You realize that your kernel which loads keys into memory can also access all this right? So can anything which shares memory space on the platform.
It would still be tedious to inspect every bit to ensure that a rogue service isn’t just tacking chunks of noise onto a legitimate data stream. I’d argue that it’s almost impossible to verify that every bit is legitimate unless you also control the host and know exactly what the traffic is supposed to look like.
This wouldn’t be conclusive since it would be pretty easy to just hide these payloads in some other traffic stream to a compromised node, which is a super common way cyberthreat command and control functions. If the user never initiates a connection to the host, the payloads just wait around so as not to generate suspicious traffic.
Obviously the threat model for advertising is a bit different, but there’s no reason someone trying to hide this functionality wouldn’t take similar steps.
Baby cows
To be fair, how many baby cows are even coming to these restaurants??
Ironically outer insulation does impact conductor ampacity, because the rated continuous vs peak loads depend on the heat resistance rating of the insulation.
Merge commits 🙅
Rolling back demo commit
For a lot of experienced people, command line tools are user friendly interface design.
You are not entirely wrong, but just as some advice I would refrain from displaying fear of the command line in interviews.
A copy is fine. I can still seek vengeance on my enemies from beyond the grave.
This is super easy, you just fire all the Java devs and hire real engineers.
Tbh, we just don’t hire people if they can’t operate git.
Every time I click on this link I listen to all the cymbal tracks
I like money
This is completely reasonable, but requires significant CI infrastructure
For the first year or so they become PMs they try.
So it’s like slightly more responsible Python