I anyways park the crazy straw style.
takeda
LOL, this reminds me of my coworkers. Guy in his 50s, kids already grown up, very quiet, barely know anything about him. One time we had an event and wanted to carpool. We get all in, he turns the ignition and RAAAAAAAAHHHHH! Kind of surprised me and I learned to not assume too much.
I don't really use any tool. For my stuff I use FastAPI which generates swagger UI, and when troubleshooting I interact that way.
Actually right now even democracy is considered a dirty word, they even say that US isn't democracy, but a republic (ignoring what republic is).
They already started conditioning their minions, that dictatorship isn't really all that bad.
The ironic thing is that the primary reason why communism is bad is that it normally comes together with totalitarism, and that's what they essentially arguing for.
As someone not familiar with the statue I was wondering why they were modifying it during the war, so this is how it originally looked like: https://i.pinimg.com/originals/6b/24/7b/6b247b685bd8d014d54d779fa0e7ec1b.jpg
And here is why it wasn't done earlier: https://en.wikipedia.org/wiki/Mother_Ukraine_Monument#Decommunisation
US is not sending Ukraine pallets of money. When they talk about amounts of money, this is just the amount of money the equipment (which was mostly purchased decades ago) is estimated to cost.
This is absolutely how he should be handled from the start. A lot of people dismissed him "because he is an idiot" and that enabled him to cause damage to our country.
I suspect it isn't what you are looking for, but how about https://github.com/maltfield/awesome-lemmy-instances#subscribe-to-subreddits-communities
You know what the kicker is? He got those charges for fighting to stay in that "FILTHY, DIRTY, FALLING APART, & VERY UNSAFE" city.
RiF for a decade or so.
In an ideal encryption, the resulting data should be indistinguishable from random when doing statistical analysis.
So yes, such data will be really hard to compress, so typically compression is done before encryption.
Now here's a twist. The compression before encryption can reveal some details about the encrypted data. This is especially true if attacker has a way to generate encrypted message with part of information that is being encrypted (for example some kind of token etc).
There were attacks on it. For example https://en.wikipedia.org/wiki/CRIME or https://en.wikipedia.org/wiki/BREACH (this was during that idiotic phase where vulnerabilities had those lame-ass names and they even created webpages)
Ideally compression would be done after encryption, but because of issues described earlier, that wouldn't give any benefit.