I fully agree. I think of it as exercising the muscle in the mind that acts as the "translation layer" between abstract concepts and human language. It is tough to convey complex ideas in word, but you can grow that skill with practice.
"Look! @tweetsauce imitated my #Mandelmap poster! I am more flattered than annoyed but seriously folks - accept no substitute for the real thing and get your poster at http://mandelmap.com"
On top of which, the Vsauce version has a typo in giant letters: "Main Cardiod"
There has been conversation happening regarding tournament play legality of digital input controllers for the Smash Bros games, most notably Super Smash Brothers Melee.
https://en.wikipedia.org/wiki/Smash_Box_controller
I was also the victim of a T-Mobile SIM swap back in February.
My assumption is that the attackers target individuals that have a high likelihood of owning bitcoin or other digital currency. This can be easily determined by looking at data breaches, and targeting emails that are found both on a cryptocurrency breach and a personal information breach with phone number, name, address, and anything else that would help impersonate the victim.
They accessed my insecure email with SMS authentication, but everything else was locked down more securely. Also, since that day I have been getting 20 times more spam calls and texts, I'm guessing they added my number to some other targeted list.
I SIM swapped myself twice on Sprint without authorization at an Apple store. Sales reps can generate a one time code for Sprint Support that allows them to bypass some of the IVRs and prove the call is coming from an Apple Store. Sprint support won't ask for a PIN or SSN. Just the line's number. Bam!
How many people can do this? See those mom and pop "authorized resellers" at the mall? Yeah.
> This can be easily determined by looking at data breaches, and targeting emails that are found both on a cryptocurrency breach and a personal information breach with phone number, name, address
... and this is why you should never use your identity for these things.
Happened to one of my friends who was also on T-mobile and had some bitcoins at some point. They got into his email and coinbase account, but he was holding any bitcoin so they tried to buy some which was declined by the credit card.
Would it be possible for me to inquire as to what library you used to generate the smoke samples for your app? I have a project where I wanted to do something very similar (just not for weather), and I've been having the hardest time finding a good library for it!
Holy wow, that's pretty amazing! You should consider making it into a opensource library for others to use, it's truly beautiful! Thank you for making this project.