

Removed by mod
Plutus, Haskell, Nix, Purescript, Swift/Kotlin. laser-focused on FP: formality, purity, and totality; repulsed by pragmatic, unsafe, “move fast and break things” approaches
AC24 1DE5 AE92 3B37 E584 02BA AAF9 795E 393B 4DA0
Removed by mod
Removed by mod
You conveniently dodged my question, then asked me stupid questions, thinking I’d have to agree with cherry-picked offenses by China. I am not a fan of China. I just think they are justified in defending themselves. Furthermore, I think it’s hilarious that the the US decided to offshore our high tech goods to have them manufactured there as if we weren’t ASKING to be hacked. The only solution going forward is CLEARLY domestic RISC-V manufacturing and not allowing our enemies to manufacture our critical technologies.
Do I support China’s:
Do I support China engaging in pre-emptive cyber warfare against aggressors: absolutely
Do I support the US engaging in pre-emptive cyber warfare against aggressors: absolutely
Do I support Israel engaging in pre-emptive cyber warfare against aggressors: absolutely
Do I support war crimes being committed by ANY of these countries: NO
Embedding Trojans in your enemy’s infrastructure and leaving them to be switched on in times of war is ABSOLUTELY defense. You may not like it. But that’s called cyber warfare.
Quick question: Do you fundamentally disagree with what China is accused of but fully support Israel and the US’s extrajudicial backdoors, Trojan horses, domestic spying, pager bomb assasinations, AI targeted air strikes, and other clandestine war crimes just because they are perpetrated by “the good guys”?
This story deserves a “no doy!”
All major world powers are bolstering their cybersecurity. If they weren’t, they wouldn’t survive in such an opportunistic world.
Removed by mod
Get this fucking Google ad out of here.
This is really cool.
It reminds me of the Edinburgh Decentralisation Index: an academically rigorous decentralization index that the university of Glasgow school of informatics devised to quanitfy the decentralization of cryptocurrencies:
The Edinburgh Decentralisation Index (EDI) studies blockchain decentralisation from first principles, archives relevant datasets, develops metrics, and offers a dashboard to track decentralisation trends over time and across systems.
https://informatics.ed.ac.uk/blockchain/edi
You should give it a serious look. IMO, it would offer some insight into academically peer-reviewed ways of quantifying this kind of thing.
Geerling is a YouTuber
If you can use another method, disabling SSH entirely would do it. ;)
This is how Talos Linux achieves best-in-class security properties.
https://www.siderolabs.com/blog/how-to-ssh-into-talos-linux/
You need to disable JavaScript to read my blogspam.
I read four words then was hit with this.
You’ve just hit the article limit with your free Sifted account.
Ok, ok. If you insist. I won’t read your article.
Why would you use this instead of Matrix FFS? Closed source and centralized.
I’d argue that FPTP is the real barrier. It makes it a FACT that we can only have two parties.
I used to keep a list of repos to pull onto my NAS in case they someday went closed source. I use “mr” for it. It worked great. I had it on a systemd timer.
Are there obvious, inherent pitfalls to deregulation of anything at all? Yes.
Is it absolutely necessary for it to exist? Also yes. Self sovereignty is both dangerous and absolutely necessary…unless you WANT Uncle Sam to be able to put a short time-limit on spending your tax return once they adopt a Central Bank Digital Currency (and they will). With a CBDC controlled by the Fed, we will be subject to money that expires and other features that feel like bugs that go hand in hand with a central power controlling a currency.
Agree to disagree then. You don’t seem to grasp my points and I don’t grasp yours. Peace.
As my rant above detailed, I’d be happy to give up my belongings if I lived in a truly communist society. But I don’t. So, I hold onto my possessions tightly since it is literally the way I survive.
I suspect you should listen to your own counterpoint:
Don’t walk down the street because someone might rob you.
Don’t use your computer because someone could hack you.
Don’t go swimming because it is possible to drown.
Throwing out the baby with the bathwater.
An uncensorable ledger not controlled by any one party is (at the very least) a valuable technology with unique abilities despite scammers using it for gambling.
The digital equivalent of uniqueness is (at the very least) a valuable technology with unique abilities despite assholes using it for Bored Apes.
Just because you can’t see the use case, doesn’t mean we need to stop innovating.
Scammers:
I’ve spotted many scammers a mile away just starting with this list off the top of my head.
For instance, I am the moderator of infosec.pub/c/midnight and actually locked my own communities until I see the source code.
I like the tech from what they tell me. But, I can’t, in good conscience recommend it yet because it ticks some of the above scammer boxes.
You: “If you won’t spend your whole weekend on your smart phone, writing a paper for me complete with MLA formatted bibliography, you are wrong.”
https://jamesclear.com/book-summaries/confessions-of-an-economic-hitman
Every nation in the world should fund open source technologies with a large chunk of their tax revenue. The fact that this isn’t even close to happening almost everywhere says all we need to know about world governments and their corporatist nature.