Right. The fine print below is MUCH smaller indeed. However, this still seems like a great example of delivering a surcharge notice that's perfectly legal but still feels kinda sketchy nevertheless.
Yeah, that's just California law though. Doesn't mean other states have to follow it.
Here's a menu from popular Italian restaurant at The Venetian, Las Vegas. Did you notice the surcharge? You can bet that it's perfectly legal according to Nevada law, because that place isn't exactly a nobody.
Yeah, if I see a sign like this anywhere you best believe I’m not going to eat there.
Trouble is, most places don’t announce this sort of policy with a fanfare like that, it’s going to be hidden in the fine print somewhere on the back of page 8 in the menu.
It's actually a clip from a show called "Schlag den Henssler" (Beat Henssler), which is one of several spinoffs of "Schlag den Raab" (Beat Raab). The format is always similar: one of five challengers is chosen by the viewers to go up against a celebrity in up to 16 games, some of which are knowledge-based (i.e. some sort of quiz), some of which are skill-based (like the pretzel cutting, which also required them to cut several veggies perfectly in half), and some require athleticism (like managing to hang on to a pull-up bar for the longest).
Each show has a prize of a quarter million Euros. If the challenger wins, he (or she) takes home the money, if the celebrity wins, the money gets added to the next show's prize.
@teto@lolitechengineer@sun I mean, if you really think about it, it’s impossible to implement this with any amount of reliability unless you require biometric authentication AND NOTHING ELSE (and that won’t work because consumer level biometric shit is nowhere near reliable enough to not have a fallback).
As soon as your account has a password (or a hardware token) you can log in with, it could really be anyone using it. Even if they manage to enforce this somehow, and Microjeet accommodates, it’ll likely just lead to a massive black market for age-verified MS accounts.
Also, you're wrong about the Python approach. Yes, Python does run locally, but you're only using it to run a preinstalled web server module that it ships with, which will make all the files in the local directory accessible to the browser in a way that doesn't require breaking its sandbox.
As long as your Python installation is from a legit source, this is fairly safe. Running it this way will NOT execute any code from that directory – the browser will only be able to access files from the directory you started the server in, nothing else.
In that sense, the using Node is actually more risky, because that WILL run code outside the browser's sandbox, and they could technically smuggle anything in there.
Right, that's why I said it's safe IF you use a local Python installation from a legit source (i.e. MS Store on Windows or your distro package manager on Linux).
But node doesn't have a built-in webserver (although it's trivial to write one), so running any node commands will definitely execute some sort of custom code. I looked at the repo, and in this case, npm run serve:dev will execute this package, which is downloaded when you run npm ci (short for clean-install).
It's likely safe, since it has a high version number, millions of downloads per week, and no updates in 4 years (meaning it's stable), but in general, this IS a possible attack vector, even if the package author is trustworthy – a few years ago, someone managed to hack a guy who owned hundreds of popular NPM packages, stole his keys, and used them to upload modified versions of some of his packages that contained malware, which would try to scan the system for API keys and login info for various web services and send them to a server he controlled, so he could start mining crypto on their AWS accounts or whatever.
So if you want to be on the safe side here, I'd say stick to the Python version, and make sure you use an official Python distribution.
Well, Go really isn't inherently safer than Node, it has a similar package ecosystem that could be attacked in the same way.
The only reliable way to be safe when using ANY programming language with packages downloaded from the Internet (which is basically all modern languages) is to run them in a Docker container. That's gonna add a bit of overhead to your system (mostly increased RAM usage), and require downloading even more stuff, but at least whatever damage the thing can do will be contained to its own VM.
Now, what the hell does Playwright have to do with any of that?