We and the hacker have no idea if this list is config driven or truly “hard coded” i.e. a const in the source code. It’s hardly an indicator of violating a core programming tenet.
We and the hacker have no idea if this list is config driven or truly “hard coded” i.e. a const in the source code. It’s hardly an indicator of violating a core programming tenet.
ITT: SWIM uses Steam.
It’s probably better to copy everything as an attachment to a dedicated portable drive
This would get you fired from some jobs.
They do the same shit for Google search results. Search weather or stock tickers with a Chrome user agent* and you get a rich, interactive chart of the weather forecast or stock history. Search with another mobile user agent and you get a static snapshot of the weather or stock price at an instant in time.
There’s even an extension for Firefox for Android which changes the user agent for Google searches to Chrome, to get the rich content.
* just a user agent, not an actual browser, which proves that it isn’t about browser capability, but rather abusing their monopolistic market position in search to further their web browser’s market share. Sound familiar, Microsoft from the 90’s?
I’d also settle for releasing 3D models of out-of-production parts so they can be 3D-printed by enthusiasts.
Story time: in my second-gen Mazda Miata, I closed the centre console lid on a piece of cardstock by accident and it snapped the plastic piece that latches the lid shut. The part previously sold for ~$10 but they stopped producing it as a standalone part at some point and the only way to acquire it was to buy the $100 centre console lid assembly.