![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/c0ed0a36-2496-4b4d-ac77-7d2fd7f2b5b7.png)
3·
5 months agoI would think that role is filled by constants.
I would think that role is filled by constants.
Now, I don’t functional (at all), but if you call a function with no parameters, doesn’t it imply side effects?
How does this exploit work? I understand that inputs were not sanitized, but what did the injected code do?
I don’t think crypto has ever been a viable payment system for use on the scale of Interac, Visa or MasterCard. Slow and wasteful.
No, you definitely still have to match the meaning to the context. That’s pretty fundamental to communication.
Counteract is also valid.
This is a counteraction.
Java 2: you can program anything you want but it has to be a function.