thesmokingman

@thesmokingman@programming.dev

This profile is from a federated server and may be incomplete. Browse more on the original instance.

thesmokingman,

I personally use Apache 2.0 because it’s been upheld in court. I’m not sure if MPL has been directly challenged in court. Either way, I agree with the sentiment. The legal perspective is why I moved away from MIT/ISC.

thesmokingman,

If it is so self-evident, you should be able to explain why your faith in evidence trumps anyone else’s faith in anything else. You don’t know why you believe what you believe and you’re completely incapable (so far, based on the evidence you’ve provided) of doing anything beyond “James Randi says it so it must be true.” You seem to blindly believe anything anyone in a position of authority states (courts, insurance always right provided they have a modicum of evidence to support their claim). You pound the “evidence trumps everything” pulpit yet can’t explain why, logically, that might make sense.

You remind me of the evangelicals I’m also not a fan of.

thesmokingman,

You haven’t shown that an insurance decision is correct. You also didn’t show that a court decision is right. You’re not seeing the forest for the trees.

Your faith is that evidence trumps all. That is a baseless claim unless you can prove it without the structures of evidence-based discourse. You are using logic to prove your statements which is logically equivalent to “god said so.” You argue your beliefs trump theirs; you are equivalent using your foundation. Your religion is logic which, as I have pointed out many times without comment from you, is just as made up as any religion and more importantly has the introspective capabilities to prove so.

This is a fairly straightforward epistemological argument; I’ve run out of ways to say it. Good luck!

thesmokingman,

All of this continues to go past you. You want to attack the metaphysical for its belief system yet you completely miss when you make the same logical leaps for yours. How can insurance companies prove something? Why are they right? If a court makes a decision, is that the correct one? Prove it. Only you can’t use logic or anything that comes from logical systems because, based on your attacks on religion, you’re not allowed to use the faith to prove the faith.

thesmokingman,

You can’t explain logic so I’m not sure you have an understanding of the arguments you’re attempting to make. I’m not seeing any justification other than “I think it’s it right.” I’ve seen no counters to the quantitative philosophical propositions and a general lack of understanding of any of the things that underpin your belief system. You still haven’t explained why your system is right.

thesmokingman,

Why are 1 and 3 the correct options? Why are they even correct? Why is 2 wrong? You don’t seem to realize any of the foundation you’re building on and you’ve done nothing other than say “if I provide evidence,” that’s enough.

Here’s a thought experiment. I take you into a closed room, put purple film over a window, and tell you the sky is purple. You’ve now got irrefutable proof that the sky is purple. But wait, you say! I can go outside and find different evidence, so clearly having evidence alone is not enough. We could even sidestep the problem by saying that the sky is colorless; it’s the refraction of the light that makes the color. Different frame; different counter.

So why are you right? Why is your frame correct?

thesmokingman,

He added a midquel, Port of Shadows, in 2018, and there are some really good shorts you can find in his Best of collections that are also recent. I’ve found a lot of folks who read them back when have missed these!

I feel like this is a great rec because The Witcher is pretty grimdark and Cook is a grimdark progenitor. Good pick!

thesmokingman,

This is really dependent on whether or not you want to interact with mounted volumes. In a production setting, containers are ephemeral and should essentially never be touched. Data is abstracted into stores like a database or object storage. If you’re interacting with mounted volumes, it’s usually through a different layer of abstraction like Kibana reading Elastic indices. In a self-hosted setting, you might be sidestepping dependency hell on a local system by containerizing. Data is often tightly coupled to the local filesystem. It is much easier to match the container user to the desired local user to avoid constant sudo calls.

I had to check the community before responding. Since we’re talking self-hosted, your advice is largely overkill.

thesmokingman,

I don’t understand how AGPL allows Canonical to make and sell proprietary copies of this software without violating their license. That’s the only way your scenario could happen. If you’re aware of a situation where a company can do this, I’d love to learn.

thesmokingman,

Wow! I learned something. To return the favor, life would be better for you if you were less rude in the way you convey information.

thesmokingman,

They would have used a license like SSPL or the newer BSL for that. AGPL keeps it open. They got that going for them and about nothing else.

thesmokingman,

The beauty of open source code is that you can fork this project and add that. The repo maintainer seems to have a simple litmus test for whether or not something should be on the list: is it something that will cause a bounce for email distribution? That’s a really subjective test so you kinda have to talk to the repo maintainer about answering it. I suspect they feed it into a library, perhaps one of the ones linked, for use with their platform, so their problem is most likely solved.

thesmokingman,

You’ve ignored my questions attempting to flesh out your point and refuse to link this specific list to anything bad. I don’t think you understand good or bad faith. Good luck with that!

thesmokingman,

In theory, my email only serves as a way to verify me and spam me. A good account may require an email for communication and should allow that email to be changed without losing the account, in the same way the good account will let me change the password, the MFA, and ideally even the username (looking at you Steam). Same as a phone number. We’re beginning to see a move toward that flexibility. Most accounts with MFA allow it.

thesmokingman,

Sometimes people genuinely don’t know correct syntax. If you’re going to call that a shortcoming, you’re an ignorant walnut. Intellectual superiority is a shitty way to pretend to be better than someone else. It often incorrectly assumes everyone types the same language with the same proficiency which is a very provincial assumption.

Proton Mail CEO Calls New Address Verification Feature 'Blockchain in a Very Pure Form' (tech.slashdot.org)

Proton Mail, the leading privacy-focused email service, is making its first foray into blockchain technology with Key Transparency, which will allow users to verify email addresses. From a report: In an interview with Fortune, CEO and founder Andy Yen made clear that although the new feature uses blockchain, the key technology...

thesmokingman,

Just because a blockchain is “private” doesn’t make it suddenly changeable

This is patently false. All blockchains are changeable with enough consensus. See something like this article.

thesmokingman,

It doesn’t matter what the tech is, if you can’t audit it, you can’t trust it.

Also a single private blockchain owner is just a blackbox data store, not a blockchain. I’ve already explained how it’s vulnerable to very simple attacks, much less the complicated attacks that will be thrown at something like this.

thesmokingman,

A fork assumes the old chain continues to exist instead of being completely replaced. Without insight into the chain, which is we can’t have until it’s public, you can’t make any guarantees of immutability.

thesmokingman,

I still don’t see why that matters.

Put differently, I’ve got a revolutionary new financial encryption system. It can safely act as the middleware between you and any vendor. You can trust me with your credit card numbers because of my years experience and industry clout. You can’t see my system and I won’t do a PCI audit because it’s in beta. You can totally trust me though.

thesmokingman,

You don’t understand basic trust relationships. I don’t really care about your opinion. I already called out that your blind trust in beta software conflicts with my security fundamentals so we’re at an impasse. Once you understand why validation is important or can show why a critical component of trust architecture is somehow not necessary, I’d be happy to be happy to reconsider your opinion.

thesmokingman,

Your only response to valid criticism about the lack of verification is pointing to the state of development as if that magically washes away all of the criticism. It doesn’t.

While I do have many tinfoil hats, basic fucking trust measures do not require me to pull them out. This is cryptography 101 shit not anything complicated.

thesmokingman,

Hey I’ve got a new scheme to validate the identity of someone for a very sensitive conversation. You wanna use it? Trust me, it’s secure.

I feel like you don’t understand the difference between a product roadmap and security fundamentals.

What's an alternative to Spotify that doesn't play you the same fucking songs over and over?

I am in an intense love-hate relationship with Spotify. It makes good mixes for me, I have found a lot of great bands that way. BUT IT KEEPS REGURGITATING THE SAME SONGS IN THERE. I know about Song Radios and Artist Radios, so please don’t recommend those. Smart Shuttle doesn’t cut it, either....

thesmokingman,

While I primarily use streaming services, I almost always still buy albums on Bandcamp for the day when I need to go back to running my own music. You can save up for a Bandcamp Friday when more goes to the artist. Bandcamp has been the best place for music for awhile. Best to get in before Songtradr continues the destruction Epic started.

thesmokingman,

Your gut reaction about Nord is correct. They completely mishandled a breach a few years ago and never did anything to even attempt to regain trust. I care more about the transparency here than I do about the attack itself.

thesmokingman,

I’m not sure I follow the closed source bit. For example, Virus Total is closed source but a something used by cybersecurity professionals across the world. Most of the software that powers cloud giants is closed source and security professionals everywhere accept the shared security model.

Closed source matters for encryption, not necessarily tooling. It’s a red herring unless you’re talking about a tool’s ability to encrypt/decrypt.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #