• 13 Posts
  • 83 Comments
Joined 2 years ago
cake
Cake day: July 1st, 2023

help-circle



  • woloto196What do you pick rule.
    link
    fedilink
    English
    arrow-up
    1
    ·
    17 days ago

    You could pass through anything as long as you’re willing to destroy it in the process

    If you work in demolition you could take out a wall by continuously teleporting through it, if you wanted to do typical superhero stuff it would be good in a fight but nonlethal attacks aren’t really an option


  • woloto196What do you pick rule.
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    18 days ago

    Being able to teleport into a region already containing air without creating a nuclear blast requires that you can already either instantly displace the air in the target region (which would make a Very Loud Noise) or switch places with it, so there are possible interpretations of the power where teleporting into a fence would leave behind a detached section of fence or bend it out of your way


  • wolotolinuxmemes@lemmy.worldJust edit the config file, so easy!
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    1 month ago

    NixOS has the potential to do really well here. The Nix language has a rich enough type system to generate GUI forms for every field, and there are several projects being worked on that allow editing NixOS options from a GUI. They’re still very janky, but it’s definitely possible to get to a point where a layperson could operate them without breaking their system.



  • They could make it difficult to open up the camera and extract its signing key, but only one person has to do it successfully for the entire system to be unusable.

    In theory you could have a central authority that keeps track of cameras that have had their keys used for known-fake images, but then you’re trusting that authority not to invalidate someone’s keys for doing something they disagree with, and it still wouldn’t prevent someone from buying a camera, extracting its key themselves, and making fraudulent images with a fresh, trusted key.



  • The primary reasoning I’ve heard is that it’s easier to do arithmetic with numbers that are factors of your numeral base and 12 has more factors than 10 (1, 2, 3, 4, 6, 12 vs. 1, 2, 5, 10)

    Base 12 seems a little impractical to me since humans have 10 fingers, which makes base 10 easier to teach to children, but it’s a matter of opinion i guess

    τ is equal to 2π, which allows the formula for the circumference of a circle to be written more concisely (τr vs. 2πr or πd) but complicates most other places where π is used, like in the area of a circle (τr^2/2 vs. πr^2)






  • Sometimes when I get a call from an unfamiliar number with my area code (I don’t live there anymore so it’s always a scam spoofing a nearby number) I roleplay as a 911 operator and don’t drop the act until they hang up, threaten them with penalties for wasting public resources and such. It’s probably not strictly legal but they’re calling me illegally too so i think it pretty much evens out :)