Whatās in the QR code? A lightning invoice? If so then not currently, thought bolt 12 will enable this.
Man.. I want to support the destroy-scam-centers economy
Is it discriminatory to hire the smartest candidate?
How does doing so compare to other kinds of discrimination hiring managers sometimes employ? If you do think itās discriminatory, why would you say we donāt talk about it much?
One thing I love about this is that it solves goldās purity determination problem by making it even harder to assay š
I have and they are awesome ā¤ļø
Enjoy. Itās fun
You can now add PayPal and Venmo credit or debit cards to your Apple Wallet
PayPal announced today that users can now add their PayPal and Venmo credit or debit cards to their Apple Wallet. With this new integration, you can now make payments in-store, online or on apps using...
https://techcrunch.com/2023/10/03/you-can-now-add-paypal-venmo-credit-debit-cards-apple-wallet/
When bitcoin lightning wallet?
āAt the same time, a woman is seen crossing the street into oncoming traffic when a driver in the dark-colored car hits her. The impact throws her into the path of the self-driving car and she became pinned underneath it.
The driver of the other car, left the scene.
By the time firefighter arrived, no one else was around.āš¤
Also āRescuers were able to contact the vehicle operator through the voice controls inside the robo-taxi. The vehicle was disabled to a stop.ā - did it not immediately stop? š¤
Itās crazy how much has changed.
Also, then: āNot everything you see on the internet is trueā
Now: ānot every answer chatGPT gives is true, depending on the question, every answer it gives could be falseā
Should UTXOs be consolidated before coinjoin or after? My risk averse side thinks doing it after would be better. Does it change the fees?
Iām confused about how they are transcribing the audio and creating the embeddings if itās āprivate by designā
I was going to say the same thing. Let me know if you cover it in an episode. Also - where is your podcast?
Thinking more, it will always be possible to store data on top of actively used one-time use memory. As long as the previous values are known. Doing this will impair device functionality to a greater or lesser extent depending on the register.
Maybe there is a way to burn any unused registers, and check the ones that donāt cause obvious failures on boot.
If attackers can write to enough registers to store the key, and they can recover the device, then they can get they key whether the device is bricked in the process or not. Comparisons to the wrench attack make this seem ok though.






