[-] 0v0@sopuli.xyz 9 points 3 months ago

Also add acoup.blog##.darkmode-layer to your filters.

[-] 0v0@sopuli.xyz 10 points 4 months ago
fn foo(x: i32) {
    match x {
        const { 3.pow(3) } => println!("three cubed"),
        _ => {}
    }
}

But it looks like inline_const_pat is still unstable, only inline_const in expression position is now stabilized.

[-] 0v0@sopuli.xyz 10 points 4 months ago

It's because it has to work in pattern contexts as well, which are not expressions.

[-] 0v0@sopuli.xyz 7 points 5 months ago

According to Wikipedia:

In March or April 2023, it dimmed to magnitude 12.3. A similar dimming occurred in the year before the 1946 outburst, indicating that it will likely erupt between April and September 2024.

[-] 0v0@sopuli.xyz 12 points 7 months ago

Yes, for example, syncing on a kernel panic could lead to data corruption (which is why we don't do that). For the same reason REISUB is not recommended anymore: The default advice for a locked-up system should be SysRq B.

[-] 0v0@sopuli.xyz 41 points 10 months ago

https://stackoverflow.com/questions/10602504/how-does-user-js-work-in-firefox-in-detail:

It just looks like a JavaScript file. Once upon a time in Netscape 3 and maybe 4 it actually was, but now it's just a file with a .js extension and a very restricted syntax that's parsed by a separate (non-JS) parser and not executed in any way.

63
submitted 11 months ago* (last edited 11 months ago) by 0v0@sopuli.xyz to c/anarchychess@sopuli.xyz

This is a favourite of mine. White to move. rnbqk1nr/pp1pppbp/6p1/2pt5/3PP3/5N2/PPP2PPP/RNBQKB1R w KQkq - 1 4

(Original posted to !chess@lemmy.ml)

[-] 0v0@sopuli.xyz 37 points 11 months ago

Quad9, a Swiss public benefit, not-for-profit foundation. Main address is 9.9.9.9.

[-] 0v0@sopuli.xyz 13 points 11 months ago

You should not torrent over the tor network, but you can torrent over the I2P network. qBittorrent even has experimental I2P support built in.

[-] 0v0@sopuli.xyz 12 points 1 year ago

Indeed. This works because direct connections to the tor network are easily censored, but WebRTC is not (not without a lot of collateral damage at least).

[-] 0v0@sopuli.xyz 69 points 1 year ago

The snowflake proxy acts as a bridge to the tor network at the entry side. If by repercussions you mean risk of exit-node traffic, there are none. It might cost a little bit of bandwidth.

[-] 0v0@sopuli.xyz 96 points 1 year ago

Memory safety would be the main advantage.

view more: next ›

0v0

joined 1 year ago