I've used it in an unfinished website where all data was stored in a single XML file and all markup was stored in a single XSLT file. A CGI one-liner then made path info available to XSLT, and routing (multiple pages) was achieved by doing string tests inside of the XSLT template.
that's not to say stringent moderation doesn't make a site less welcoming, though. it's about choosing what's the lesser evil to you, i guess.
[1]: https://www.vice.com/en/article/the-man-who-helped-turn-4cha...
Does the kid have to memorise this in the morning so he knows why rooms to go to?
I don't even think my parents were aware of my school timetable. Why would they be? That was my business. It seems a bit weird to me that parents get involved to such an extent.
it's like train timetables, you know. yes, they're meant to be the same every day, but you'd be a fool not to check the updates before you go. that's just how it is in a large chaotic system.
I don't see how, the attacker is cloning the secrets used to sign the request, if they have those secrets there's no way of distinguishing the clone from the original device. The whole security model of secure elements is preventing the keys from being extracted, if you can do that there's no more security than saving the key to a file on your computer.
Of course to get the key they need to physically open the device, so unless someone actually takes your key it's more secure than saving them on you computer.
And I also get blocked on the cloudflare link for some reason.
The picture from Ohio's website too: https://web.archive.org/web/20240612173428/https://www.trans...
ex1: https://darekkay.com/atom.xml ex2: https://feeds.nos.nl/nosnieuwsalgemeen
i do most of my algebraic formulas with the compose key and a custom compose map mostly written by mark shoulson https://github.com/kragen/xcompose
for the above, after a false start picking random unicode characters, i realized that maybe i shouldn't use a modern language because someone who actually uses the language might feel like i was calling them an extraterrestrial, so i switched to googling archaic scripts. i pasted part of the old permic table from wikipedia
>>> s = '''𐍐 𐍑 𐍒 𐍓 𐍔 𐍕 𐍖 𐍗 𐍘 𐍙 𐍚 𐍛 𐍜 𐍝 𐍞 𐍟
... U+1036x 𐍠 𐍡 𐍢 𐍣 𐍤 𐍥 𐍦 𐍧 𐍨 𐍩 𐍪 𐍫 𐍬 𐍭 𐍮 𐍯
... U+1037x 𐍰 𐍱 𐍲 𐍳 𐍴 𐍵'''
>>> print(''.join(c for c in s if ord(c) >= 0x10350))
𐍐𐍑𐍒𐍓𐍔𐍕𐍖𐍗𐍘𐍙𐍚𐍛𐍜𐍝𐍞𐍟𐍠𐍡𐍢𐍣𐍤𐍥𐍦𐍧𐍨𐍩𐍪𐍫𐍬𐍭𐍮𐍯𐍰𐍱𐍲𐍳𐍴𐍵
>>> len(''.join(c for c in s if ord(c) >= 0x10350))
38
>>> permic = (''.join(c for c in s if ord(c) >= 0x10350))
>>> ''.join(random.choice(permic) for i in range(5))
'𐍨𐍓𐍰𐍚𐍠'
and then i tried out the hieroglyphs range >>> print(''.join(chr(i) for i in range(0x13000, 0x14000)))
𓀀𓀁𓀂𓀃𓀄𓀅𓀆𓀇𓀈𓀉𓀊𓀋𓀌𓀍𓀎𓀏𓀐𓀑𓀒𓀓𓀔𓀕𓀖𓀗𓀘𓀙𓀚𓀛𓀜𓀝𓀞𓀟𓀠𓀡𓀢𓀣𓀤𓀥𓀦𓀧𓀨𓀩𓀪𓀫𓀬𓀭...
but realized that most of them were unassigned, at least in my font and probably in the current unicode standard (in case someone discovers a new hieroglyph), so i just did this >>> hiero = (''.join(chr(i) for i in range(0x13000, 0x13100)))
>>> ''.join(random.choice(hiero) for i in range(4))
'𓃾𓂃𓂌𓀩'
you can do all this in python in termux on your phone too (you'll probably have to install it from f-droid) but it's a bit clumsierit's funny how this conversation has swung from the extreme of universal constants of the universe to the opposite extreme of completely arbitrary and historically contingent things like which ideograms (themselves completely arbitrary) are prevented from being posted by implementation bugs in hacker news