Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
@EpicofGilgamesh hehe
See that’s what I like to hear now if you would just pay to meet me somewhere in Europe since I don’t like being eaten by lions or tropical heat and we can get started lol with the other 450 or so people lol -
@EpicofGilgamesh nice to remember being optimistic and able to live in the moment during less dark times however
-
@EpicofGilgamesh ya sometimes it almost gives you an insight into what horrible things people were thinking
smartctl is a work of pure horror that would make lovecraft blanch pale white -
herein is kind of the dangerous part
they have all these elaborate stupidities
and i'm so worn out but if i just up and quit completely they just do everything all over again
same as if i don't
and they need to be providing a mode of life that is acceptable but they're not -
and i said that before. lets talk something new.
how is it you ended up in the same scenario talking and replying to the same post gilgamesh ?
crazy too ? -
@EpicofGilgamesh i feel kind of braindead right now
i should go get some exercise them my spirits would be up and i'd be braindead from the mindless repetition. -
@EpicofGilgamesh after awhile you have tyo wonder if this chain of events doesn't permamently fuck everyone up. as in they can't resist a behavior even if they try if they done the same thing so many times.
and then the secondary observer effect is just as strong heh. -
@EpicofGilgamesh about the binary distributions and the use of higher level knowledge of number theory to reduce variance
-
@EpicofGilgamesh most binary distributions and drivers have back doors buried in them somewhere. and most NoS publicly available has the same, and many areas are hosting networks that basically report the location of select devices and their contents up until they are stolen excepting time periods the people involved think they will be caught.
vulnerabilities meanwhile ins oftware and hardware are often engineered in. -
@EpicofGilgamesh but control of supply and recovery of these devices with no chance of completely cleaning them is the method of choice in many cases. meanwhile file and photo permanence is consistently added into online services so a portion of the population that won't willfully turn their shit over or delete it loses everything priodically.
-
I’m a little overwhelmed by the kernel code base especially
Took me awhile to figure out how it was organized
And then it’s c!
So I was just thinking scenario wise how if I founded a military organization who’s aim was to depose an insane dictator from power while remaining undetected including from all his insane supporters how I would use Linux
After I took every source package offline and modified and source checked it and disabled the ability for it to use regular tcp ip for anything but tunneling
The reasoning ? I just installed one program and it downloaded 40 some extra packages that I have no idea what are doing
Linux is great but do we actually know what the software is doing ? Same as windows only you can’t compiler that from scratch
It’s either trust a bunch of random people or trust a bunch of random people part of an evil company
Not the best of choices
But oh how beautiful it would be after I had 500 people pick every last package apart with a reasonable deadline of 2 years entirely offline at frozen versions
Then we could fork all the projects
Or only implement very carefully source reviewed patches transported via offline medium To computers that are running vms to house and test all additional patches so if it blows up we just copy our raw frozen image back over it and either scrap or repair the change
As connecting to the internet in general is not an good idea for silent running
random