

OP’s title would have been better as “first accurate depiction of a black hole.”
OP’s title would have been better as “first accurate depiction of a black hole.”
13/21 here. Mostly got hung up on several “this was valid in earlier RFC, and later removed” kind of situations. There are several where I picked the correct answer, but where I know many websites that won’t accept it as valid, and that’s not even the more esoteric ones.
deleted by creator
Before password composition rules, those were actually quite common, as well as passwords that were just the same as the username. Heck, it wasn’t until that long ago that router manufacturers used to ship with admin/admin as the default credentials.
Ah, it seems that Grok is trained on those high quality Reddit sleuth minds. “We found him!”
Sounds like what you want is tracing. OpenTelemetry is the de facto standard for that. Couple it with aggressive sampling (here’s a great talk on it https://www.usenix.org/conference/srecon24americas/presentation/cruz ) and you’ll have a very efficient way of identifying use patterns.
Only activating the fingerprint reader when the screen is on is a regression compared to the rear reader. It means I need to squeeze the phone to unlock it, vs just placing my finger in the right spot. It also negates the purported advantage from the comment above mine about being able to easily unlock the phone while lying on a table.
I’m not arguing that the power button reader doesn’t work for anyone. I’m saying that it is qualitatively worse UX for me in particular.
I do not like the power button fingerprint reader.
Hackers. Yes, it’s corny - cheesy, even - but it had a great cast with awesome chemistry, and it did a great job at capturing the zeitgeist of hacker/punk culture. Plus so many memorable quotes…
It… it… flames. Flames, FLAMES, on the side of my face!
Only female mosquitoes drink blood, so it sort of checks out.
Mercury is used during gold mining operations. By seizing it they are doing more to prevent damage from the illegal operations than they would by seizing the gold that would have been extracted.
Alternatives: Doner kebab or shawarma.
All ad networks, even the less intrusive ones, can be abused to distribute malware. In this day and age not having an ad blocker is like rawdogging internet strangers.
Upon being asked a difficult question, said “I don’t know. Let me figure it out and get back to you.” And actually did get back to me.
Spoilers!