• 0 Posts
  • 24 Comments
Joined 1 year ago
cake
Cake day: June 7th, 2023

help-circle

  • I like this sentiment, but giving the US intelligence apparatus what amounts to a veto for elected/appointed officials feels like a recipe for disaster.

    The only way I see that being workable is if the clearance grantors are transparently beholden to elected officials or the people directly. Which are essentially what elections and the congressional confirmation process are supposed to be. But both of those processes feel like they’ve been subverted. (Elections by the two-party system and the fact that half the population seems intent on electing a dictator, and the other by the senators/representatives that come out of that electoral system).











  • Dr. Strangelove or: How I Learned to Stop Worrying and Love the Bomb is my favorite movie. It’s got great characters, including three played by the same actor, is well written with some very quotable lines, and the story is both absurd and believable (even now).

    I’ll be the first to admit that it’s not for everybody, but if you’re asking for movies to watch it’s probably for you. With movies I always recommend going in knowing nothing.

    I could quote the whole thing probably, but I’ll spare you and just say that the way the Russian ambassador says “fresh fish” is weirdly seared into my brain.






  • In practice, I believe the private key should contain the public key (or at least sufficient data to recover it): https://superuser.com/questions/814409/gnupg-opengpg-recovering-public-key-from-private-key#814421

    I believe you only need your private key to sign files so, technically you only need to back up the private key, but you should test this to be sure it fits your use case.

    Depending on how you’re backing things up, and what your security goals are, remember that backing up a private key may involve putting that private key on somebody else’s computer - i.e. if you use a remote git repo, or cloud backup service, or even send the key to your own (different) machine over an insecure network. Make sure that you’ve got a way of securely backing up your private key, otherwise you may undermine the whole cryptography thing anyways :).

    As always, you should test by backing up your key(s) and then testing that you can actually restore them and successfully sign a file. Backups are only as good as the last time you tested restoring from them.




  • Zigbee mostly uses 2.4Ghz, so it’s not helping remove congestion from that band anyways but I guess the other protocols do. Can’t the devices phone home as soon as they’re connected to a hub that’s internet connected? Even if the hub has to cooperate with the device, they’re made by the same manufacturers so I wouldn’t trust tleither of them.

    With wifi I can spin up a separate iot vlan that cannot access the internet. That vlan doesn’t require my ISP, it’s entirely local. I get to control exactly who connects and even who they connect with. I don’t see that same control with the alternatives.

    I guess I do see an argument for very low power devices using a lower power protocol, but I guess I just don’t have any of those devices so it hasn’t been an issue for me. And like you said traffic congestion is a valid problem, I’ve just never experienced it.