Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)IK
Posts
0
Comments
507
Joined
2 yr. ago

  • I was interested in that quote, since it seems incredible:

    https://quoteinvestigator.com/2017/10/29/hire-half/?amp=1

    tldr: it originally appeared in slightly different form in a newspaper article by a critic of Jay Gould about his failure to get a particular policy through, and was probably not something Gould said in so many words.

    Interesting though!

  • Don't let the perfect be the enemy of the good.

    If you need something you can still search for it using Google. Sometimes manufacturers even have lists of companies who sell their stuff. You can buy from some other retailer.

    And if Amazon is a lot cheaper or the only option, then you suck it up to living in a fully-evolved capitalistic hell scape and buy it from Bezos.

  • From RFC 2804:

    • The IETF believes that adding a requirement for wiretapping will make affected protocol designs considerably more complex. Experience has shown that complexity almost inevitably jeopardizes the security of communications even when it is not being tapped by any legal means; there are also obvious risks raised by having to protect the access to the wiretap. This is in conflict with the goal of freedom from security loopholes.

    https://datatracker.ietf.org/doc/rfc2804/

    This was written in 2000 in response to US government requests to add backdoors to voice-over-IP (VoIP) standards.

    It was recognized 25 years ago that having tapping capabilities is fundamentally insecure.

  • It can be done. The website provider can generate a request that it forwards to you. You then pass on this request to the age verifier, who can answer "yes person is over 16" without knowing why you want to know, or who generated the request.

    The requester wouldn't know your age, just that you were old enough.

    There are a few problems.

    One is that the website could embed some identifier in the signature of their request. But any information there can be easily send by the web site provider to the age verifier directly if they wanted so this is not a big problem.

    Another problem is that the age verifier could look at times when requests were submitted and create a sort of "fingerprint" based on when requests arrived for different sites. This could be partially helped by having browsers request age verification randomly in the background any time you use a browser.

  • I worked with a French guy in Amsterdam. His parents were Portuguese, but he was born and raised in France. As far as he was concerned, he was French.

    Contrariwise, I worked with an American woman in Virginia. Her grandparents were Irish, and she considered herself Irish, in spite of having been born and raised in America, and both of her parents having been born and raised in America.

    It is a kind of fetish in America to hyphenate yourself. Irish-American. Cuban-American. And so on.

    My own theory is that this is because America has no culture going back many generations, so people try to find one.

  • SHAME.

    Jump
  • Thank you for this! At least according to the Wikipedia article you're right, and Pasteur invented the technique for wine. Beer came soon after, by others, but it was a long time until it was used on milk.

    https://en.m.wikipedia.org/wiki/Pasteurization

  • So this isn't about routing really, rather about optimizing standby routers for recovery.

    A few things make me nervous.

    First, the description of the work involved seems to imply that your setup really needs more automated tooling. Nontrivial, but you've already mentioned typos, and that this is for large operations.

    Second, using IPv4 for your management network is wasteful and needlessly complicated. Even if your customer traffic is all IPv4, there's really no reason to use legacy protocols for internal routing.

  • I'm not sure that I understand the benefit of "unnumbered" routing. It sounds like there are numbers (well, "identifiers"), just not IP addresses.

    It's hard to know without more context, but you can use things like IPv6 multicast to manage reachability. This will let you set arbitrary sets of endpoints that talk to each other, and you can still us IP-based tools to debug connectivity, measure performance, and so on.