Addendum: In computational terms, you can’t avoid using a ‘hack’. Maybe not the hack you described, but something, somewhere has to be hard-coded. How else would you avoid solipsism?
Addendum: In computational terms, you can’t avoid using a ‘hack’. Maybe not the hack you described, but something, somewhere has to be hard-coded. How else would you avoid solipsism?