other techbros have praised him, citing the exact list of symptoms google gives for “high-functioning psychopath”
(disclaimer: google may give bad medical advice)
I wonder if it’s common for those steganography techniques to have some mechanism for defeating the fairly simple strategy of getting 2 copies of the file from different sources, and looking at the differences between them to expose all the watermarks.
(I’d think you would need sections of watermark that are the same for any 2 or n combinations of copies of the data, which may be pretty easy to do in many cases, though the difference makes detecting the general watermarking strategy massively easier for the un-watermarkers)
C++ is std::__cxx11::list<std::__shared_ptr<table, (__gnu_cxx::_Lock_policy)0>, std::allocator<std::__shared_ptr<table, (__gnu_cxx::_Lock_policy)0> > >::erase(std::_List_const_iterator<std::__shared_ptr<table, (__gnu_cxx::_Lock_policy)0> >) /usr/include/c++/12/bits/list.tcc:158
like everything in python, to achieve functional you must first import functional
Considering this was written in 2001, I’m not all that worried
♫ monopoly duopoly oligopoly cartel ♫
♪ anti-trust, pork barrel, propaganda lobbying ♪
♫ economies of scale, information asymmetry, regulatory capture and personal responsibility ♫
♪ unions, pinkertons, labor theory of value and the CIA ♪
♫ rent seeking, georgism, tax incentive, scarcity ♫
♪ free trade, minimum wage, petrodollar and the MIC ♪
♫ we didn’t start the fire, it was always burning since the world’s been turning ♫
provided as is, no warranty in regard to serving any particular rhyme or meter, express or implied, consult a licensed physician before attempting to sing along