@ericjmorey
@programming.devThis is a great idea!
Motivation
The Python docs are ill-suited to novices.
The content of the built-in functions documentation favors precision and correctness over comprehension for beginners. While this style is great for experienced developers who already understand the finer points of Python’s design, the docs are confusing to novice programmers like a 12 year old who is not far on his journey of learning Python.
This guide is an opinionated and simplified description of Python’s built-in functions.
My goal is to provide definitions, in plain English, of each built-in function that comes with Python. Along with each definition is an example that is as simple as I can think of. I ran each example against the latest version of Python as of the time writing this guide.
I want to be able to share this with my 12 year old son or my 10 year old daughter, so that they can understand and use Python. My hope is that this guide also serves others who would like some plain definitions of what the built-in functions do.
A note for pedants: I am sacrificing precision and exactness in favor of comprehension. That means I will use substitionary language that I think will communicate more clearly than the exact terminology. If you’re looking for that level of precision, please refer to the standard library docs. Those docs are great for that level of clarity.
For the rest of us, let’s go!
That's a nice addition for those that want security over convenience. I wonder why it took them 11 years after this was written to add it.
I like the diversity of sphincter options in unicode and encourage their use. Here are a few of my favorites:
✲
✵
✺
❂
This is a web service that returns the ActivityPub data for any URL that returns an ActivityPub message. For instance this post (https://lemmy.ml/post/19589249) returns:
{
"@context": [
"https://join-lemmy.org/context.json",
"https://www.w3.org/ns/activitystreams"
],
"type": "Page",
"id": "https://lemmy.ml/post/19589249",
"attributedTo": "https://lemmy.ml/u/hongminhee",
"to": [
"https://lemmy.world/c/fediverse",
"https://www.w3.org/ns/activitystreams#Public"
],
"name": "BrowserPub: A browser for debugging ActivityPub and the ⁂fediverse",
"cc": [],
"mediaType": "text/html",
"attachment": [
{
"href": "https://podcastindex.social/@js/113011966366461060",
"mediaType": "text/html; charset=utf-8",
"type": "Link"
}
],
"sensitive": false,
"published": "2024-08-26T11:43:09.033551Z",
"language": {
"identifier": "en",
"name": "English"
},
"audience": "https://lemmy.world/c/fediverse",
"tag": [
{
"href": "https://lemmy.ml/post/19589249",
"name": "#fediverse",
"type": "Hashtag"
}
]
}
Prepend https://browser.pub/
to the URL you want to check:
https://browser.pub/https://lemmy.ml/post/19589249
Some key quotes from the article:
It’s perfectly reasonable for a consumer cloud storage provider to design a system that emphasizes recoverability over security. Apple’s customers are far more likely to lose their password/iPhone than they are to be the subject of a National Security Letter or data breach (hopefully, anyway).
I wish that companies like Apple could just come right out and warn their users: ‘We have access to all your data, we do bulk-encrypt it, but it’s still available to us and to law enforcement whenever necessary’.
So what is the alternative?
Well, for a consumer-focused system, maybe there really isn’t one. Ultimately people back up their data because they’re afraid of losing their devices, which cuts against the idea of storing encryption keys inside of devices.
You could take the PGP approach and back up your decryption keys to some other location (your PC, for example, or a USB stick). But this hasn’t proven extremely popular with the general public, because it’s awkward — and sometimes insecure.
Alternatively, you could use a password to derive the encryption/decryption keys. This approach works fine if your users pick decent passwords (although they mostly won’t), and if they promise not to forget them. But of course, the convenience of Apple’s “iForgot” service indicates that Apple isn’t banking on users remembering their passwords. So that’s probably out too.
Listening to this podcast might be helpful along with the links in the show notes: https://linuxunplugged.com/572
Here's another option: https://fedoramagazine.org/automatically-decrypt-your-disk-using-tpm2/
I found these on a hacker news comment: https://fedoramagazine.org/automatically-decrypt-your-disk-using-tpm2/
This is great!
@burntsushi@programming.dev, do you know is Astral is working with prefix.dev and their Pixi project? They seem to now have overlapping concerns.