Same
Same
Would’ve never expected this read to be so interesting.
Regarding section 1, won’t you still get the conflicts when pushing to remote (or pulling from it)?
I now noticed that the post’s content differs between instances, sorry about that.
I could be wrong. I’d be happy to be shown wrong. Always room to learn.
Generally when I hear cyber security I think of things like data breaches, vulnerability research, malware analysis, netsec, appsec… Stuff like that.
I’m actually not really sure where I’d have posted. I remember seeing a meta community somewhere, maybe lemmy.world, where you can have discussions about Lemmy. But I’m really not sure.
And just to make it clear, I’m just giving you my honest opinion. Not trying to make you feel bad or anything.
How is is this cyber security related?
And it’s not P2P…
Jami is p2p for example. Direct communication between peers.
That’s not being pretentious, that’s being blunt. I personally as a dev, appreciate that.
If you think the code can be improved you should say that, and exactly why that’s the case. When you’re mistaken you should be able to take the criticism.
Your mission as a dev is to write the ideal code, and being overly polite can stand in the way of that.
He was probably working with bytes and not individual bits, but yeah. He basically wrote executables directly (to my understanding).
Point it out explicitly in your resume. Don’t expect them to figure out your github activity on their own.
It’s definitely better to have open source experience than no experience.