It’s a reference to a famous YouTube video[0] about how to write instructions that can be followed.
One of the most important things a programmer needs to do is learn how to tell a computer how to do something. It’s a surprisingly hard skill because each step is way more complicated and has way more variables to go through.
The kid’s parents want to be able to monitor their kid. The kid’s parents want to be able to drag the machine to a local store and have the people there fix it.
The kid’s parents - and the kid - all have iPhones, so it’s familiar.
The kid’s school requires Windows or Mac for their WiFi and won’t let the kid use Linux because they don’t trust it.
There’s plenty of reasons why Linux isn’t the answer in current climate.
I know there’s a series of unfortunate events that can lead to this information accidentally getting logged into a log file; but the comedy of errors necessary to get there almost leads itself to malice rather than accident.
Have we as developers gotten so lazy with our permissions requesting that we think it’s okay to ask for all message access? If not, why ask for it? Why *log* every message, afterward? What pull request approved that? What PR was approved that logged the auth token?
Even more to the messages, if they’re logging them, they can see them. If they can see them, how do we know if they are or aren’t sending them to their servers?
Ugh.