TheOneCurly

joined 2 years ago
[–] TheOneCurly@lemm.ee 12 points 1 week ago (1 children)

Home grown slop is still slop. The lying machine can't make anything else.

[–] TheOneCurly@lemm.ee 7 points 2 months ago (3 children)

The killer product being the lying machine or the deleting working code machine? I think there's a small number of people for who these tools really fit into their workflows but they are not universal so there's limited growth and they're already wildly unprofitable.

[–] TheOneCurly@lemm.ee 14 points 4 months ago

It has basically the same limitations that lemmy-mastodon has. Pixelfed users can follow lemmy communities to see posts in their timelines. They can see top level comments as replies and can also reply to create top level comments. Lemmy users can't follow pixelfed accounts in any way.

[–] TheOneCurly@lemm.ee 4 points 4 months ago

Due to immense anger at the orphan crushing machine, people bribe it with loads of money to not crush one orphan.

[–] TheOneCurly@lemm.ee 5 points 5 months ago (1 children)

This is highly relevant to my interests, thanks for making it!

[–] TheOneCurly@lemm.ee 5 points 5 months ago

Peeking at the gituhb, there has not been basically any activity in the last couple months. The frontend code get continual updates from a dependency bot and otherwise nothing has happened since August.

[–] TheOneCurly@lemm.ee 18 points 5 months ago (4 children)

No love for Lemmy in this survey at all.

[–] TheOneCurly@lemm.ee 1 points 5 months ago (1 children)

I think OP is probably a non-native english speaker and meant something like: "the child used in the example above (10 years old)"

[–] TheOneCurly@lemm.ee 1 points 6 months ago

It is sort of important to know if you do or do not have children on your service.

[–] TheOneCurly@lemm.ee 1 points 6 months ago

Although the binary does not raise suspicions of being packed, as its entropy is not high enough, the presence of API calls to functions like malloc, memmove and memcmp indicates that it can allocate memory to perform malicious functions.

Allocating memory is suspicious?

view more: next ›