nothacking

joined 1 year ago
MODERATOR OF
[–] [email protected] 48 points 7 months ago (1 children)

This is actually how you should declare something that you will never change, but something might change externally, like an input pin or status register.

Writing to it might do something completely different or just crash, but you also don't want the compiler getting creative with reads; You don't want the compiler optimizing out a check for a button press because the "constant" value is never changed.

[–] [email protected] 2 points 8 months ago (1 children)

Make another account to see if a different user/email address gets a different URL, which would indicate that it is used to track users.

[–] [email protected] 6 points 8 months ago (4 children)

It pings out to google constantly regardless of where you are. You should be able remove it with adb, or use an app like NetGuard to block it from acessing the internet.

[–] [email protected] 3 points 8 months ago

And those are just the ones where the authors did not even proofread the thing.

[–] [email protected] 2 points 8 months ago* (last edited 8 months ago)

The wolf thing is a myth, these actually refer to the stages of software deveopment. Alpha is buggy, unstable, missing key features and unsutable for the public. Beta is mostly complete, but may still have bugs or occasional crashes. (So basicly teenagers)

Some recent papers sugest it might also refer to alpha particles, high mass but very low penetration power and depth. These particles are typicaly emitted by high mass atom.

[–] [email protected] 3 points 8 months ago* (last edited 8 months ago)

Its all just weird physics and RF stuff, all they would find out is that I am a giant nerd. Some examples: common base colpitts oscillator, inductance calculator, temerature PIN detector FWHM.

[–] [email protected] 2 points 8 months ago

Gallium explodes people who call it a stupid element. (it used in the plutonium pits of atomic bombs)

[–] [email protected] 2 points 8 months ago

Good news, we are rapidly working on changing that.

[–] [email protected] 21 points 8 months ago

It is clearly titled "double slit".

[–] [email protected] 8 points 8 months ago (1 children)

I don't think so, unless the pirate left a calling card. If you want to make sure, just make the same sheet in pirated and non pirated versions, and compare the file. (They are zip archives, so that will let you see the raw XML)

[–] [email protected] 4 points 8 months ago

Like it or not, this is the ideal body.

view more: ‹ prev next ›