To build on you analogy: if you left your garage door open and people came in and started taking your things, is that not stealing?
To build on you analogy: if you left your garage door open and people came in and started taking your things, is that not stealing?
They could bundle in my idea of having a telephone in your house, not a cell phone more like a land phone
Sorry
• • • ノ( ゜-゜ノ)
You know what they call alternative medicine when it works? Medicine.
deleted by creator
I signed up for a family plan a couple years ago and it’s honestly one of the last subscriptions I would cancel. I can justify it by the literally hundreds of hours of watching ads me and my family would have been subjected to otherwise.
There are plenty of other reasons to do so
My sex toy goes to a different school
Got me good
An offshoot of the LABIA?
Sir this is a Wendy’s
Lose the blackjack too
F91W will never not be supported
Your girlfriend has birthmarks all over her body?
The ol’ Uno reverso countersquat technique, I like it
Make sure to wear your favorite Music Band tshirt.
LLM just autocomplete on steroid.
Funny you should say this. I only have anecdotal evidence from me and a few friends, but the general consensus is that autocomplete and predictive text are much worse now than they used to be.
Rs: “Individual freedoms! No government overreach!”
Also Rs: “Let’s track these motherfuckers so they can be punished.”
I can’t remember, is Lithuania on Trump’s “shithole” list?
What about this scenario:
Would this be considered breaking in? Probably. Here is where the analogy breaks down; if I were to leave the front door of my house unlocked, even if there’s a welcome mat outside, anyone who enters without my knowledge or consent can be charged with breaking and entering (yes, even though no actual breaking is involved).
The interesting thing with public APIs is that there are generally terms and conditions associated with creating an account and acquiring a key, though if you are hitting an unauthenticated endpoint you technically never agreed to them. In this particular case with Authy, it would probably be argued that the intent was to acquire data by exploiting a vulnerability in the custodian’s system and use it for nefarious purposes or profit. I’d call it a hack.