then it becomes much more conservative in what is allowed, options are restricted enough to be drilled into new entrants
-
-
and credentials emerge to certify not that the recipient is skillful but that they have learned and can follow protocol
2 replies 3 retweets 10 likes -
thus a much more stifling and uncreative field with enormous barriers to entry
1 reply 1 retweet 6 likes -
that's how the self-taught programmer goes the way of the backwoods lawyer
2 replies 3 retweets 19 likes -
It's also how stuff like "don't build crypto the government can't break" gets slipped into "professional ethics"
2 replies 5 retweets 26 likes -
hopeful facts of reality will make "rogue programmer" viable/powerful in a way "rogue dentist" can't be
1 reply 2 retweets 12 likes -
Replying to @alicemazzy @puellavulnerata and
fairly worried about escalation to point of legal restrictions on access to general purpose computing
3 replies 1 retweet 13 likes -
Replying to @alicemazzy @puellavulnerata and
probably couldn't make completely inaccessible but a drug war type situation doesn't seem impossible
2 replies 2 retweets 9 likes -
"Sysadmin prosecuted for unlicensed diversion of schedule II hacking tools"
3 replies 1 retweet 10 likes -
Replying to @puellavulnerata @alicemazzy and
Properties of assault programs: - takes long option switches - can accept more than 100 files as arguments - returns more than 2 exit codes
2 replies 4 retweets 17 likes
the framers only intended the 2nd amendment to allow the *militia* to have turing completeness
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.