orhtej2@eviltoast.org to Programmer Humor@programming.devEnglish · 2 days agoREST my ass 💩eviltoast.orgexternal-linkmessage-square100fedilinkarrow-up1801arrow-down15
arrow-up1796arrow-down1external-linkREST my ass 💩eviltoast.orgorhtej2@eviltoast.org to Programmer Humor@programming.devEnglish · 2 days agomessage-square100fedilink
minus-squaredouglasg14b@lemmy.worldlinkfedilinkarrow-up4·17 hours agoHonestly at this point if it’s source available it’s almost faster to dig through and find the affected module on source to determine behavior. Unless of course it’s just crazy abstracted, which can be an unintentional form of obfuscation when applied poorly.
Honestly at this point if it’s source available it’s almost faster to dig through and find the affected module on source to determine behavior.
Unless of course it’s just crazy abstracted, which can be an unintentional form of obfuscation when applied poorly.