|
|
Subscribe / Log in / New account

Recently posted comments

Leaderless Debian

Posted Mar 12, 2019 8:53 UTC (Tue) by cevin666 (guest, #960)
In reply to: Leaderless Debian by edomaur
Parent article: Leaderless Debian

Still can't stop laughing.


Leaderless Debian

Posted Mar 12, 2019 8:14 UTC (Tue) by Cyberax (✭ supporter ✭, #52523)
Parent article: Leaderless Debian

I nominate Trump + Pence! Make Debian Great Again!


Leaderless Debian

Posted Mar 12, 2019 7:49 UTC (Tue) by mfuzzey (subscriber, #57966)
Parent article: Leaderless Debian

Well Belgium went 589 days without a government, I'm sure Debian will get along for quite a while without a DPL :)


An "i3" is also a window manager.

Posted Mar 12, 2019 7:18 UTC (Tue) by bangert (subscriber, #28342)
In reply to: An "i3" is also a window manager. by gmatht
Parent article: Announcing the release of sway 1.0

And from those of us unaware of the existence of an Intel i3 - thank you for your comment!


Leaderless Debian

Posted Mar 12, 2019 5:05 UTC (Tue) by edomaur (subscriber, #14520)
Parent article: Leaderless Debian

>> Since Debian developers are famously an agreeable and non-argumentative bunch, there should be no problem with that aspect of things.

Woof !


An "i3" is also a window manager.

Posted Mar 12, 2019 2:13 UTC (Tue) by gmatht (subscriber, #58961)
Parent article: Announcing the release of sway 1.0

It is possible that Wayland has become so bloated that scaling down to a lowly Intel i3 has become a newsworthy achievement, but it seems implausible.

For people who are as confused as I was, there is also a lesser known "i3" which is a form of window manger. I presume sway is compatible with the i3 window manager (in addition to Intel i3).


The Thunderclap vulnerabilities

Posted Mar 11, 2019 19:50 UTC (Mon) by rweikusat2 (subscriber, #117920)
In reply to: The Thunderclap vulnerabilities by nix
Parent article: The Thunderclap vulnerabilities

The point was supposed to be that "Linux" doesn't "put function pointers in the same page as network packets" in the way this statement suggests.

Linux has a general purpose kernel memory allocator. This is a power-of-2-freelist allocator sitting atop the page allocator (more precisely it's implemented as set of object caches for objects whose sizes are powers-of-two). As detailed in the paper, the e1000 driver allocates skbs via kmalloc. This means its network buffers will usually occupy some part of a page. An access control mechanism with page granularity thus cannot prevent malicious devices from accessing the remaining part of the page. As that's just one of the pages currently allocated to one of the kmalloc caches, any other part of the kernel which uses kmalloc could end up using this "remaining part of the page".

The gist of this is that a (page-based) IOMMU can only prevent malicious devices from accessing data they're aren't supposed to access if the devices drivers used for such devices do their own memory management based getting complete pages from the page allocator.


Malcolm: Usability improvements in GCC 9

Posted Mar 11, 2019 19:45 UTC (Mon) by xtifr (guest, #143)
In reply to: Malcolm: Usability improvements in GCC 9 by NYKevin
Parent article: Malcolm: Usability improvements in GCC 9

> Doesn't that argument also apply to C++, except that it's always the same ad hoc informally-specified bug-ridden slow implementation of half of Common Lisp?

It's a much *larger* ad-hoc informally specified bug-ridden slow implementation of half of Common Lisp. :) C++11, in particular, adds lambdas to the language, for extra bonus lispiness. :)

(I was actually about ready to give up on C++ until C++11, which returned to the list of languages I don't mind *too* terribly.)


Introducing Season of Docs

Posted Mar 11, 2019 18:13 UTC (Mon) by Zenith (guest, #24899)
Parent article: Introducing Season of Docs

That's great news for everyone. Hopefully it leads to better technical writers, better documentation, and more focus on documentation.
Kudos to Google for this!


Malcolm: Usability improvements in GCC 9

Posted Mar 11, 2019 18:08 UTC (Mon) by rweikusat2 (subscriber, #117920)
In reply to: Malcolm: Usability improvements in GCC 9 by tdz
Parent article: Malcolm: Usability improvements in GCC 9

> While C++'s STL much better than the data structures in C standards,

There are no "data structures" in C standards, there's just a convention for representing strings.


Malcolm: Usability improvements in GCC 9

Posted Mar 11, 2019 11:42 UTC (Mon) by tdz (subscriber, #58733)
In reply to: Malcolm: Usability improvements in GCC 9 by Cyberax
Parent article: Malcolm: Usability improvements in GCC 9

> There are STLs that work just fine without exceptions

There are, but C++ without exceptions is not what I call "sane use of."


Rosenzweig: The federation fallacy

Posted Mar 11, 2019 11:00 UTC (Mon) by Lennie (subscriber, #49641)
In reply to: Rosenzweig: The federation fallacy by zyga
Parent article: Rosenzweig: The federation fallacy

I wouldn't say that, we are seeing a lot of new development around IPFS, WebRTC, etc., I can see IPFS ending up as part of the infrastructure for the web.

We aren't at that point yet, but it's getting closer every month.

Now I do expect some kind of commercialization, which could mean: pay for IPFS storage.

Some are developing blockchain coin/IPFS storage solutions.

Or maybe I should say: an other chance to do it right or fail again.


apples and oranges

Posted Mar 11, 2019 10:49 UTC (Mon) by Lennie (subscriber, #49641)
In reply to: apples and oranges by callegar
Parent article: Rosenzweig: The federation fallacy

I think this is why you need a 3rd party encrypted backup solution to go with the service you buy.


apples and oranges

Posted Mar 11, 2019 10:36 UTC (Mon) by Lennie (subscriber, #49641)
In reply to: apples and oranges by Garak
Parent article: Rosenzweig: The federation fallacy

I think their is a huge difference between:

mom-and-pop hosting provider in the same city or regional large city of which you know where the datacenter is compared to storing your stuff with Microsoft or Google.

One thing that makes life a lot easier in that case is: same jurisdiction.


television 3.0

Posted Mar 11, 2019 10:24 UTC (Mon) by farnz (subscriber, #17727)
In reply to: television 3.0 by Garak
Parent article: Rosenzweig: The federation fallacy

In large part, though, that's because the US hasn't built home Internet infrastructure; they have repurposed infrastructure designed for television (cable, DSL) for home Internet service, instead of putting in dedicated networking facilities.

This makes offering service very cheap - most of the civils have been done already in order to provide subscription TV (cable) or telephone networks (DSL - which was designed to let telcos compete with cable networks by offering TV), but also means that the compromises that make sense for TV (limited bandwidth from home to central office, much wider bandwidth from central office to home, more control of signal at central office thus higher modulation rates possible getting more bits/symbol) have to be accepted in terms of Internet access.

Fixing that requires fresh civils that replace the existing last mile networks with either dedicated copper or fibre (probably fibre nowadays, as it's cheaper in the volumes that a new network would need, and has far higher bandwidth in each direction than expensive copper - expensive copper can be good to around 5 GHz at best, but has attenuation on the order of 60 dB/km, while single mode fibre is good for around 100 THz - 100,000 GHz - with attenuation on the order of 1 dB/km).

This, in turn, requires either political willpower to spend tax money on disruptive infrastructure projects, or commercial incentives to do so rather than just providing Internet access on existing (paid-for) infrastructure. It's worth noting that in many former Soviet countries, where TV and telephone infrastructure did not exist, they're doing just that; putting in cheap fibre and running symmetric Internet services on it, because it's cheaper to do that than put in US-style TV and telephone infrastructure.

Similarly, parts of Scandinavia, Singapore, and South Korea are putting in fibre for Internet service because the political willpower is there to say "we want good Internet service, and we'll pay the price to get there, bypassing Internet over legacy installs.

Finally, in countries like the UK, there's a different route being tried to make it work commercially; we're doing fibre-to-the-cabinet (in the form of HFC cable and VDSL2 from telephone cabinets), which effectively moves the central offices closer to people's homes, and reduces the cost of replacing the old TV/telephone network with a pure fibre data-first network by making money from moving the switch to Internet services closer to people's homes. It's a lot cheaper to replace the ~300m of cable from my house to the nearest cabinet than it is to replace the ~5km of cable from my house to the central office.


Malcolm: Usability improvements in GCC 9

Posted Mar 11, 2019 9:11 UTC (Mon) by Cyberax (✭ supporter ✭, #52523)
In reply to: Malcolm: Usability improvements in GCC 9 by tdz
Parent article: Malcolm: Usability improvements in GCC 9

There are STLs that work just fine without exceptions, you actually don't need them for most of the library if you just ignore the epic failure that are the iostreams.

Also, SJLJ exceptions are actually quite reasonable even for small environments (something a bit larger than 16 bit Arduino).

And then there's this nice proposal: http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2018/p... - it won't make into the coming revision of the standard, but it's on the table for the next one.


Malcolm: Usability improvements in GCC 9

Posted Mar 11, 2019 8:30 UTC (Mon) by tdz (subscriber, #58733)
In reply to: Malcolm: Usability improvements in GCC 9 by Cyberax
Parent article: Malcolm: Usability improvements in GCC 9

True. But move semantics are in some way a workaround for the excessive-copying problem of these earlier versions. And (sane use of) STL also requires C++ exceptions, which are often not available in resource-limited environments.


Malcolm: Usability improvements in GCC 9

Posted Mar 11, 2019 8:19 UTC (Mon) by Cyberax (✭ supporter ✭, #52523)
In reply to: Malcolm: Usability improvements in GCC 9 by tdz
Parent article: Malcolm: Usability improvements in GCC 9

> While C++'s STL much better than the data structures in C standards, it can lead to excessive object copying.
This might have been true in C++03 (although even there NRVO and RVO optimized away a lot of copies) but C++11 and more recent versions have much more robust move semantics.


Malcolm: Usability improvements in GCC 9

Posted Mar 11, 2019 8:15 UTC (Mon) by tdz (subscriber, #58733)
In reply to: Malcolm: Usability improvements in GCC 9 by dvdeug
Parent article: Malcolm: Usability improvements in GCC 9

While C++'s STL much better than the data structures in C standards, it can lead to excessive object copying. I think C's strong domain is where overhead really matters, so STL might not be appropriate in these environments.

OTOH, I'd wish the ISO C committee would simply standardize the stuff in <sys/queue.h>. This should do the job in nearly all cases. POSIX provides insque() and remque(), which are so laughable that one wonders why they bothered standardizing it at all.


Malcolm: Usability improvements in GCC 9

Posted Mar 11, 2019 5:10 UTC (Mon) by dvdeug (guest, #10998)
In reply to: Malcolm: Usability improvements in GCC 9 by NYKevin
Parent article: Malcolm: Usability improvements in GCC 9

I won't say that C++ is a panacea; I prefer Scala, personally. But the C++ standard library is not ad hoc or informally-specified; it's an international standard just like Common Lisp. I'd be surprised if the G++ and Microsoft C++ libraries didn't compare quite well to the major Common Lisp systems on speed and bugginess. There probably are features of Common Lisp that C++ users are forced to reimplement, but it's at least better than C on that front.


Malcolm: Usability improvements in GCC 9

Posted Mar 11, 2019 4:29 UTC (Mon) by NYKevin (subscriber, #129325)
In reply to: Malcolm: Usability improvements in GCC 9 by dvdeug
Parent article: Malcolm: Usability improvements in GCC 9

Doesn't that argument also apply to C++, except that it's always the same ad hoc informally-specified bug-ridden slow implementation of half of Common Lisp?


The Thunderclap vulnerabilities

Posted Mar 11, 2019 0:17 UTC (Mon) by mtaht (subscriber, #11087)
In reply to: The Thunderclap vulnerabilities by nix
Parent article: The Thunderclap vulnerabilities

Millcomputing's PLB is the only way out. ( http://millcomputing.com/wiki/Protection )

Too bad I don't have a spare billion $ to get it past plausible promise.


television 3.0

Posted Mar 11, 2019 0:08 UTC (Mon) by Garak (guest, #99377)
In reply to: up/down asymmetry engineering, terms of service, disincentives, supply and demand by mpr22
Parent article: Rosenzweig: The federation fallacy

true enough. Perhaps the more important point is that there are less well known dynamics of that engineering/tuning. I.e. if the cable modem provider is offering 25Mbps down and 3Mbps up it is not simply their choice to retune to 14 up and 14 down IIRC. And if home servers were protected by a network neutrality law/policy it wouldn't take such a 50/50 balance to accomplish many usual high bandwidth things. I.e. distributed(bittorrentesque) streaming/distribution is already widely succussfully used as an alternative to paying a CDN to help mitigate the source bandwidth bottleneck issue. While of course many bittorrent peers(cough simultaneous client and server behavior cough) are not home servers with access to greater outbound bandwidth, even if you had to have 10 or 1000 100kbps peers/cdn-amplifier-nodes/homelinuxservers, the method is clearly viable for the key example of an alternative fully decentralized video distribution network able to accomplish the same things as broadcast and cable television networks.


The Thunderclap vulnerabilities

Posted Mar 10, 2019 19:07 UTC (Sun) by marcH (subscriber, #57642)
In reply to: The Thunderclap vulnerabilities by mjg59
Parent article: The Thunderclap vulnerabilities

> How is it Intel's fault that Linux puts function pointers in the same page as network packets?

It's a brand new Remote Procedure Call technology; did you read the article? :-)

Remember: code is data and data is code https://lwn.net/Articles/778550/


The Thunderclap vulnerabilities

Posted Mar 10, 2019 17:35 UTC (Sun) by marcH (subscriber, #57642)
In reply to: The Thunderclap vulnerabilities by flussence
Parent article: The Thunderclap vulnerabilities

Probably the best technical blog about Type-C
https://plus.google.com/collection/0Vdov
moving to https://medium.com/@leung.benson


Rosenzweig: The federation fallacy

Posted Mar 10, 2019 15:23 UTC (Sun) by Wol (subscriber, #4433)
In reply to: Rosenzweig: The federation fallacy by k3ninho
Parent article: Rosenzweig: The federation fallacy

> paid reasonably for your time

Sounds like you've never served on a jury ...

Neither have I but everyone I've talked to has said it leaves you rather badly out-of-pocket, as you're paid a miserly daily allowance, plus expenses, which is usually worth far less than the (usually) unpaid leave you're forced to take.

Oh - and over here, getting out of jury service is doable but not easy. Unlike the American system where you just get yourself challenged and thrown off, here it's more like "who's the next twelve? In you go ..." and it's *HARD* for either defence or prosecution to get you thrown off - they need good grounds. If you're lucky, you get a trial that lasts a few days. If you're unlucky, it lasts a few months!

Cheers,
Wol


up/down asymmetry engineering, terms of service, disincentives, supply and demand

Posted Mar 10, 2019 14:34 UTC (Sun) by mpr22 (subscriber, #60784)
In reply to: up/down asymmetry engineering, terms of service, disincentives, supply and demand by Garak
Parent article: Rosenzweig: The federation fallacy

I have no particular interest in providing videos or video games with bulky audiovisual assets from my third-floor council flat, but I have plenty of interest in consuming those things, so even with a home server, I'd still have heavily asymmetric bandwidth needs.


Kernel release status

Posted Mar 10, 2019 14:01 UTC (Sun) by tao (subscriber, #17563)
In reply to: Kernel release status by kmweber
Parent article: Kernel release status

Maybe Tove, his wife, helped him count before, but injured her hands in some karate competition?


Security quotes of the week

Posted Mar 10, 2019 12:54 UTC (Sun) by nilsmeyer (guest, #122604)
In reply to: Security quotes of the week by moltonel
Parent article: Security quotes of the week

The use of Fahrenheit and other imperial units always annoys me as well, especially when looking up nutrition information or anything else scientific(ish). I just checked whether there is a Firefox plugin for that to just convert the units, this may be promising: https://addons.mozilla.org/en-US/firefox/addon/everything...


A container-confinement breakout

Posted Mar 10, 2019 9:38 UTC (Sun) by smadu2 (guest, #54943)
Parent article: A container-confinement breakout

Is rkt vulnerable ?


(federatable) web overlay commentary/etc

Posted Mar 10, 2019 7:19 UTC (Sun) by Garak (guest, #99377)
In reply to: Rosenzweig: The federation fallacy by areilly
Parent article: Rosenzweig: The federation fallacy

Are you pointing out that you can't just comment on or modify or add-to most other people's web sites (duh),
Actually that sounds a lot like something I recall g+ having deployed a few years back. The ability to +1 arbitrary pages, maybe comment as well. Of course the non-evil way to go about accomplishing that would be to utilize a federated network of such overlay content stored locally or otherwise under the netizen's control. I.e. no need for a centralized (commercial) big player to have control over the data involved (and utilizing every means possible to extract as much profit from access to the data as well as dominating/influencing the implementation details)


up/down asymmetry engineering, terms of service, disincentives, supply and demand

Posted Mar 10, 2019 7:09 UTC (Sun) by Garak (guest, #99377)
In reply to: Rosenzweig: The federation fallacy by callegar
Parent article: Rosenzweig: The federation fallacy

I would guess the ISPs would claim they've engineered/tuned the infrastructure to best meet supply and demand. I would immediately follow that up however with the idea that the causality chain starts with the common home server prohibition ToS, leading to demand characteristics, that the ISP can then use to justify tuning their network as they do. But while I believe in the long run that asymmetry factor will decrease, I think there is so much that can be done even as things are now that it's just ridiculous(ly sad how the profiteers get away with rigging the system in that way)


Malcolm: Usability improvements in GCC 9

Posted Mar 10, 2019 5:02 UTC (Sun) by dvdeug (guest, #10998)
In reply to: Malcolm: Usability improvements in GCC 9 by rweikusat2
Parent article: Malcolm: Usability improvements in GCC 9

"Greenspun’s Tenth Rule: Any sufficiently complicated C or Fortran program contains an ad hoc informally-specified bug-ridden slow implementation of half of Common Lisp." At the very least, give me a decent set of containers and string library in any language I have to use.


Why CLAs aren't good for open source (Opensource.com)

Posted Mar 9, 2019 14:52 UTC (Sat) by azumanga (subscriber, #90158)
In reply to: Why CLAs aren't good for open source (Opensource.com) by mpr22
Parent article: Why CLAs aren't good for open source (Opensource.com)

Their estates are usually children, or their now elderly spouses. First I would have to track them down, then try to explain what I wanted. Just finding them is likely to be a major undertaking, and not something I really want to do.


Some challenges for GNOME online accounts

Posted Mar 9, 2019 11:54 UTC (Sat) by zarrro (guest, #54749)
In reply to: Some challenges for GNOME online accounts by nim-nim
Parent article: Some challenges for GNOME online accounts

I actually use my Own cloud via GOA on my Fedora machine, and it works quite well.
I find the Gnome approach of mounting OC, instead of syncing a local directory, works much better for my usage.


Why CLAs aren't good for open source (Opensource.com)

Posted Mar 9, 2019 11:07 UTC (Sat) by mpr22 (subscriber, #60784)
In reply to: Why CLAs aren't good for open source (Opensource.com) by azumanga
Parent article: Why CLAs aren't good for open source (Opensource.com)

I wouldn't be too surprised if their estates are more willing to relicence from GPLv2 to GPLv2+ or GPLv3+ than they would have been in life.


Why CLAs aren't good for open source (Opensource.com)

Posted Mar 9, 2019 10:52 UTC (Sat) by azumanga (subscriber, #90158)
In reply to: Why CLAs aren't good for open source (Opensource.com) by Conan_Kudo
Parent article: Why CLAs aren't good for open source (Opensource.com)

The problem with older projects is some of the most significant coders might be dead. When you have a gpl v2 project that can't link against gpl v3 code, this can create serious problems.


5.1 Merge window part 1

Posted Mar 9, 2019 10:28 UTC (Sat) by hrw (subscriber, #44826)
Parent article: 5.1 Merge window part 1

https://fedora.juszkiewicz.com.pl/syscalls.html got updated to use latest syscall data.

Firoz Khan did great job with moving system calls lists from header files into plain text. Looks like all architectures got recent syscall updates at same time.


The Thunderclap vulnerabilities

Posted Mar 9, 2019 8:39 UTC (Sat) by nivedita76 (subscriber, #121790)
In reply to: The Thunderclap vulnerabilities by halla
Parent article: The Thunderclap vulnerabilities

Really? You wouldn’t find it highly surprising that what looks like a wall wart is reading out your laptop’s memory?


The Thunderclap vulnerabilities

Posted Mar 9, 2019 1:34 UTC (Sat) by nix (subscriber, #2304)
In reply to: The Thunderclap vulnerabilities by rweikusat2
Parent article: The Thunderclap vulnerabilities

In Intel's defence, "I allocated 2K of memory rather than a full page" is not exactly an *obvious* equivalent to "now externally-connected peripherals can spy on kernel data structures". Developers do generally assume kernel memory is only readable by the kernel, and that the PCIe bus is trusted -- both of which are, it is true, questionable assumptions, but it's damn hard to write useful code at that level without making at least one of them. (And the e1000e driver is much older than Spectre and other similar families of oh-just-blow-away-access-protection attacks.)


Making WiFi fast

Posted Mar 9, 2019 1:29 UTC (Sat) by gdt (subscriber, #6284)
In reply to: Making WiFi fast by eduard.munteanu
Parent article: Making WiFi fast

A reminder that wired connections also have downsides, mostly its inconvenience and cost.

A good RJ-45 jack is rated for 2,500 cycles. So wireless is a much better fit for high-traffic areas such as cafes and libraries. Patch leads are a small but ongoing expense, and staff and students don't like "BYO patch lead".

A wired port costs around $200 per wallport to cable. But this can blow out when a custom solution is required. Wiring a cafe table will cost more than than table.

Wireless networks work without any further action by the user. Once set up (which is far too hard) Eduroam connects your laptop or phone to the campus network the moment you go to use the device. No searching for a jack and patch lead. Wireless is so convenient that it's common to see a person sitting next to a wall port but using wireless.

Wired from modern devices is difficult. Using wired ethernet from a phone or tablet requires special cabling (a OTG cable) to the ethernet dongle. The dongle itself is a optional purchase. Cheaper dongles meant for laptops might not have driver support in a phone. Using wired ethernet from a recent laptop requires a USB-C/ethernet dongle, which means the laptop can't be powered whilst using the wired network. To have both power and wired networking requires a bulky and expensive "docking station".

We should be telling people who need network performance to use wired. But that may not end up being the bulk of the connections on a campus network.


A kernel unit-testing framework

Posted Mar 9, 2019 1:14 UTC (Sat) by nix (subscriber, #2304)
In reply to: A kernel unit-testing framework by roc
Parent article: A kernel unit-testing framework

Spending double the development effort to have reasonable (not perfect) automated tests isn't outrageous. It's in the right ballpark for projects I've worked on like Firefox and rr. Under the right conditions that spend pays for itself pretty easily.
In glibc, which is very much following the 'everything should have tests dammit' policy (and long has), the tradeoff is sometimes much higher: it can easily take five times longer to write a decent test for some bugfixes than to fix the bug, even (sometimes especially!) when the bug is a real monster to find.

Linux would probably have terrible threading despite NPTL if Uli hadn't written a massive heap of tests for NPTL at the same time to make sure that the damn thing actually worked and did not regress. More than one bug I've looked at in the past which came down to one missed assembler instruction that triggered problems only in ludicrously obscure slowpath cases was tickled by one or more of those tests...


censorship

Posted Mar 9, 2019 1:07 UTC (Sat) by Cyberax (✭ supporter ✭, #52523)
In reply to: censorship by flussence
Parent article: Rosenzweig: The federation fallacy

??
What does reCaptcha has to do with right-wing whiners?


Have your cake and eat it too

Posted Mar 9, 2019 1:07 UTC (Sat) by ewen (subscriber, #4772)
Parent article: Revisiting PEP 394

Other than the 10 year old issue of creating a Python 3 that could not run a lot of Python 2 code (thus complicating "just upgrade" with lots of network effects), it seems to me that the remainder of this PEP 394 issue is a result of conflating two issues:

* What /usr/bin/python invokes (which is commonly in older #! lines); and

* What gets run when a user types "python" at the command line

For backwards compatibility, "#! /usr/bin/python" pretty much has to invoke a Python 2 compatible interpreter, or fail very obviously ("interpreter not found") for the foreseeable future (5+ years, maybe 10). Because (a) all the older not updated programs have "#! /usr/bin/python" in them, and (b) all the newer, updated, programs have "#! /usr/bin/python3" in them. So by definition anything invoking /usr/bin/python explicitly as its interpreter has not been updated for Some Time (tm).

But the discussion on this thread, and the discussion about PEP 394 updates in general, suggest that a lot of people would understandably like it if the user typing "python" at their command line invoked a recent version of Python, eg, Python 3.6 or Python 3.7 (or even Python 3.8 soon). At this point I'd like that too.

There is solution that achieves both of these problems:

1. /usr/bin/python points at /usr/bin/python2 if it is installed and is missing otherwise; *and*

2. There is a "python" program in *another directory on the default PATH* which points at /usr/bin/python3.

So running /usr/bin/python gets Python 2, and running "python" gets a modern Python 3+.

All this needs is another directory on the PATH earlier (even /usr/local/bin), and a "python" link in there which points at /usr/bin/python3. So, eg:

ln -s /usr/bin/python3 /usr/local/bin/python

installed as part of a "modern-python" type package would be sufficient to flip over what happens when you run "python".

There's a remaining surprise that "python" and "/usr/bin/python" are different, but it seems to me that's the *least* surprise possible in this situation, created over 10 years ago, of releasing a very incompatible successor to Python 2, ie Python 3. For better or worse, that degree of incompatibility permanently forked the language into Python 2 and Python 3; it's just that finally, 10 years later, the Python 3 fork is winning out.

Ewen


A kernel unit-testing framework

Posted Mar 9, 2019 1:03 UTC (Sat) by nix (subscriber, #2304)
In reply to: A kernel unit-testing framework by dw
Parent article: A kernel unit-testing framework

All this says is that women write tests without being forced to. (In my experience, this is true -- but that's probably because in order to survive against all the headwinds as a female free software developer you need to be really, really good, and writing good tests is strongly correlated with that. Writing good tests is *hard*.)


The Thunderclap vulnerabilities

Posted Mar 8, 2019 23:33 UTC (Fri) by flussence (guest, #85566)
In reply to: The Thunderclap vulnerabilities by dirkhh
Parent article: The Thunderclap vulnerabilities

Basic USB2 is limited to 5V@500mA - 2.5W. There's fast charging “standards” that go up to 900mA or more and most of them use passive components to signal it.

USB-C power negotiation however… makes the Linux x86 early-boot code sound simple and reasonable in comparison. Cables have their own CPUs, voltages aren't fixed, the hardware has to be prepared to put up to 100 watts into a tiny, fully bidirectional connector (and it's already infamous for doing it in the wrong direction too often - your phone will probably make a futile attempt to charge your laptop at some point). The technology's a disaster at every level.


A kernel unit-testing framework

Posted Mar 8, 2019 23:25 UTC (Fri) by dezgeg (subscriber, #92243)
In reply to: A kernel unit-testing framework by flussence
Parent article: A kernel unit-testing framework

Filesystem testing is pretty comprehensively done in xfstests. E.g. btrfs does have some sort of RAID regression tests: https://github.com/kdave/xfstests/blob/6ab53c6c6825c16d8a...


censorship

Posted Mar 8, 2019 22:31 UTC (Fri) by flussence (guest, #85566)
In reply to: censorship by Cyberax
Parent article: Rosenzweig: The federation fallacy

Nice godwin. I'll be sure to remind you of it if I ever see you complaining that Recaptcha has unpersoned you from the bulk of the internet for not generating enough capital via free labour.


A kernel unit-testing framework

Posted Mar 8, 2019 22:17 UTC (Fri) by flussence (guest, #85566)
In reply to: A kernel unit-testing framework by shemminger
Parent article: A kernel unit-testing framework

There are plenty of virtual device drivers out there that could use the testing. They could serve as useful starting points for real hardware.

Filesystems don't need specific hardware either. Wouldn't it be nice if Btrfs had RAID5/6 regression tests?


The Thunderclap vulnerabilities

Posted Mar 8, 2019 21:58 UTC (Fri) by cpitrat (subscriber, #116459)
In reply to: The Thunderclap vulnerabilities by halla
Parent article: The Thunderclap vulnerabilities

It will be highly surprising for the average user I guess.


Malcolm: Usability improvements in GCC 9

Posted Mar 8, 2019 21:24 UTC (Fri) by HelloWorld (guest, #56129)
In reply to: Malcolm: Usability improvements in GCC 9 by rweikusat2
Parent article: Malcolm: Usability improvements in GCC 9

If C is the solution, then I'd like my problem back.


Revisiting PEP 394

Posted Mar 8, 2019 19:51 UTC (Fri) by mirabilos (subscriber, #84359)
In reply to: Revisiting PEP 394 by Cyberax
Parent article: Revisiting PEP 394

While I admit I didn’t have *more* encoding problems with py3k than with Python, they were _much_ easier to fix in Python, while py3k tried too hard to do the thing it thought was right.

Some of the recent fixes will help, though.


magic words

Posted Mar 8, 2019 19:28 UTC (Fri) by Garak (guest, #99377)
In reply to: our conversation ends at the point of implied threats to my Free Speech by Cyberax
Parent article: Rosenzweig: The federation fallacy

please cease and desist


5.1 Merge window part 1

Posted Mar 8, 2019 19:24 UTC (Fri) by johill (subscriber, #25196)
Parent article: 5.1 Merge window part 1

For the record, you wrote:

  • The mac80211 layer now has support for multiple BSSIDs (MAC addresses, essentially) for wireless devices.

This is rather misleading. Depending on how you look at it and what exactly you're thinking of, this either makes no sense or has been supported all along (depending on driver support).

Rather, what we did add was support for the "multi-BSSID" part of the spec, and there only scanning for and connecting to them. It's been defined for a while but is now seeing uptake in the upcoming HE specification (802.11ax). What "multi-BSSID" does isn't add support for multiple BSSIDs, but rather it adds support for an AP to have multiple BSSIDs without sending multiple beacons. Until now, if an AP wanted to advertise multiple networks, it would use multiple BSSIDs but then would have to send a beacon for each one. The "multi-BSSID" extension allows it to send a single beacon which inside the data advertises that in fact the AP has a few more BSSIDs, along with their SSID (network name) and other capabilities. This optimises air time usage because sending a lot of very similar beacons is a waste thereof.

But in a sense even that is only half the story because so far we only added support for the client-side, i.e. a mac80211-based driver connecting to such an AP. The driver also still has to support it separately due to changes in the TIM Element used for powersave; changes to iwlwifi will be coming to do so, though those are mostly in firmware with a little driver pass-through support.

What's still missing, unfortunately, is the AP-side support for this, which requires having multiple AP interfaces (netdevs) but linking them together in a suitable way that not each one will beacon. How we do that is TBD, perhaps we'll hash out a solution at netdev 0x13 in ~2 weeks.


our conversation ends at the point of implied threats to my Free Speech

Posted Mar 8, 2019 19:03 UTC (Fri) by Cyberax (✭ supporter ✭, #52523)
In reply to: our conversation ends at the point of implied threats to my Free Speech by Garak
Parent article: Rosenzweig: The federation fallacy

> I do remeber your words. I'm wise enough to know when to end a conversation permanently. Please refrain from replying directly to any comments of mine in the future, I will make the same effort.
Sounds especially ironic from a free-speech advocate.


The Thunderclap vulnerabilities

Posted Mar 8, 2019 18:53 UTC (Fri) by JFlorian (guest, #49650)
Parent article: The Thunderclap vulnerabilities

Seems like a good time to mention usbguard [https://usbguard.github.io/]. Obviously this is only one attack surface but it helps.


Unneeded applications

Posted Mar 8, 2019 18:38 UTC (Fri) by andyc (subscriber, #1130)
In reply to: Unneeded applications by zdzichu
Parent article: Some challenges for GNOME online accounts

> – Maps
> – Weather

> They are kind of apps that you run once, say "ok pretty", but never run for the
> second time.

I do use Weather occasionally., however I quite often fire up Maps to just lookup some place.

> GNOME Clocks is borderline usable

I do find this very useful (and have used similar tools in the past) and have a number of timezones set up in it.

Of course there are reasons why I'd rather use the apps than some website.


Malcolm: Usability improvements in GCC 9

Posted Mar 8, 2019 18:02 UTC (Fri) by sorokin (guest, #88478)
Parent article: Malcolm: Usability improvements in GCC 9

Fantastic work! I'm really looking forward to the release of GCC 9 to try these new improved diagnostics.

I wonder how well Qt Creator would parse this new output of GCC. It didn't do it well previously, especially for long messages about templates. Perhaps on the new format it will break even more. :-( On the other hand in future perhaps Qt Creator can use this cool new json-based machine-readable format.


Revisiting PEP 394

Posted Mar 8, 2019 17:52 UTC (Fri) by Cyberax (✭ supporter ✭, #52523)
In reply to: Revisiting PEP 394 by moltonel
Parent article: Revisiting PEP 394

I never had an encoding problem with Py2. And yes, I’ve been using it for non-ASCII languages. The key is to stroke all strings in UTF-8 and suddenly all encoding issues disappear.


our conversation ends at the point of implied threats to my Free Speech

Posted Mar 8, 2019 17:52 UTC (Fri) by Garak (guest, #99377)
In reply to: network neutrality is related to the issues in this discussion by Wol
Parent article: Rosenzweig: The federation fallacy

[Wol]: I've had my differences with Cyberax, but I see *you* as closer to a troll than him

[Also Wol elsewhere]: And, quite frankly, it seems to me all too often that "freedom of speech" is equivalent to "forcing your views down my throat".
I do remeber your words. I'm wise enough to know when to end a conversation permanently. Please refrain from replying directly to any comments of mine in the future, I will make the same effort.

A wise troll once said "The line between trollness and non-trollness is not a line drawn on a map or in the sand between people. It is a line drawn down the heart of each and every one of us."


Malcolm: Usability improvements in GCC 9

Posted Mar 8, 2019 17:49 UTC (Fri) by rweikusat2 (subscriber, #117920)
Parent article: Malcolm: Usability improvements in GCC 9

This is really all about C++ but improving C++ usability is much easier: Just use C instead. :->


network neutrality is related to the issues in this discussion

Posted Mar 8, 2019 15:25 UTC (Fri) by Wol (subscriber, #4433)
In reply to: network neutrality is related to the issues in this discussion by Garak
Parent article: Rosenzweig: The federation fallacy

> Cyberax is a troll or a bot or something and perhaps ought to know better. The two of us have gone over the issue in as much depth in multiple prior LWN comment threads. The FCC angle was something I added to the article's discussion comment thread.

I'd be careful there ... I've had my differences with Cyberax, but I see *you* as closer to a troll than him...

Remember my "cheap, fast, good" comment? Free speech is no use when you're dying from an easily-cured illness because you're too poor to afford the treatment. Value systems differ, and yours seems badly out-of-kilter with mine, and probably Cyberax's. Free Speech is worthless, if you lack the resources to make yourself heard.

Cheers,
Wol


Just to add to the discussion...

Posted Mar 8, 2019 13:17 UTC (Fri) by anselm (subscriber, #2796)
In reply to: Just to add to the discussion... by hummassa
Parent article: Security quotes of the week

They are both just criminal mismanagement of other people's financial assets. They are both equally unrecoverable.

The first case will be of interest to law enforcement because embezzlement is a crime. Since most criminals are stupid and/or careless there's at least an outside chance of eventually nabbing the guy and/or getting (part of) the embezzled assets back. Certainly having “Wanted” posters with one's name and face on it all over the place isn't great for one's quality of life.

In the second case, law enforcement will say “meh” because the guy didn't break any law by not telling anyone his passwords before dying. One could try bringing a civil suit against the company for compensation but if the company's money is locked up in the frozen wallet there's probably not a lot of compensation to be had.


Security quotes of the week

Posted Mar 8, 2019 12:55 UTC (Fri) by anselm (subscriber, #2796)
In reply to: Security quotes of the week by hummassa
Parent article: Security quotes of the week

It's no more "something of value" than the "I trust my country's government will not go bankrupt and default on the its bonds plus interest rates" thing that make most (all?) fiat currencies...

I can use my country's currency to pay taxes, buy anything from groceries to real estate, or buy the currency of other countries. If I obey the relevant regulations there is no problem with me using Euros to buy millions of US dollars (if I had the money, anyway).

OTOH, there isn't a lot of stuff one can buy with Bitcoin (let alone pay taxes) and the sort of stuff that one can buy is typically either illegal to buy otherwise, or another cryptocurrency. Remember that even at blockchain conferences, they sell Bitcoin t-shirts only for dollars, not Bitcoin. (Also, try buying a million actual US dollars with Bitcoin and see how that works out for you.) This means that as far as Bitcoin has “value” at all, it has value mostly to people who want to buy illegal stuff, and cryptocurrency speculators. As has been explained elsewhere, it is completely useless as an everyday-type “currency” for buying groceries or bus tickets.

It is difficult to figure out what people see in Bitcoin to make them spend lots of actual money “mining” the stuff, but any value proposition there depends strictly on being able to find suckers who are willing to pay more for Bitcoins than the electricity to mine them, depreciation on the mining hardware, rent, etc. costs. And certainly according to the theory, if you have Bitcoins today you would be silly to spend them because if this thing – against all odds – does work out in the end, being deflationary by design, your Bitcoins will be “worth” more next week and even more next year. If it doesn't, you can only hope to unload them on some other sucker, hopefully for not a lot less than what you paid for them yourself.


Revisiting PEP 394

Posted Mar 8, 2019 12:51 UTC (Fri) by moltonel (subscriber, #45207)
In reply to: Revisiting PEP 394 by Cyberax
Parent article: Revisiting PEP 394

> I've started a couple of 100k line projects in Py2 during the last 3 years. Mwaahahaha! I hope to do more of that, Py2 must live forever!

Cobol is alive too, so python2 should be safe. I guess now's as good a time as any to set up your job security :p


Revisiting PEP 394

Posted Mar 8, 2019 12:39 UTC (Fri) by moltonel (subscriber, #45207)
In reply to: Revisiting PEP 394 by Cyberax
Parent article: Revisiting PEP 394

> The thing is, Py2->3 porting does not give you any advantages. Py3 code is not safer or more concise, it doesn't provide you any new powerful abstractions. And for a long time it had been quite often slower than Py2 (it's _mostly_ fixed now).

I guess your python2 code never had an issue with text encoding ? Perhaps you were very careful to do all the correct calls where needed, or perhaps you were lucky with your input data. It's much harder to get things wrong with python3. To me that was py3's biggest selling point, but other people will have different favorite features (including some making code more concise or performant).

Also, it's unfair to complain that removal of deprecated stuff doesn't yield improvements on day 1. It takes time to take advantage of the cleaned up code. For example removing support for classic classes doesn't bring anything by itself, but it opens the door to improvements down the road.


Security quotes of the week

Posted Mar 8, 2019 12:01 UTC (Fri) by moltonel (subscriber, #45207)
In reply to: Security quotes of the week by bustervill
Parent article: Security quotes of the week

He doesn't define "stay safe online" either; what's the threat model ? A VPN doesn't/shoudn't alter, block, or even scan the content that it transfers to you, so you're as exposed to the malware as you were before. You are protected from vulnerability scans on your IP address, but that's a small fraction of the online threat. IMHO a VPN is more about privacy than safety, whether you you use that privacy for legal or illegal activities.

Also, the dichotomy between "us-based" and "offshore" is tiring, for the vast majority of internet users who don't live in the US. I know Slate targets an american audience, but the US isn't the only country capable of producing large reputable companies with clear ownership. And the US doesn't top my list of privacy-protecting countries. I'm tired of things like us-based information sources using farenheit and miles despite the fact most of their audience is outside the US and using SI units.


Kernel release status

Posted Mar 8, 2019 11:42 UTC (Fri) by kmweber (guest, #114635)
Parent article: Kernel release status

Given that 2.6 went up to 2.6.39, I'd like to give Linus my condolences for the unfortunate accidents he must have suffered since then ;)


Source-code access for the long haul

Posted Mar 8, 2019 11:39 UTC (Fri) by zvr (guest, #117105)
In reply to: Source-code access for the long haul by dirkhh
Parent article: Source-code access for the long haul

It will be de-duped, so every file/tree that is already existing in the Software Heritage archive will not be stored again in their infrastructure.
There will be no pointer to upstream locations; internally there will be pointers to already existing objects/blobs/whatever-you-want-to-call-them.
Your custom patches and configuration files, assuming they are unique, will be stored as new.
Finally, you will be getting back an identifier that represents (and can be used to retrieve) your package.


censorship

Posted Mar 8, 2019 8:57 UTC (Fri) by Cyberax (✭ supporter ✭, #52523)
In reply to: censorship by jschrod
Parent article: Rosenzweig: The federation fallacy

> I.e., this is about not running servers *in a cloud owned and operated by someone else for their profit*.
Maybe not this branch of the thread, but its peer is about home servers explicitly.

> I'm from Germany, I live in Germany, and I have probably more experience fighting against with "Nazi propaganda" than you, being politically active here since 4 decades. Equating "Nazi propaganda" to "moaning about free speech" (your words!) is a disservice to the quest for an open and inclusive society.
In the US right now the "free speech advocates" almost invariably turn out to be Nazis/racists or crazies.

> I.e., you cannot see the value of own-controlled communication services in a repressive society when one is on the opposition side.
Nope. I saw that the value of self-controlled communication services is pretty much zero. GMail or Facebook turned out to be more helpful.

And if you want to compete about who lived through more civil disturbance then you'll probably lose.


GMP and assert()

Posted Mar 8, 2019 8:51 UTC (Fri) by gracinet (guest, #89400)
In reply to: GMP and assert() by mathstuf
Parent article: GMP and assert()

My thoughts exactly.

To be complete, that leaves the case where one does not care about the result (type T in your example), and simply ignores it.

Of course the Rust compiler has a warning for that.


Security quotes of the week

Posted Mar 8, 2019 8:44 UTC (Fri) by domenpk (guest, #12382)
Parent article: Security quotes of the week

Paying for a product does not magically make it good.
Companies normally want to maximise the profit, and if one source is the same as with 'free VPNs', they will definitely look into it.


filtered/richlycontextualized perception

Posted Mar 8, 2019 4:06 UTC (Fri) by Garak (guest, #99377)
In reply to: network neutrality is related to the issues in this discussion by Cyberax
Parent article: Rosenzweig: The federation fallacy

[me]> Cyberax is a troll or a bot or something and perhaps ought to know better.
[Cyberax]- I'm an FCC bot and I approve this message.
On the subject of
one of my longer term dreams is to see a better federated client/browser for these creativecommons lwn comments that facilitates tagging, tracking, and minimizing troll impact in the reading of these lwn discussions. Using a federated reputation system solving basically the same fundamental issue as brought up by spam-fighting in the federated email universe.
A quick hack that comes to mind would be adding a link to every comment which goes to a page of links to prior comments of that commenter responding to the same individual. Or a generated list of search results based on a search of the commenter's past comments using the current comment as the search terms. Not quite a federated next generation slashdot frenemy reputation filtering, but perhaps facilitating easier gleaming of long term conversational insights.


How to democratize email?

Posted Mar 8, 2019 2:56 UTC (Fri) by neilbrown (subscriber, #359)
In reply to: How to democratize email? by Cyberax
Parent article: Rosenzweig: The federation fallacy

"Clearly" we need lwn to publish a Grumpy Editors guide to home email solutions.


network neutrality is related to the issues in this discussion

Posted Mar 8, 2019 2:52 UTC (Fri) by Cyberax (✭ supporter ✭, #52523)
In reply to: network neutrality is related to the issues in this discussion by Garak
Parent article: Rosenzweig: The federation fallacy

> Cyberax is a troll or a bot or something and perhaps ought to know better.
- I'm an FCC bot and I approve this message.


network neutrality is related to the issues in this discussion

Posted Mar 8, 2019 2:45 UTC (Fri) by Garak (guest, #99377)
In reply to: censorship by Cyberax
Parent article: Rosenzweig: The federation fallacy

> This is not about running services *at home* but about running services *under one's control*.
> Don't move the goal posts.
I'm not moving ANYTHING. The whole thread is "running services AT HOME". With the impediment being an FCC rule somewhere.

Don't move your excuses.
Cyberax is a troll or a bot or something and perhaps ought to know better. The two of us have gone over the issue in as much depth in multiple prior LWN comment threads. The FCC angle was something I added to the article's discussion comment thread. Cyberax steadfastly holds the position that my angle does not represent good thinking on the subject. I have come to the conclusion that Cyberax is a troll or has some personal stake that isn't clear to me yet explaining their opposition to my FCC issue.

While I mocked the mocking/hyberbolic reference to unrealistic dreams in the beginning of the article in another comment, it happens to be true that one of my longer term dreams is to see a better federated client/browser for these creativecommons lwn comments that facilitates tagging, tracking, and minimizing troll impact in the reading of these lwn discussions. Using a federated reputation system solving basically the same fundamental issue as brought up by spam-fighting in the federated email universe. We should have the freedom to architect our own 'echo chambers' :) (one of the first domains I registered was 'filteredperception.org'. Empowering people to more efficiently filter their own perception of the internet is worth doing I think)

You might just try ignoring Cyberax until then, or perhaps theorize the account holder has deployed an annoying chatbot. Whatever works...


censorship

Posted Mar 8, 2019 2:35 UTC (Fri) by jschrod (subscriber, #1646)
In reply to: censorship by Cyberax
Parent article: Rosenzweig: The federation fallacy

> > This is not about running services *at home* but about running services *under one's control*.
> > Don't move the goal posts.
> I'm not moving ANYTHING. The whole thread is "running services AT HOME".

This thread started with

> A server in the hand is better than a flock of them in a cloud owned and operated by someone else for their profit instead of yours.

I.e., this is about not running servers *in a cloud owned and operated by someone else for their profit*.

I read *in the hand* as *under one's control*, as cited above. Physical location in one's house (a.k.a "at home") doesn't matter. In fact, you're right that running a server at home is usually not desirable in repressive situations.

> Don't move your excuses.

I don't move my excuses. My reaction was to your comment where you wrote

> > fewer third parties that get veto power over your Free Speech.
> TLDR; version - it'll be slightly less convenient to spew neo-Nazi or far-right propaganda.
> When somebody starts moaning about the freedom of speech it's always that.

and equated "moaning about freedom of speech" with "spewing neo-Nazi propaganda". This bold equation was the one that I reacted to.

I'm from Germany, I live in Germany, and I have probably more experience fighting against with "Nazi propaganda" than you, being politically active here since 4 decades. Equating "Nazi propaganda" to "moaning about free speech" (your words!) is a disservice to the quest for an open and inclusive society.

> > Two days ago, I received the notice that the brother of one of my friends in Nicaragua was killed by government forces. Thanks a lot, but I see in real life what it means "to fix THAT problem" and I don't need your complacant comment about that -- and, btw, independently operated communication services help with the fight for fixing, even if you don't recognize that.
> No it's not. It's at best a distraction. At worst it's a diversion.

You changed context by deleting your snarky comment that this replied to. FTR:

> > And on a bigger note, if your government has no freedom of speech then work to fix THAT problem.

I.e., you cannot see the value of own-controlled communication services in a repressive society when one is on the opposition side.

Well, since that's the case: I retract my expressed opinion that you wrote a complacant comment. That is not a fitting term, and here's not the proper place to express what I think about this. It seems that we live in different worlds, and since that is the case, I'll stop participating in this thread.


error codes and asserts have different purposes.

Posted Mar 8, 2019 2:19 UTC (Fri) by john.carter (guest, #123615)
Parent article: GMP and assert()

Sigh. When will people learn.

You cannot make a library fool proof, fools are too ingenious.

You can only tell the fool that he has been foolish.

Returning error codes are for telling the caller that something they couldn't possibly know about, has occurred. eg. Some external process has deleted the file, so open cannot succeed, so return ENOENT.

Precondition asserts are for telling the caller that there is a bug in their program that can only be fixed by a new version of their program.

Of course any part of a process can kill a process, this is a fact of programming life.

Divide by zero, dereference null.... do you want the CPU to ignore those errors and just womble on doing stupider and stupider things.... sometimes working, sometimes doing rubbish, sometimes dying?

Attempting to detect and unwind every possible flavour of stupid on the part of the caller merely creates an untested and untestable spaghetti of error handling code.

I get infuriated by people who write such spaghetti... and then never even check the error code, and just cast it to void. Experience tells me whenever I see that pattern... I will find bugs.

Far far more opportunities for security flaws and leaks to hide in that stuff.

People get horribly confused between "something unexpected came in over the wire from an external system" vs "your program has a bug and will do wrong _every time_ until you get off your butt and fix it".

An assert should _only_ be used for second thing, and should _always_ die as there is no other sane and reliable way of recovering.


How to better federate and decentralize email?

Posted Mar 8, 2019 2:07 UTC (Fri) by Garak (guest, #99377)
In reply to: How to democratize email? by neilbrown
Parent article: Rosenzweig: The federation fallacy

We can go part-way without going to full centralization. Maybe there is a business opportunity to provide authenticated SMTP services. My MTA-in-a-box connects to the service that I pay a small sum for, [...] I pay about $20 a year for a domain name. I could easily pay a similar amount for trouble-free self-hosted email.
The $20/yr domain name registration factor seems trivial to get around (subdomain registrar, poor people can live with an extra domain, or utilizing alternate dns root servers. I think an important dynamic is that if home server prohibition ToS were cracked down on by the FCC, the lower barrier to operating dns servers, such as those alternates as well as the per-end-user registered subdomain authoritative servers. The price per end-user there should approach approximately zero with no trouble. Your authenticated SMTP servers are more or less common already- I pay <$5/month to a popular provider. However were the home server prohibition ToS forcefully repealed by the FCC, providing that service seems easy enough that it too should drop to practically nothing (maybe $0.05/mo). Likewise you'd want a similar network of service providers facilitating redundancy buffers/queueing as well offfsite online encrypted backup storage. Again, if everyone who wanted to could set up their own linux server at home and operate such a service, perhaps charging in cryptocurrency, or reciprocal service tokens/credits (perhaps in cryptocurrency form), then those services also should become available on the order of pennies per month.

Domain registration prices are a total scam intricately tied to the anti-home-server conspiracy.


censorship

Posted Mar 8, 2019 1:58 UTC (Fri) by Cyberax (✭ supporter ✭, #52523)
In reply to: censorship by jschrod
Parent article: Rosenzweig: The federation fallacy

> This is not about running services *at home* but about running services *under one's control*.
> Don't move the goal posts.
I'm not moving ANYTHING. The whole thread is "running services AT HOME". With the impediment being an FCC rule somewhere.

Don't move your excuses.

> Two days ago, I received the notice that the brother of one of my friends in Nicaragua was killed by government forces. Thanks a lot, but I see in real life what it means "to fix THAT problem" and I don't need your complacant comment about that -- and, btw, independently operated communication services help with the fight for fixing, even if you don't recognize that.
No it's not. It's at best a distraction. At worst it's a diversion.


censorship

Posted Mar 8, 2019 1:56 UTC (Fri) by jschrod (subscriber, #1646)
In reply to: censorship by Cyberax
Parent article: Rosenzweig: The federation fallacy

> > My friends in Nicaragua beg to differ. They live in a civil war and they would very much like to have the freedom of speech that you write about so derogatory.
> And how a box at home will help it?

This is not about running services *at home* but about running services *under one's control*.
Don't move the goal posts.

> And on a bigger note, if your government has no freedom of speech then work to fix THAT problem.

Two days ago, I received the notice that the brother of one of my friends in Nicaragua was killed by government forces. Thanks a lot, but I see in real life what it means "to fix THAT problem" and I don't need your complacant comment about that -- and, btw, independently operated communication services help with the fight for fixing, even if you don't recognize that.


Rosenzweig: The federation fallacy

Posted Mar 8, 2019 1:44 UTC (Fri) by jschrod (subscriber, #1646)
In reply to: Rosenzweig: The federation fallacy by zaitcev
Parent article: Rosenzweig: The federation fallacy

My theory: You have never run your own email server, or even one for a reasonably sized community. (I do so since several decades.)

> > Setting up a mail server often is time-consuming, ad hoc, and brittle; despite technical literacy and the hours I poured in, I continue to have problems with my e-mail delivery.
> Suddenly, the problem came into focus: Alyssa Rozenzweig is worthless at basic computing.

Proof: "an email server is basic computing".

qed.


How to democratize email?

Posted Mar 8, 2019 1:40 UTC (Fri) by Cyberax (✭ supporter ✭, #52523)
In reply to: How to democratize email? by neilbrown
Parent article: Rosenzweig: The federation fallacy

There's a company that does this: https://arstechnica.com/gadgets/2018/12/review-helm-perso...

It's not really getting any more popular.


censorship

Posted Mar 8, 2019 1:39 UTC (Fri) by Cyberax (✭ supporter ✭, #52523)
In reply to: censorship by jschrod
Parent article: Rosenzweig: The federation fallacy

> My friends in Nicaragua beg to differ. They live in a civil war and they would very much like to have the freedom of speech that you write about so derogatory.
And how a box at home will help it? It's even worse - your home box can easily be confiscated.

Sidenote, in Russia cloud services advertised that they are police-proof. It's very typical for corrupt local government to confiscate physical servers as a "material evidence" in a drummed-up criminal case. Even if there's no crime committed and the company is cleared in the court, its work can be paralyzed for months.

And on a bigger note, if your government has no freedom of speech then work to fix THAT problem.


censorship

Posted Mar 8, 2019 1:33 UTC (Fri) by jschrod (subscriber, #1646)
In reply to: censorship by Cyberax
Parent article: Rosenzweig: The federation fallacy

My friends in Nicaragua beg to differ. They live in a civil war and they would very much like to have the freedom of speech that you write about so derogatory.

Many years ago, I had acquaintances in China who ended up in prison because they exercised their ideal of "freedom of speech". I think they see it different than you, too.

Please note: Neither the USA nor other 1st world countries are the whole world.

Cheers,
Joachim

PS: I'm from a country where neo-Nazi propaganda is illegal even on your own server, and I think that's OK. We learned the hard way that there are limits to freedom of speech *because* it is so valuable.


How to democratize email?

Posted Mar 8, 2019 0:34 UTC (Fri) by neilbrown (subscriber, #359)
In reply to: How to democratize email? by grothesque
Parent article: Rosenzweig: The federation fallacy

> ideas on how a viable business model for a more democratic email service could look like.

I see two main issues.

The first is software. Most MTAs are excessively configurable. Most of us don't need that. A packaged and configure MTA that would let me easily try a new version, or roll-back to the old version would remove a lot of the admin headaches that have been mentioned. This would be given away as a loss-leader. It would probably include IMAP service and a web-mail interface (roundcube??).

The second is connectivity and is primarily about trust, though for people who have obnoxious ISPs, firewall-transition is also important.
Allowing every host to send unauthenticated mail to every other host is one of the reasons that email is a pain. We can go part-way without going to full centralization.
Maybe there is a business opportunity to provide authenticated SMTP services.
My MTA-in-a-box connects to the service that I pay a small sum for, authenticates as me, and delivers email. Then it uses the ETRN STMP command to switch roles and starts receiving email addressed for me.
The provider establishes reciprocal agreements with other providers - they promise to only send authenticated and paid for email, and agree to receive similarly authenticated email.
These providers also to spam tagging, and maybe even filtered when they have 99.9% certainty that it is unwanted.
I pay about $20 a year for a domain name. I could easily pay a similar amount for trouble-free self-hosted email.


Security quotes of the week

Posted Mar 7, 2019 23:05 UTC (Thu) by flussence (guest, #85566)
In reply to: Security quotes of the week by bustervill
Parent article: Security quotes of the week

Mentioning things like browsing sci-hub in the same breath as assassination… are they trying to say science is evil, or that politicians should be that expendable? ;-)


The Thunderclap vulnerabilities

Posted Mar 7, 2019 20:49 UTC (Thu) by rweikusat2 (subscriber, #117920)
In reply to: The Thunderclap vulnerabilities by mjg59
Parent article: The Thunderclap vulnerabilities

One could argue that Intel wrote the e1000 driver which uses kmalloc to allocate 2K areas which thereby enables the malicious device to access what's in the other 2K of the page the buffer resides in. Shockingly, other kernel code also uses kmalloc, hence, this can lead to a variety of interesting observations.


censorship

Posted Mar 7, 2019 18:43 UTC (Thu) by hummassa (subscriber, #307)
In reply to: censorship by rgmoore
Parent article: Rosenzweig: The federation fallacy

Ha! You pampered, spoiled first-worlders...

Down here in our small corner of Latin America, some of us still value free speech because some of us have seen (as recently as the 1980s and 1990s) our relatives being tortured and killed for investigating government corruption...

Cría cuervos, e te bicarán los ojos...


Rosenzweig: The federation fallacy

Posted Mar 7, 2019 17:43 UTC (Thu) by smitty_one_each (subscriber, #28989)
In reply to: Rosenzweig: The federation fallacy by alyssa
Parent article: Rosenzweig: The federation fallacy

Great article. With precisely zero (0) snark, but the issue you raise seems related to https://en.wikipedia.org/wiki/Division_of_labour

Human beings do this with politics as much as technology: let those who really groove on communications electronics figure out how to both design and regulate my handset, so I can bother my pretty head* with other matters.

Possibly what's needful is a discussion on how we manage to put "enough" time into limiting the centralization of information management. Promises to be a challenge.

*It's not actually pretty.



Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds