Plutus, Haskell, Nix, Purescript, Swift/Kotlin. laser-focused on FP: formality, purity, and totality; repulsed by pragmatic, unsafe, “move fast and break things” approaches


AC24 1DE5 AE92 3B37 E584 02BA AAF9 795E 393B 4DA0

  • 7 Posts
  • 186 Comments
Joined 2 years ago
cake
Cake day: June 17th, 2023

help-circle



  • You conveniently dodged my question, then asked me stupid questions, thinking I’d have to agree with cherry-picked offenses by China. I am not a fan of China. I just think they are justified in defending themselves. Furthermore, I think it’s hilarious that the the US decided to offshore our high tech goods to have them manufactured there as if we weren’t ASKING to be hacked. The only solution going forward is CLEARLY domestic RISC-V manufacturing and not allowing our enemies to manufacture our critical technologies.

    Do I support China’s:

    • domestic surveillance: of course not
    • transnational repression: of course not
    • supression (sp!) of free speech and freedom of the press: of course not
    • bullying of its neighbours: of course not
    • aggression against Taiwan: of course not

    Do I support China engaging in pre-emptive cyber warfare against aggressors: absolutely

    Do I support the US engaging in pre-emptive cyber warfare against aggressors: absolutely

    Do I support Israel engaging in pre-emptive cyber warfare against aggressors: absolutely

    Do I support war crimes being committed by ANY of these countries: NO


  • Embedding Trojans in your enemy’s infrastructure and leaving them to be switched on in times of war is ABSOLUTELY defense. You may not like it. But that’s called cyber warfare.

    Quick question: Do you fundamentally disagree with what China is accused of but fully support Israel and the US’s extrajudicial backdoors, Trojan horses, domestic spying, pager bomb assasinations, AI targeted air strikes, and other clandestine war crimes just because they are perpetrated by “the good guys”?










  • demesisx@infosec.pubtoLinux@lemmy.worldxxx
    link
    fedilink
    English
    arrow-up
    17
    ·
    edit-2
    8 months ago

    I’m genuinely curious why you’d want to do that. Mine is timed to coincide with the circadian rhythms of the GPS coordinates and those are provided as hard-coded values in my config. I suppose the only optimization I could imagine is a script where it would get my IP then correspond that with GPS coordinates so I could have circadian screen coloring wherever I go with my laptop.

    My point is, it’s a setting that I don’t turn off because that would defeat the purpose of the app.



  • We need widespread adoption and innovation in OPEN ARCHITECTURES like RISC-V. Anything else is just citizens and companies being used as pawns to do the dirty work for rivaling nation states that spy on and stifle the liberties of their own citizens.

    Intel has most likely hidden a back door in Intel chips and China has most likely hidden a back door into ARM, ESP8266, ESP32, and other chipsets. No one can ever prove this conclusively without violating NDA’s because these are closed architectures.





  • I’m glad you asked!

    Formal verification is an automatic checking methodology that catches many common design errors and can uncover ambiguities in the design. It is an exhaustive methodology that covers all input scenarios and also detects corner case bugs.

    One of the most futuristic companies I know of is Runtime Verification that uses formal Methods in industry. They have a list of accomplishments that seem like vaporware including a semantic babel fish called the K framework that can translate between languages based on formal, semantic definitions of each.