How is a ternary more readable? I've found that they make code more complex
and unreadable, in both C and the proposed go, and the one-liner you
provide is equally or more unreadable than the more verbose if statement.
On Thu, Aug 16, 2018, 16:55 Liam Breck wrote:
> Indeed, the problem is largel
Hi Pablo,
Yes, that sounds like a reasonable differentiation for students. Of course,
it is more complex than that, but it's a good first principles introduction.
Cheers,
Chris
On Tue, Sep 4, 2018, 16:57 Pablo Rozas Larraondo <
p.rozas.larrao...@gmail.com> wrote:
> Thanks for the answers. I as
garbage collection, and more.
>
> the Go runtime is written in Go mostly and uses C or assembler to connect
> to the host operating system.
> the Go runtime is linked with the developer's Go code, and the two of them
> are constitute the output of go build or go install
>
ectre and
Meltdown, so it isn't safe to assume the kernel or hardware are
secure. A password manager needs to have a robust security model that
has a minimal trust model if it is to be more than a toy.
Just my $0.02
--
Christopher Nielsen
"They who can give up essential liberty for temp
the
> file encryption on disk, no ?
>
> > On Oct 15, 2018, at 4:13 PM, Christopher Nielsen
> > wrote:
> >
> > On Mon, Oct 15, 2018 at 1:28 PM Matthias Schmidt
> > wrote:
> >>
> >> Hi Eric,
> >>
> >> thanks *a lot* for your valua
a
hardware token with keychain.
We seem to have wandered pretty far afield of the topic of this forum.
--
Christopher Nielsen
"They who can give up essential liberty for temporary safety, deserve
neither liberty nor safety." --Benjamin Franklin
"The tree of liberty must be refreshed
dware security device is more secure than the alternatives. Saying
"that is not really the case" isn't correct.
> Security is always a trade-off.
Though I didn't state that explicitly, I feel it was implicit in my
comments about threat modeling.
--
Christopher Nielsen
"The
't matter if you have root access. You
cannot obtain key material from it. If you lose it, you lose the set
of keys on it. That's it. Revoke them and issue new ones using your
root cert/key that never touches a networked system and lives in a
safe.
--
Christopher Nielsen
"They who ca
It is the coupling of the two scenarios - the security cannot be based on the
> hardware device alone (since it can be lost/stolen), and when there is backup
> identifying information, that can be compromised (if the machine is
> compromised).
>
> I know very well how the hardw
Use gofmt.
On Jul 30, 2017 13:21, wrote:
> What is the standard way to construct|format the following code snippet?
> I think the first is more readable; however, is there any accepted syntax I
> should be using working my way up the ladder as a senior developer?
>
> block, err := aes.NewCipher(
more options, visit https://groups.google.com/d/optout.
--
Christopher Nielsen
"They who can give up essential liberty for temporary safety, deserve
neither liberty nor safety." --Benjamin Franklin
"The tree of liberty must be refreshed from time to time with the
blood of patriots & ty
For c++, your swig file needs to have a swigcxx extension for the go tool
to run swig properly.
On Apr 12, 2017 4:42 PM, "larry104" wrote:
I seems I need to manually run swig (swig -go -cgo -c++ -intgosize 64
mylib.i) - it does not seem that 'go build' picks up the .i or .swig file.
Then I need
12 matches
Mail list logo