You can disable specific warnings as a project setting, not just with rustc/cargo but with every build toolchain I’ve used in the last ~10 years. It’s very common for me to find a project with at least one specific warning disabled. That really isn’t a “trust me bro” – people can look at the project, see which warnings are disabled, and decide for themselves if that is reasonable.
- 2 Posts
- 25 Comments
The remark about style warnings is really alien to me. Style warnings are something I’m accustomed to when programming in nearly any language. I can’t remember the last time I used a language where whatever IDE I happened to be using didn’t have style warnings. And I’ve never had trouble adapting. “Oh right, C# convention is PascalCase methods. Oh, Java is camelCase”. In fact I’ve been jumping between a C# project and a Java project recently, and I haven’t been finding it difficult. Rustc having some linter-type warnings built in is a bit novel I guess, but really not a fundamentally different experience. It’s really not any more difficult to disable those warnings for a Rust project than for a C# project. I don’t think I can understand calling that “not okay”.
Dipoleto
FursuitSex: Murrsuits + Softsuits•Got any pointers for someone getting into fursuit selfies? \[M\]English
2·7 months agoYou can get a cheap phone holder of some kind and use the timer option of your camera app. A 10 second timer is usually enough to put the last paw on and pose
What is the job?
The article seems to take the stance of “thinking about using a commercial VPN? Just use TOR!”. But in my experience, TOR is glacially slow, and it’s also not suitable for ordinary browsing because of how widely-blocked the exit nodes are. The article at least acknowledges the blocking problem, but for an article which focuses on tradeoffs, it doesn’t acknowledge that there’s a valid trade-off between TOR and a commercial VPN. A commercial VPN is faster and less blocked than TOR, but there is still an entity with direct knowledge of your browsing (the VPN company itself), there is more vulnerability to correlation (the VPN doesn’t [and probably can’t] change your exit node for each website, like the TOR browser would), and a commercial VPN is an expense. You don’t have to jump all the way from “no-one can know which website I’m browsing” to “anyone tapping any leg of my connection can know which website I’m browsing” just because the website blocks TOR exit nodes.
For reference: I have a commercial VPN subscription, which I have connected for my daily browsing – in large part to reduce the cognitive load of “what if X party knew I was visiting Y website” for every website I visit. I also have the TOR browser installed, and use it occasionally – for when I’m concerned about the outcome of “what if the VPN company is breached/subpoenaed/sells my data/etc.”. I don’t put any stake in the ubiquitous “no logs” claims of VPN companies, since it’s completely unverifiable.
I do at least appreciate the article acknowledging the grossly misleading advertising of nearly every VPN company. They advertise their product as solving problems which are solved by HTTPS and not solved by VPNs
DipoletoRule Furry-Four•"I always used to play with staple removers as a kid cuz they look like cool robot viper heads" ~FivelEnglish
3·2 years agoI swear I’ve seen a vrchat avatar that looked just like that, but I can’t find any sign of it
I had the issue reoccur, and I can confirm that the jwt token was missing from the request to /, but present for other resources such as the css stylesheet
I waited for the issue to reoccur so I could test that out. The jwt cookie is missing from the request to / but is present in several of the other resources used for the page. That’s consistent with Crashdoom’s comment. Sometimes, the issue would only occur in a specific tab (refreshing the tab did nothing, but opening a new tab would have me logged in), which is roughly the opposite of what that user reported, but this time, it was a problem in any tab
It’s a “z”, not an “e”
Dipoleto
Linux Furs•The community won the battle, so PvP battler Fishards is now open sourceEnglish
41·2 years agoIf you threaten to do wrong by someone, that’s wrong regardless of whether you are actually willing to follow through and regardless of whether people accurately guess whether you’re willing to follow through.
Dipoleto
Linux Furs•The community won the battle, so PvP battler Fishards is now open sourceEnglish
41·2 years agoI don’t think in-game skill is a fair way to judge that. You can absolutely have a capable developer who is passionate about the game, but who isn’t very skilled at the game itself. And unless the game has an extremely technical target audience, I can expect that most of the players who brought the challenge-winning skills to the table are not also coincidentally people who would be developing or otherwise technically supporting a continuation.
Also, if they release the source and it doesn’t get traction, no-one is harmed. Any procedural and legal clearances should’ve been done before announcing the challenge. To me, open sourcing an EOL game or other product is about giving an opportunity for others to continue or learn. It might be sad if no-one bothers, but it’s still the right thing to do regardless of when or whether someone takes on the challenge.
Dipoleto
Linux Furs•The community won the battle, so PvP battler Fishards is now open sourceEnglish
33·2 years agoWhile I definitely appreciate seeing a game go open source instead of being lost to time, I am furious that they gated that outcome behind challenge, and especially that they were explicitly threatening to delete the game. It absolutely screams “we don’t actually care about game preservation, but we know our fans do, and we’ll exploit that to make them dance for our amusement”. That has very much put them on my “never support” list.
I wasn’t aware that there were any games that could make meaningful use of 16 cores, let alone games that might want more. Was there a major advancement in game programming when I wasn’t looking? Or is the headline as far off base as I think?
DipoletoFurry Technologists•A root-server at the Internet’s core lost touch with its peers. We still don’t know why.
7·2 years ago“If one root server directs traffic lookups to one intermediate server and another root server sends lookups to a different intermediate server, important parts of the Internet as we know it could collapse”
this doesn’t pass the sniff test. Records sometimes being out of date for some users is par for the course for DNS. Domain owners already need to account for that. Also, the "intermediate server"s in question would be things like the .com and .org operators’ servers. I would hope the likes of Verisign and the Public Interest Registry can handle a delay in sunsetting a DNS server to accommodate something like this.
DipoletoFurry Programmers•What was your first programming language? What is/are your most used?English
3·2 years agofirst: C++ most: Rust
Any system where the most severe outcome is “A moderator will look at it” is an easy sell for me, so I wouldn’t have any problem with 1 or 2. And an opt-in system of nearly any kind is going to be okay by me so long as it doesn’t stand to harm anyone who hasn’t given informed consent, so 3 also sounds fine.
With 4, I’d definitely want more details on what is considered “a significant risk or pattern of spammy behavior” and on why the temporary suppression “may break existing conversations or prevent new ones” before being comfortable with such a system.
DipoleOPto
What is this thing?@lemmy.world•What is this 3-connector cable with RCA, 4-pin mini-DIN, and 7-pin mini-DIN?English
1·3 years agoLikely Solved
Of the options people have presented, a video card is by far the most likely for us to have owned at the era those options are from. The two-way arrow symbol on the connectors does give a little bit of doubt, but it seems pretty clear at this point that if I still owned the matching product, I wouldn’t use it, and that’s enough info for my needs
DipoleOPto
What is this thing?@lemmy.world•What is this 3-connector cable with RCA, 4-pin mini-DIN, and 7-pin mini-DIN?English
1·3 years agoBoth din connectors have a two-way symbol





It took me an entire year to realize your reply was also a link to an argument. I thought you were just stating your conclusion without bothering to explain, and was more than a little irritated. Sorry.
The main thesis of the linked article is that a VPN is a glorified proxy, but that’s what I’ve always viewed commercial VPNs as – proxy-as-a-service. The word “proxy” hadn’t been at the forefront of my mind but it was the same mental model. And that’s the only reason I’ve used (and still use) them. And that is consistent with the statements in my original reply. I can look at companies that advertise themselves as proxy services to see if I can get a better deal, but my current VPN plan comes with my current cloud storage plan, so unless I change that (which I am considering), it doesn’t save me any money to switch.