I prefer my accolades in the form of bonus cheques. I’ve got a git history for anyone else that matters
I prefer my accolades in the form of bonus cheques. I’ve got a git history for anyone else that matters
You might be interested in the story of Luigi Galvani’s experiments with frog muscle tissue. It was seminal work in anatomy as well as physics.
https://www.sciencedirect.com/science/article/pii/S1631069106000370?via%3Dihub
Hack.
It doesn’t mean someone guessed your Facebook dictionary-word password.
It doesn’t even mean some black hoodie-wearing, bad actor remotely broke into a secure computer system.
It’s a clever trick. Whether it’s in code or concrete. Some creative, elegant, unexpected, solution to a problem.
“I know a menu hack. Order the kids burger and add cheese to save a buck.”
“We ran out of conductors in the cable, so we’re transmitting power via a differential pair. I know it’s a hack, but we need to ship by end of month.”
Za’atar, or sambal oelek.
Your email likely is already delivered over a TLS or SMARTLS protected channel. That’s not the (only) problem PGP addresses. PGP provides message authentication in addition to encryption.
To take your colleague as an example, his email was cryptographically signed by him. A function that requires his private key, and possibly a passphrase to unlock the key. The signature includes a hash of the message, and requires that private key to generate. On your end, your client hashes the message again and compares the signature. If it isn’t identical, someone has tampered with the content. Presuming you met up ahead of time in person or through another trusted channel, and shared public keys, seeing the valid signature also gives you confidence that this email was actually written by the person you expect, and not anyone else with access to their device or account. (If the senders key is still safe anyway.)
Vim, or neovim if you want to put some leg work in for vi with modern features.