This is a tool to analyze large goroutine stacktrace dump files, to assist in debugging by parsing the dump and displaying it in a structured table.
It works entirely client-side (no data is uploaded or stored), groups together goroutines with identical stacktraces into a single entry, and allows quickly sorting/filtering/searching.
I firmly disagree. Hiding things is a hack; the actual solution is to change society such that exposure entails no significant consequences.
Sure, as a band-aid to make existing real people feel secure? Hiding things and keeping them hidden is fine. It's just an indicator of how far we as a society still have to go.
Do remember: "it's our responsibility to hide things to support freedom and democracy" is the exact argument used by the government against things like Wikileaks. The exact argument.
I'm not sure I follow your logic. So are you saying if we were a further advanced society people could have sex a crowded bus or restaurant and we should just all accept it and not expect them to get some privacy?
I'm not suggesting anyone should be ashamed of sex. I am suggesting that most people want that moment to be private and even those that around them want them to keep it private as well.
"Do remember: "it's our responsibility to hide things to support freedom and democracy" is the exact argument used by the government against things like Wikileaks. The exact argument."
The government does not have the right to privacy, we do. And exercising that right is well doing something we have the right to do.
It is the response to the argument that "If you don't have something to hide, you shouldn't mind having your rights trampled on" with the attendant presumption that anyone with something to hide must be a criminal or a T7t.
Watched video, still not sure - it's enabling things and there's space - what do I do on Loom? Can I do this? Can I do that? One screenshot or even a conceptual one would have done all that...
But isn't suing to enforce his patent rights also an expensive legal battle that he would need to somehow fund?
I don't see how this threat could be seen as effective.
It works entirely client-side (no data is uploaded or stored), groups together goroutines with identical stacktraces into a single entry, and allows quickly sorting/filtering/searching.