

Removed by mod
Plutus, Haskell, Nix, Purescript, Swift/Kotlin. laser-focused on FP: formality, purity, and totality; repulsed by pragmatic, unsafe, “move fast and break things” approaches
AC24 1DE5 AE92 3B37 E584 02BA AAF9 795E 393B 4DA0
Removed by mod
Removed by mod
You conveniently dodged my question, then asked me stupid questions, thinking I’d have to agree with cherry-picked offenses by China. I am not a fan of China. I just think they are justified in defending themselves. Furthermore, I think it’s hilarious that the the US decided to offshore our high tech goods to have them manufactured there as if we weren’t ASKING to be hacked. The only solution going forward is CLEARLY domestic RISC-V manufacturing and not allowing our enemies to manufacture our critical technologies.
Do I support China’s:
Do I support China engaging in pre-emptive cyber warfare against aggressors: absolutely
Do I support the US engaging in pre-emptive cyber warfare against aggressors: absolutely
Do I support Israel engaging in pre-emptive cyber warfare against aggressors: absolutely
Do I support war crimes being committed by ANY of these countries: NO
Embedding Trojans in your enemy’s infrastructure and leaving them to be switched on in times of war is ABSOLUTELY defense. You may not like it. But that’s called cyber warfare.
Quick question: Do you fundamentally disagree with what China is accused of but fully support Israel and the US’s extrajudicial backdoors, Trojan horses, domestic spying, pager bomb assasinations, AI targeted air strikes, and other clandestine war crimes just because they are perpetrated by “the good guys”?
This story deserves a “no doy!”
All major world powers are bolstering their cybersecurity. If they weren’t, they wouldn’t survive in such an opportunistic world.
Removed by mod
If you can use another method, disabling SSH entirely would do it. ;)
This is how Talos Linux achieves best-in-class security properties.
https://www.siderolabs.com/blog/how-to-ssh-into-talos-linux/
I used to keep a list of repos to pull onto my NAS in case they someday went closed source. I use “mr” for it. It worked great. I had it on a systemd timer.
I’d go with NixOS in impermanence mode coupled with home-manager and a NixOS service that does the backup “cron job” that another poster talked about (just in case).
Even if she somehow managed to brick the system, you could completely restore it within minutes to the EXACT state you left it in using just these three or four Nix tools. Hell, she could even do it herself by rebooting and selecting a previous config at the start screen. All she needs to do is be able to press down and enter.
home-manager for NixOS has escaped your notice. ALL of my dot files are declared in my nix-config.
Furthermore, this module would likely complete the possibility of building a grandma-proof immutable OS complete with immutable home folders: https://wiki.nixos.org/wiki/Impermanence
You should try NixOS or something similar. It sounds like all of your gripes with Linux are solved by NixOS. It makes system management a LOT more sane than FHS has gotten.
Probably wise to tell us what the app does in the title.
I had to scroll far too much just to figure out that it’s a DAW.
I’m genuinely curious why you’d want to do that. Mine is timed to coincide with the circadian rhythms of the GPS coordinates and those are provided as hard-coded values in my config. I suppose the only optimization I could imagine is a script where it would get my IP then correspond that with GPS coordinates so I could have circadian screen coloring wherever I go with my laptop.
My point is, it’s a setting that I don’t turn off because that would defeat the purpose of the app.
95% likely China could use them as a DDOS attack vector someday. They’re ubiquitous. Espressif Systems is a Chinese company based in Shanghai.
We need widespread adoption and innovation in OPEN ARCHITECTURES like RISC-V. Anything else is just citizens and companies being used as pawns to do the dirty work for rivaling nation states that spy on and stifle the liberties of their own citizens.
Intel has most likely hidden a back door in Intel chips and China has most likely hidden a back door into ARM, ESP8266, ESP32, and other chipsets. No one can ever prove this conclusively without violating NDA’s because these are closed architectures.
Hopefully this sticks. IMO, movie studios need to keep attracting customers or the whole film industry will stay dead.
It’s not important unless Xmonad was being used for some kind of task where human lives are at risk if a mistake was made. In my case here (and indeed much of the Haskell world) it’s just fun to surround myself with software of that kind of code quality/reliability.
I’m glad you asked!
Formal verification is an automatic checking methodology that catches many common design errors and can uncover ambiguities in the design. It is an exhaustive methodology that covers all input scenarios and also detects corner case bugs.
One of the most futuristic companies I know of is Runtime Verification that uses formal Methods in industry. They have a list of accomplishments that seem like vaporware including a semantic babel fish called the K framework that can translate between languages based on formal, semantic definitions of each.
Try Xmonad! I run a community for it at https://infosec.pub/c/xmonad
It’s super lightweight and is the only formally verified window manager. There’s a new version being created for Wayland called Waymonad.
Every nation in the world should fund open source technologies with a large chunk of their tax revenue. The fact that this isn’t even close to happening almost everywhere says all we need to know about world governments and their corporatist nature.