I could be convinced that there is a part of Paris that is like that. It doesn’t look like a part of Paris anyone would want to spend much time in though.
I could be convinced that there is a part of Paris that is like that. It doesn’t look like a part of Paris anyone would want to spend much time in though.
I think that is just how monotheists prefer to translate it, I believe “before” is more impartial.
Yeah I don’t think there’s any basis to the quote.
Interestingly the earliest composed Christian document that has been recovered (the didache, the copy we have is from Ca. 1000 CE, but seems to be in the original Greek) condemns infanticide, specifically including by exposure to the elements. It also prohibits private property so the document is not taken authoritatively by many modern christians.
I saw a quote in the newspaper this morning:
We were losing hundreds of billions of dollars with China now we’re essentially not doing business with China. Therefore, we’re saving hundreds of billions of dollars. Very simple.
It’s just so incredibly wrong and stupid.
Smells like nirvana in my ass.
(Weird Al)
Killing time are you being intentionally obtuse just to kill time?
How is real estate wealth not consequential?Real estate wealth is real wealth, it’s why it’s literally in the name.
Personal income tax is not a wealth tax, and there are myriad ways to avoid it without evading it.
It’s a wealth tax on wealth that’s very difficult to hide.
So how does generating a one time pad from mutually accessible data fit into this scheme. Is the pad the cipher or the key?
If two people agreed that the pad would be the output of a particular pRNG given the 3rd paragraph of the second article on the third page of that day’s newspaper as a seed.
The attack vector would be shortcomings in the pRNG I guess? Which could result in the possibility of some sort of statistical language attack?
Or the attacker could guess the newspaper text & algorithm.
Neat, yeah Wikipedia says steam cipher approximate one time pads but can also be completely insecure.
I think it would take one hell of an effort to crack, it would be like 3MB encryption right? Or if they guessed the scheme they could try all mp3s ever torrented XOR’ed in every possible combination.
Idk I think there’s something workable there but I only having a casual knowledge
Also I think OP wanted pen and paper so maybe use a book instead digital files.
I’m certainly not an expert.
But could you generate pads from mutually accessible data sources?
Like use hit_me_baby_one_more_time_not_a_virus.mp3 appended with a password, as a seed in a pseudo random number generating algorithm, then do the same thing with another data source, repeat however many times, then XOR the generated numbers together, and use the result as a pad?
I think schopenhauer’s quote:
to overcome difficulties if to experience the full delight of existence context
is a corollary of sorts.
I always go pat down. I prefer to understand the scope of the privacy violation also I think it’s good to have a physical reminder of the ways our privacy is invaded.
What unhealthy eating habit are you indulging in at 21:45?
This is my concern. Not that he wants to manipulate her to harm her, but that he wants to “save her”. Her being subjected to that pressure could seriously damage her relationship with her family.
Ahh yes sexual harassment for hire. Great idea. Maybe we should have an MMA experience we can order for our foes too.
“I must destroy all evidence of this”
I reckon if you’re doing the work involved in managing a rental property yourself, you’re doing work and providing a service.
If you expect an employee/contractor to do all that for you, but to still collect profits: what would you say you do here?
I think the establishment is actually quite sensitive to unemployment figures because people that are unemployed have time to demonstrate.