cultural reviewer and dabbler in stylistic premonitions


Would be easier to know how old a kernel release is without looking it up.
I concur, but it would be much easier to make the major version the current year (as many projects do, and Linux should imo) rather than the whole project’s age at the time of a release.
Linux is only 34 years old, btw.


but all decisions of that officer have to be ratified at a special biweekly meeting

edit: this post title said ‘que’ when i first posted this comment, but was later edited


yeah - but it’s not hard to understand the motivation to do unpaid labor to develop (and promote) FOSS - it’s the promotion of proprietary things (many if not most of which i infer OP doesn’t even use themself) which baffles me.
if OP truly isn’t getting paid by any of these companies for making posts like this then they’re leaving money on the table, because many of the companies behind the proprietary products and services they’re recommending do spend a substantial amount on marketing.


i don’t understand what motivates you to do so much unpaid labor to market/advertise/recommend commercial products and services which you yourself would not even use.


i thought you had stopped recommending protonmail and spotify but i see now both are back (spotify not in this image, but (with caveats) on your website).
i see you’ve been making these images for many years and obviously put a lot of time in to it - i assume that like most other ethical consumerism campaigns you must have some funding for it? (from who?)


what’s wrong with vivaldi
it’s proprietary/closed-source
aren’t you supposed to give incorrect answers in this community?


AI code will likely get to the point where it is just a higher level language

yeah, but i don’t understand why this site isn’t republishing in full all the files they’ve obtained and instead is only making the data available to query through them

in b4 haveibeenhaveibeenflocked.
they have a list of their current collection of 239 .csv files but sadly don’t appear to let you actually download them to query offline
“If you hard, then you hard.”
identity politics?


No. Unless Stripe has also implemented the ZK protocol in their whitepaper (which i’m sure they haven’t) then whatever PCI stuff Stripe does is entirely unrelated to the privacy guarantees implied by phreeli’s new protocol.


If a payment processor implemented this (or some other anonymous payment protocol), and customers paid them on their website instead of on the website of the company selling the phone number, yeah, it could make sense.
But that is not what is happening here: I clicked through on phreeli’s website and they’re loading Stripe js on their own site for credit cards and evidently using their own self-hosted thing for accepting a hilariously large number of cryptocurrencies (though all of the handful of common ones i tried yielded various errors rather than a payment address).


So like, it’s a situation where the “lock” has 2 keys, one that locks it and one that unlocks it
Precisely :) This is called asymmetric encryption, see https://en.wikipedia.org/wiki/Public-key_cryptography to learn more, or read on for a simple example.
I thought if you encrypt something with a key, you could basically “do it backwards” to get the original information
That is how it works in symmetric encryption.
In many real-world applications, a combination of the two is used: asymmetric encryption is used to encrypt - or to agree upon - a symmetric key which is used for encrypting the actual data.
Here is a simplified version of the Diffie–Hellman key exchange (which is an asymmetric encryption system which can be used to agree on a symmetric key while communicating over a non-confidential communication medium) using small numbers to help you wrap your head around the relationship between public and private keys. The only math you need to do to be able to reproduce this example on paper is exponentiation (which is just repeated multiplication).
Here is the setup:
g and say it’s 2a which we’ll say is 3. Alice’s public key A is ga (23, or 2*2*2) which is 8b which we’ll say is 4. Bob’s public key B is gb (24, or 2*2*2*2) which is 16Now, using the other’s public key and their own private key, both Alice and Bob can arrive at a shared secret by using the fact that Ba is equal to Ab (because (ga)b is equal to g(ab), which due to multiplication being commutative is also equal to g(ba)).
So:
16*16*16) and gets 40968*8*8*8) and gets 4096The result, which the two parties arrived at via different calculations, is the “shared secret” which can be used as a symmetric key to encrypt messages using some symmetric encryption system.
You can try this with other values for g, a, and b and confirm that Alice and Bob will always arrive at the same shared secret result.
Going from the above example to actually-useful cryptography requires a bit of less-simple math, but in summary:
To break this system and learn the shared secret, an adversary would want to learn the private key for one of the parties. To do this, they can simply undo the exponentiation: find the logarithm. With these small numbers, this is not difficult at all: knowing the base (2) and Alice’s public key (8) it is easy to compute the base-2 log of 8 and learn that a is 3.
The difficulty of computing the logarithm is the difficulty of breaking this system.
It turns out you can do arithmetic in a cyclic group (a concept which actually everyone has encountered from the way that we keep time - you’re performing mod 12 when you add 2 hours to 11pm and get 1am). A logarithm in a cyclic group is called a discrete logarithm, and finding it is a computationally hard problem. This means that (when using sufficiently large numbers for the keys and size of the cyclic group) this system can actually be secure. (However, it will break if/when someone builds a big enough quantum computer to run this algorithm…)


Much respect to Nick for fighting for eleven years against the gag order he received, but i’m disappointed that he is now selling this service with cryptography theater privacy features.


contradictory to existing laws (eg section 230).
Section 230 is US law; this article is about the EU and GDPR.
Operating in multiple countries often requires dealing with contradictory laws.
But yeah, in this case it also seems unfeasible. As the article says:
There is simply no way to comply with the law under this ruling.
In such a world, the only options are to ignore it, shut down EU operations, or geoblock the EU entirely. I assume most platforms will simply ignore it—and hope that enforcement will be selective enough that they won’t face the full force of this ruling. But that’s a hell of a way to run the internet, where companies just cross their fingers and hope they don’t get picked for an enforcement action that could destroy them.
In Starship Troopers “service guarantees citizenship” but in the US it does not.