

Removed by mod
Plutus, Haskell, Nix, Purescript, Swift/Kotlin. laser-focused on FP: formality, purity, and totality; repulsed by pragmatic, unsafe, “move fast and break things” approaches
AC24 1DE5 AE92 3B37 E584 02BA AAF9 795E 393B 4DA0
Removed by mod
Removed by mod
You conveniently dodged my question, then asked me stupid questions, thinking I’d have to agree with cherry-picked offenses by China. I am not a fan of China. I just think they are justified in defending themselves. Furthermore, I think it’s hilarious that the the US decided to offshore our high tech goods to have them manufactured there as if we weren’t ASKING to be hacked. The only solution going forward is CLEARLY domestic RISC-V manufacturing and not allowing our enemies to manufacture our critical technologies.
Do I support China’s:
Do I support China engaging in pre-emptive cyber warfare against aggressors: absolutely
Do I support the US engaging in pre-emptive cyber warfare against aggressors: absolutely
Do I support Israel engaging in pre-emptive cyber warfare against aggressors: absolutely
Do I support war crimes being committed by ANY of these countries: NO
Embedding Trojans in your enemy’s infrastructure and leaving them to be switched on in times of war is ABSOLUTELY defense. You may not like it. But that’s called cyber warfare.
Quick question: Do you fundamentally disagree with what China is accused of but fully support Israel and the US’s extrajudicial backdoors, Trojan horses, domestic spying, pager bomb assasinations, AI targeted air strikes, and other clandestine war crimes just because they are perpetrated by “the good guys”?
This story deserves a “no doy!”
All major world powers are bolstering their cybersecurity. If they weren’t, they wouldn’t survive in such an opportunistic world.
Removed by mod
Get this fucking Google ad out of here.
This is really cool.
It reminds me of the Edinburgh Decentralisation Index: an academically rigorous decentralization index that the university of Glasgow school of informatics devised to quanitfy the decentralization of cryptocurrencies:
The Edinburgh Decentralisation Index (EDI) studies blockchain decentralisation from first principles, archives relevant datasets, develops metrics, and offers a dashboard to track decentralisation trends over time and across systems.
https://informatics.ed.ac.uk/blockchain/edi
You should give it a serious look. IMO, it would offer some insight into academically peer-reviewed ways of quantifying this kind of thing.
I think you need a lesson on recognizing cynical sarcasm.
Geerling is a YouTuber
If you can use another method, disabling SSH entirely would do it. ;)
This is how Talos Linux achieves best-in-class security properties.
https://www.siderolabs.com/blog/how-to-ssh-into-talos-linux/
You need to disable JavaScript to read my blogspam.
I read four words then was hit with this.
You’ve just hit the article limit with your free Sifted account.
Ok, ok. If you insist. I won’t read your article.
Why would you use this instead of Matrix FFS? Closed source and centralized.
I’d argue that FPTP is the real barrier. It makes it a FACT that we can only have two parties.
deleted by creator
Your history is glorious. Thanks for routinely being the only person making actual sense in the comment section. ✊🏽
I used to keep a list of repos to pull onto my NAS in case they someday went closed source. I use “mr” for it. It worked great. I had it on a systemd timer.
Hot take: Might be wise to adopt the security by obscurity model and go with an OS that is hardened (ideally, a formally verified microkernel like sel4) or runs in a custom VM/container with almost zero attack surface area.
Every nation in the world should fund open source technologies with a large chunk of their tax revenue. The fact that this isn’t even close to happening almost everywhere says all we need to know about world governments and their corporatist nature.