.dev 2 points 6 months ago (2 children)
[–] wyrmroot@programming.dev 21 points 6 months ago* (last edited 6 months ago) (2 children)

This is not the case, but I do still disagree with the “trust me bro” approach to a feature rollout that does send data your somewhere, encrypted or not.

Edit: For those interested, the reason it's not the same as a backdoor is that the result of the computation done on HE data is itself still encrypted and readable only by the original owner. So you can effectively offload the work of a certain analysis to a server that you don't actually trust with your keys.

view more: ‹ prev next ›