To build on you analogy: if you left your garage door open and people came in and started taking your things, is that not stealing?
To build on you analogy: if you left your garage door open and people came in and started taking your things, is that not stealing?
deleted by creator
I signed up for a family plan a couple years ago and it’s honestly one of the last subscriptions I would cancel. I can justify it by the literally hundreds of hours of watching ads me and my family would have been subjected to otherwise.
Got me good
Lose the blackjack too
F91W will never not be supported
Your girlfriend has birthmarks all over her body?
The ol’ Uno reverso countersquat technique, I like it
Make sure to wear your favorite Music Band tshirt.
LLM just autocomplete on steroid.
Funny you should say this. I only have anecdotal evidence from me and a few friends, but the general consensus is that autocomplete and predictive text are much worse now than they used to be.
Why is thinnest ever placed in such high regard? Have you seen how ridiculous the new iPad Pro looks when the Pencil is attached to it for charging?
I think I’m in the vocal minority in that I really don’t give a shit about thin, especially if it affects performance, repairability, or battery life.
wefwef 4 lyfe!!
For all you know the victims rate it positively as well but they don’t submit feedback
Parents just don’t understand
In Baltimore, MD you can drink in Hamsterdam
They’re under eighteen they won’t be doing any time
That’s just a picture of ANUSTART
“Bring it into the shop, we’ll replace the stick for free.”
Is that why your mom doesn’t grow boom roasted
What about this scenario:
Would this be considered breaking in? Probably. Here is where the analogy breaks down; if I were to leave the front door of my house unlocked, even if there’s a welcome mat outside, anyone who enters without my knowledge or consent can be charged with breaking and entering (yes, even though no actual breaking is involved).
The interesting thing with public APIs is that there are generally terms and conditions associated with creating an account and acquiring a key, though if you are hitting an unauthenticated endpoint you technically never agreed to them. In this particular case with Authy, it would probably be argued that the intent was to acquire data by exploiting a vulnerability in the custodian’s system and use it for nefarious purposes or profit. I’d call it a hack.