If you're in the apple ecosystem, the "normal" way is to just literally drag and drop files between devices with your mouse, use airdrop, copy on one device then paste on another, etc. "Continuity" makes it stupidly easy, but not advertised well.
Yes, that's what I was referring to. I get it that Pyrefly wanted to advertise their approach here, but it's weird that they didn't at least acknowledge this. It's what I use because it works on every type check, and I don't need to rely on their particular implementation for this.
In fact, I recently migrated a project from Pyright to Pyrefly for performance reasons, and there was very little I had to change between. The most annoying thing was Pyrefly's lack of exhaustive pattern matching for StrEnum and Literal[...]
It's acknowledged at the end of the "infer any" strategy, but perhaps worded poorly.
> To improve type safety in these situations, type checkers that infer Any for empty containers can choose to generate extra type errors that warn the user about the insertion of an Any type. While this can reduce false negatives, it burdens developers by forcing them to explicitly annotate every empty container in order to silence the warnings.
ie: "type checkers that don't infer container types can emit an error and require users to annotate"
I missed that. At least pyright will only emit an error if `typeCheckingMode` is strict (which forbids `Unknown`). It will happily treat `Unknown` as `Any` in basic mode.
Keep in mind apple famously never fixes these bugs that let the phone be rooted via a 0click attack starting from imessage, which inexplicably runs with elevated privileges.
I mean they fix one when it gets known but keep the issue there, which is why there have been several of these.
I usually eat mine like cereal, uncooked old-fashioned in cold milk, with a bit of honey or brown sugar for flavor. Apparently this is normal overseas.
Steel cut is just a different thing altogether. I like mine a bit on the firm side, with butter, brown sugar. On top, some plain yogurt pair nicely. Cranberries and walnuts are pretty great too.
I think one-minute/instant oatmeal is terrible, no matter how it's prepared, which is unfortunately most people's first experience with oatmeal.
Honey is good, but there is never a reason to add any sugar even if brown. Oatmeal can be sweetened with practically any fruit. Berries work really well, whether dried or fresh. I add wild blueberries.
I would think the type and preparation would play a significant role. There's steel cut (which can be made soft or "chewy"), firmer "old fashioned", and the quick dissolving mush that is one-minute.
Large corporations do not, and are not able to, respond to long term signals. One month is literally a third of a corporations's attention span (a financial quarter).
> And that message would be "We have a product so valuable/useful that not even their weak ideals and moral obligations could keep them away!"
Who knows, maybe within those 30 days you find that other offerings are good enough for your needs - I've largely moved over to Anthropic's Max subscription for all my needs, I don't even need Cerebras Coder anymore because Opus 4.6 is just so good.
I'm not sure what the solution is, but to steel man a bit, the alternative is kids have access to all the adult spaces, where they will be groomed. A website/app serving grooming content to a kid is just so incredibly unlikely compared to a kid being groomed as the result of having unrestricted access.
Since I do not see a solution, and you see identifying children as a risk, what do you see as a solution for kids being in the same spaces as adults? Do you see a reasonable implementation to separate them, that doesn't have the "we know which accounts are children" problem? Maybe there's something in between?
Also, I think it's important to understand the life of a modern child, who's in front of a screen 7.5 hours a day on average [1], with that increasingly being social media, half having unrestricted access to the internet [2].
I hate government control/nanny state, but I think 5 year olds watching gore websites, watching other children die for fun, is probably not ok (I saw this at the dentist). People are really stupid, and many parents are really shitty. What do you do? Maybe nothing is the answer?
So say one of the 50% of children that have unrestricted access goes somewhere they shouldn't, or interacts with people they shouldn't. How is it detected so the parents can be held liable? What does the implementation look like to you?
As the problem is adults trying to groom kids, the answer is robust detection and enforcement of the current anti-grooming laws.
It's ironic that people supposedly care about this when there's also a child rapist/murderer being kept safe as President without being held accountable for his crimes.
I suppose this law could be used as a defense against getting caught grooming minors - "I thought they were adult as surely a kid wouldn't be able to access that chat group"
How, exactly, does one accomplish "robust detection of a child"? I assume your answer would include complete surveillance of all internet communication? Could you expand on your idea of the implementation?
Sorry if I wasn't clear - I am proposing that the adults face the robust detection and enforcement of anti-grooming laws. One method is to set up honey-pots with law enforcement officers playing the part of an innocent child (i.e. avoiding entrapment) and then throwing the full weight of the law behind any adult showing predatory behaviour.
What I propose is rather than putting all the effort into preventing children from entering dangerous adult spaces, it's better to put the effort into ensuring that sex criminals are prosecuted and trying to make adult spaces less dangerous.
I think an obvious problem for this method is scaling, partly from grooming not being a local phenomenon. It would require worldwide cooperation, especially in a few countries that are statistical offenders.
You could ask this about every user of every large cloud service provider, which is why they all refuses to implement E2E, or store the keys [4].
The government has their hands in all of them, using "national security" as the justification, with threats if they don't comply [1][2], with the alternative being to shut down [3].
reply