Keyoxide: aspe:keyoxide.org:KI5WYVI3WGWSIGMOKOOOGF4JAE (think PGP key but modern and easier to use)

  • 0 Posts
  • 124 Comments
Joined 3 years ago
cake
Cake day: June 18th, 2023

help-circle

  • It’ll train everyone to ignore the warnings, so if a different platform implements such a system more sensibly users will be inclined to ignore those warnings too now. Overusing a warning is a really quick way to make people ignore it even where used correctly.
    If you placed wet floor signs everywhere just in case, fall injuries would increase.

    Systems around this will develop, either people will learn to dig up the dms, or it’ll be incorporated into normal communication. It’s already become the norm to use friend requests as a dm request on discord, due to previous dm restrictions.











  • Don’t wanna interrupt your rant, but “determinism and verifiable integrity” doesn’t sound like it’d impede changes.

    Determinism/reproducible builds allow independent verification that a source corresponds to the binaries some repo ships. You can set up most languages, build systems, and environment to be reproducible, and once done it doesn’t have any additional effects, except maybe when changing build procedures you have to maintain the reproduceability.

    “verifiable integrity” to me sounds like computer proof systems. Showing an algorithm/code/program corresponds exactly to some written spec, mathematically.

    The project seems to be positioned explicitly against points of authority and “security” through compliance checks and certifications.





  • At least those eat no resources besides taking up space in htop. And can be traced to the parent being weird.
    Have you dealt with io-locked processes? Funny D-statuses spreading like a disease, anything that touches an infected process or resource also inherits it. Worst cases I have seen (nfs client kernel module not connecting a mountpoint properly) made every one of those fully resistant to -9.