Yes! This is a movie my parents let me watch when I was like ten or eleven and it definitely stuck with me.
The boundaries of a man exist only in so so far as he is willing to let himself go
Yes! This is a movie my parents let me watch when I was like ten or eleven and it definitely stuck with me.
It’s a toss up between cooking and home networking for me.
Cooking because it started off as just finding neat recipes and giving them a shot to now experimenting with new techniques and harder to procure ingredients. My pantry looks like a mini spice market and keeping them fresh is its own hassle. Plus needing all the gear gets expensive!
I also got really into home networking during the start of the pandemic. I went from having a simple off the shelf mesh network to a full network rack in my basement serving some high end access points and cat6 drops in every room. Now I have a pretty secure iot stack that’s separate from my main vlan and one devoted to my work computer.
I think it’s a very difficult choice to navigate. The biggest example of brown/blackface where it doesn’t work I can remember is Fisher Stevens playing an Indian guy in Short Circuit: https://en.wikipedia.org/wiki/Short_Circuit_(1986_film). In that movie, he’s playing an Indian person as a stereotype to juxtapose with how white counterpart. Contrast that to Robert Downey Jr. being nominated for an Oscar and BAFTA for his blackface roll in Tropic Thunder. The way it was handled within the movie itself was legitimately a good representation of why blackface is usually on the wrong side of “is it racist?”
I think just based on the little I’ve seen without any other translation besides your edit, it looks fairly racist.
The benefit of passkeys over passwords is that they’re phishing resistant and use strong encryption. They’re effectively an iteration on yubikeys meaning you can have as many (or as few) passkeys associated with a given login as you’d like. So, you can easily prevent there being a single point of failure in the system.
Passkeys are tied to accounts and devices and those devices are the only devices used for authentication. This means you can access your account form a public device without that device ever knowing your credentials provided you and your secure device are physically present so it avoids the whole keylogger issue.