You can also just sit there and wait until everyone you ever bonded with gets diagnosed. It's fun to listen to them explaining how the process went and slowly coming to some realizations about yourself.
SigmarStern
Exactly! I mean, my son has an autism diagnosis, and my wife has ADS, and my best friend has both, and I work in a field where almost everyone is diagnosed with something, but surely I am normal, because no one diagnosed me. Yet.
Logseq is the best note taking app for me. And a lot of my programmer/adhd colleagues. I cannot keep order in my notes and logseq does it for me. It's so essential for my workflow that I have a monthly donation to the project set up.
I have multiple different graphs/vaults/whatever synced by simply storing the markdown files in a synced folder and I never had any issues. The new version of logseq is supposed to use a database and syncing, afaik.
If you don't have a subscription for dropout.tv already, get one. It's worth every penny. This episode was a masterpiece.
Ray-Ban is no longer an american brand.
Thanks for that rabbit hole. My former colleagues and I have just started a new conversation thread in our WhatsApp group about the differences of (non-) cryptographic hashes and encryption. And all because I was confused why you've chosen to reference the public key file in your original comment. Well, at least I'm learning something.
And a lot of time spent in Bunkers
Sorry for the confusion about "encryption". I meant "signing" which is encrypting a hash of the commit with your private key, so that others can verify that your the author of the commit using your public key and the hash.
I think, the only confusion here was the original comment that referenced the public key for signing, but this was resolved, as it is just telling git which key pair to use. Probably, all people here understand the basics of asymmetrical encryption and signing and it was merely misunderstanding of how the command for signing git commits can be used.
OH! Now I see! Thanks for pointing that out.
Yeah, sorry, I meant signing, not encrypting. I know about asymmetrical encryption. That's why I was confused by the original statement. For signing you use your private key so that others can verify your identity by using your public key for checking the signature. For encrypting data you use the public key of the receiver.
~~The original comment used the public key for signing, which is not what you want to do.~~ I now read the explanation.
Since moving to Switzerland a year ago I fell in love with ice tea. But I just buy the cold brew tea from Aldi and add a bit of sirup, mint and lemon rind.