AtHeartEngineer

joined 1 year ago
MODERATOR OF
[–] AtHeartEngineer@lemmy.world 1 points 1 week ago* (last edited 1 week ago)

Maybe my memory is just shit, it was a long time ago, I got out in 2011

[–] AtHeartEngineer@lemmy.world 1 points 1 week ago (2 children)

Hmm, they definitely had safety clips back then, I just double checked. So might be a different design, but same concept. I just looked at the m67 Wikipedia page and that looks like what I've used.

[–] AtHeartEngineer@lemmy.world 1 points 1 week ago (4 children)

Oh ya I forgot about that, it's been like... Close to 20 years

[–] AtHeartEngineer@lemmy.world 70 points 1 week ago

Ya this was my exact thought, this is Nazism, pretty much the definition of it.

[–] AtHeartEngineer@lemmy.world 5 points 1 week ago

That X is twice as much vram, which funny enough, is great for running ai models

[–] AtHeartEngineer@lemmy.world 1 points 1 week ago

Ah, don't take it that way, I liked the meme.

[–] AtHeartEngineer@lemmy.world 3 points 1 week ago (2 children)

Ya, most grenades have a lever called a "spoon" that you press down that relieves some of the tension on the pin, and when you pull the pin and throw the grenade the spoon flies off and ignites the fuse.

[–] AtHeartEngineer@lemmy.world 39 points 1 week ago (11 children)

A grenade pin is tight, but if people can open beer bottles with their teeth they definitely can pull the pin on a grenade.

[–] AtHeartEngineer@lemmy.world 10 points 1 week ago* (last edited 1 week ago) (2 children)

The internet is our greatest tool for this, yet most people's biggest connection to the internet is scrolling Instagram while pooping, porn, and falling asleep to YouTube or Netflix.

[–] AtHeartEngineer@lemmy.world 23 points 3 weeks ago (4 children)

Wasn't everything at some point?

 

It uses MPC and ZK to prove some data from a server (that uses TLS) is authentic given some request.

One of the simple demos is proving you received a DM from someone on twitter, without sharing your session token or login credentials with the other party.

Another idea is proving you know some exploit (think sql injection) without revealing how you did it.

Or proving you purchased some item off a website so you can review it on a neutral platform (amazon reviews but without amazon being able to manipulate the votes)

 

But when are Google homes getting an update?!?

view more: next ›