"Explain Shell: write down a command-line to see the help text that matches each argument"
economically rational to unpack it at scale. For use by a human, text really does not need to be unpacked faster than said human can read it. That is probably far too slow for it to be worth blindly harvesting. The algorithm must in addition be designed as a memory hog, making it non-trivial to unpack in a massively parallel fashion. Think of it Scrypt meets plain text. It would be a rather unusual algorithm, in that you would want high packing throughput, but horrid unpacking [2/3]
Foiling data harvesting is an important problem for open platforms. If limiting the problem to mass harvesting, any adversary will have limited means available for each individual message. That means there is no need for making the data truly inaccessible, it is sufficient only making it too expensive to get at in large quantity. Imagine a text format taking a page from the key derivation functions' book: Make unpacking the data slow and memory consuming enough that it isn't [1/3]
eBay caught literally port scanning its users’ computers.
#SurveillanceCapitalism via cron.weekly
@aral That practice is around since some years.
As the scan is limited to some well known ports with malicious intent, I would think it's really more a protection than a surveillance method. But it's creepy that it's possible.
Microsoft steals name of Linux Desktop project (MauiKit and the Maui distribution) for their project that does the same thing and then blames Linux community for using that name to begin with (which is obvious trademark infringement as they've both had those names for years now). Abusing power over GitHub to then delete any issues on their project related to the name collision and deny they are at fault for ignoring the first search result that comes up for the name Maui.
You can tell they are trying to embrace, extend, and extinguish. But with blunders like this and the way their megacorp stooge bosses like to handle it they won't be extending anything.
"In our view, any documentation that limits individual freedoms on the basis of biology risks becoming a platform for restricting human rights, increasing discrimination and threatening — rather than protecting — public health. Here we present ten reasons why immunity passports won’t, can’t and shouldn’t be allowed to work."
Managed to make a semi-useful program in Forth last night. The code looks like dog's breakfast, but at least I'm making progress. I'm realizing coding top-down actually requires you to be fairly proficient in a language, something which I have tended to under-estimate. Coding bottom-up is easier implementation-wise, but that requires you to have a better understanding of the whole program ahead of time.
I have put a program I wrote to scratch an itch on https://pagure.io/evelopen . It's a simple CLI utility in Python which pipes data through it and adds a binary envelope with checksum and timestamp, and that's it. I use it to add a little integrity information to files which I otherwise would easily screw up the state of.
Me: What should I be doing instead of files?
Computer: Glad you asked! It's 2020. You should be spinning up a Kubernetes of Dockers on your public cloud each of which is a Github which send JSON messages over HTTP3 to the microservice host on your Virtualbox private cloud which is running a whole bunch more Dockers each of which is a Node.js which is pulling dependencies from
Me: files seemed a bit simpler than that
Computer: WELL WE HAD A VOTE AND YOU WEREN'T THERE AND WE SAID FILES SUCK.
Women on Web, a non-profit organization providing support to women and pregnant people has been blocked by various ISPs all over Spain
Python, vim, ARexx, that kind of stuff. Writes Java at work. Toots in Norwegian over at https://snabelen.no/@Steinar
Fosstodon is an English speaking Mastodon instance that is open to anyone who is interested in technology; particularly free & open source software.