It's a fun challenge! My list is Ada Agda Assembly Awk BASIC Brainfuck C C# C++ COBOL Curry D Elixir Elm F# FORTRAN Gleam GLSL Go Haskell HCL Idris Intercal Java Javascript Objective-C Ocaml Pascal Pony Prolog Python R Ruby Rust Sh Sketch Swift Typescript Visual Basic Zig
Burning an identity? Instead of hacking the server that serves the binary, you have to hack the developer's machine and commit a malicious source change.
I wouldn't consider either of them to burn an identity.
That's fine but the matching exposes that you should also handle the "has more than one element" case. And in general it's pointing to the idea of "try to not separate checks from code that depends on those checks"
Of course the only comment representing the perspective of the actual "protected group" is near the very bottom of the section and unanswered.
Every time someone says "think of the children", just remember that nobody is motivated by protecting children from their parents; it's all to protect parents from their children. Always has been.
reply