Migrated from Lemm.ee under the same username.

  • 3 Posts
  • 73 Comments
Joined 2 months ago
cake
Cake day: June 29th, 2025

help-circle
  • Bubs@lemmy.zipto196@lemmy.blahaj.zonechildrule
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    9 hours ago

    In the most technical way, that green is what you would get.

    If you blend the colors with a gradient, you get these, which to me feels like a more natural blend:

    More muddied and dull versus the technically correct color.



  • Bubs@lemmy.zipto196@lemmy.blahaj.zonechildrule
    link
    fedilink
    English
    arrow-up
    15
    ·
    14 hours ago

    It’s a play on how real skin color tends to work. Most of the time, (but not always,) the child tends to get a skin shade somewhere between the parents. Just like if you averaged the colors.

    Using that same logic, the second pencils would have expected a yellowish-blue baby. Instead they got the technically correct, but unexpected color of green.


  • Bubs@lemmy.zipto196@lemmy.blahaj.zonechildrule
    link
    fedilink
    English
    arrow-up
    36
    ·
    14 hours ago

    The joke comes from how colors are mixed. Red and white will always make pink but green and blue make different colors depending on if you’re adding or subtracting colors.

    Additive color (RGB) is when you shine red green and blue flashlights at a wall. If all three meet, you get white light.

    Subtractive color (CMY) is where you add pigments to a surface that absorb certain colors. Adding cyan, magenta, and yellow pigments results in a black surface since all light gets absorbed. (Normally it’s CMYK for printing where K is black so you can get deeper blacks)














  • From the article about what is vulnerable:

    For Linux systems, attackers need the target to be using a vulnerable 7-Zip version while extracting an archive format that supports symbolic links, such as ZIP, TAR, 7Z, or RAR files.

    On Windows systems, additional requirements must be met for successful exploitation. The 7-Zip extraction process must have elevated privileges or operate in Windows Developer Mode to create symbolic links. This makes Windows systems somewhat less susceptible but not immune to the attack.

    So Linux users would have to scan for symbiotic links beforehand, and Windows users just need to never run with elevated privileges, or scan beforehand if they do (I’m assuming that elevated privileges means “run as administrator”?)