

Huh, interesting that pop could be realized this time.


Huh, interesting that pop could be realized this time.
I am realizing I were only good at tests… So sad that I am one of the dumbest and just managed to fool some people with grades. But that does not help with real life.


It lists no alternative to actual(-budget) :( I don’t have time to create my own alternative, maybe I should go back to spreadsheets?
Since reward system does not work for me, instead I punish myself whenever I could not finish tasks in time. I do not deserve any rewards anyway. Dunno why I feel so miserable…


Please please please do not bork this one, I don’t want to abandon another game I love. Hopefully it’s not like KSP 2 or Cities Skylines 2
Security by obscurity does not work, because people are only so creative up to a point. Hence, there are only handful of configurations for the attacker to try out.
This contrasts to e.g. 128-bit secure encryption, which involves trying 2^128 times to break it - which is a number with whopping 38 zeros. It takes 10^22 years to break it with trying at 1GHz rate. It is simply incomparable, and adding a few bits of security by obscure combination is simply not worth it.
Yet, so many people and organizations seem to prefer obscurity to actual security.
Oh, do you happen to be a physicist or an analyst?


You know that is a lie, a lip service for the gullible mass. Samsung just does not care about security and privacy because it does not boost their profits.


I see, maybe that’s it. But I’ve also seen many who aren’t rich and get by through scholarships instead. I believe I am one of them - I earn a little bit of money as I pursue my doctorate, although it’s not much. I guess this is impossible in US, maybe…
I do not understand what this has to do with greed.
I don’t think this is matter of mathematics, it is difficult to define what “software only running on desired machine” is. Like, do you permit functionally equal software with different code? With painstaking effort, functionality should be approximated fairly close (although idk what that means in mathematical context) On the other hand, requiring exact code is likely not what they want.
Cryptographic guarantee requires mathematical specification, which seems ill-fit in this scenario.