In the context of cryptography, authentication means "ensuring that the message you got comes from who you think it did".
Authentication is how we prevent the man-in-the-middle attack.
Authentication is one of the hardest parts of cryptography, because the only truly secure way to do it is by driving to the other party yourself to establish a pre-shared key so you can do message authentication code. Or to share your public key with them if you are satisfied with the safety of post-quantum cryptography.
"P2FKH" terminology mentioned e.g. at: Data Insertion in Bitcoin's Blockchain by Andrew Sward, Vecna OP_0 and Forrest Stonedahl.
The default feathers-chat app runs on NeDB (local filesystem JSON database).
Ciro Santilli managed to port it to Sequelize for PostgreSQL as shown at: github.com/cirosantilli/feathers-chat/tree/sequelize-pg
In 2024 they started making tumblers illegal:
So why privacy coins weren't fully forbidden then?
This should only be used for things that happen outside of the state that React trackes, e.g.
window
event handlers.Examples:
convert -size 256x256 gradient: out.png
convert -size 256x256 gradient:white-black out.png
convert -size 256x256 gradient:red-blue out.png
convert -size 256x256 radial-gradient: out.png
convert -size 256x256 radial-gradient:white-black out.png
FFmpeg is the assembler of audio and video.
As a result, Ciro Santilli who likes "lower level stuff", has had many many hours if image manipulation fun with this software, see e.g.:
- the "Media" section of the best articles by Ciro Santillis.
- Figure "Ciro knows how to convert videos to GIFs"
As older Ciro grows, the more he notices that FFmpeg can do basically any lower level audio video task. It is just an amazing piece of software, the immediate go-to for any low level operation.
FFmpeg was created by Fabrice Bellard, which Ciro deeply respects.
Resize a video: superuser.com/questions/624563/how-to-resize-a-video-to-make-it-smaller-with-ffmpeg:Unlike every other convention under the sun, the height in
ffmpeg -i input.avi -filter:v scale=720:-1 -c:a copy output.mkv
scale
is the first number.This is the kind of mind-bending argument twists that Ciro Santilli loves. If we take out the "a real child is hurt" aspect, does it still make sense to make it illegal?
Of course, hentai of young-looking girls has already existed since forever. Bit with newer image generation methods in the 2020s used for computer generated child pornography, especially sometimes photorealistic text-to-image generation, things are taken to another level.
Notably, the octonions are not associative.
This one might actually be understandable! It is what Richard Feynman starts to explain at: Richard Feynman Quantum Electrodynamics Lecture at University of Auckland (1979).
The difficulty is then proving that the total probability remains at 1, and maybe causality is hard too.
The path integral formulation can be seen as a generalization of the double-slit experiment to infinitely many slits.
Feynman first stared working it out for non-relativistic quantum mechanics, with the relativistic goal in mind, and only later on he attained the relativistic goal.
TODO why intuitively did he take that approach? Likely is makes it easier to add special relativity.
This approach more directly suggests the idea that quantum particles take all possible paths.
Unlisted articles are being shown, click here to show only listed articles.