• 2 Posts
  • 149 Comments
Joined 2 years ago
cake
Cake day: July 2nd, 2023

help-circle


  • You’re probably correct that there are other methods for perfect eggs, but I believe that is a bit reductive. Boiling first then reducing the temperature, while similar, is definitely not the same as periodic temperature change, aside from it adding the same total energy to the system. But the rate that energy is added is the critical variable.

    Don’t get me wrong, your method is good, but I don’t think the method in the paper only has the advantages you list. The periodic temperature change is important, and they detail precisely why that is.

    Having said all that, I’m certainly not doing this. I’m all about easy and don’t need eggs to be a certain way. I just thought it was neat.

















  • No. You’re the only one I see implying there are no cases where data is private outside a VPN. Strictly speaking, if you need only the data across a connection to be private TLS is sufficient. Who is implying that is a complete threat model. You are building more and more strawmen against which to argue, but it really just sounds silly. I’m a professional that has been in the industry for decades, so your dick waving contest just doesn’t move me.

    Yes, a more complete risk analysis in many cases may show that you’d like the host one is reaching to also be private, but nobody is saying such a situation doesn’t exist; you’re barking at the moon.