Timeline for hacker list by mikegerwitz, page 2
-
Mike Gerwitz started following Todd Weaver.
-
Mike Gerwitz (mikegerwitz)'s status on Tuesday, 06-Aug-2019 02:20:22 UTC Mike Gerwitz Another good article from Cory Doctorow about adversarial interoperability, this time about IBM and the Phoenix BIOS:
https://www.eff.org/deeplinks/2019/08/ibm-pc-compatible-how-adversarial-interoperability-saved-pcs-monopolization -
Mike Gerwitz (mikegerwitz)'s status on Sunday, 23-Jun-2019 02:53:28 UTC Mike Gerwitz @cwebber Great episode! Just had a listen. -
Christopher Lemmer Webber (cwebber)'s status on Friday, 21-Jun-2019 21:48:40 UTC Christopher Lemmer Webber There's a new episode of @librelounge out where we interview Ludovic Courtès about Guix! Functional programming? Functional package managers? Distros? Reproducibility? It has all the cool things! https://librelounge.org/episodes/episode-23-guix-with-ludovic-court%C3%A8s.html
-
Mike Gerwitz (mikegerwitz)'s status on Friday, 21-Jun-2019 03:04:47 UTC Mike Gerwitz I decided to occasionally pop back onto IRC when I'm free at night. I miss the real-time chat, but I don't often have time for it.
Catch me on freenode, nick mikegerwitz. I'll be in #gnu, #fsf, #guix, and some others. -
Mike Gerwitz (mikegerwitz)'s status on Thursday, 13-Jun-2019 02:00:33 UTC Mike Gerwitz I really enjoyed this Purism "'See Your Junk' - Behind the scenes" post and video, which goes into some detail on professional video production using free software:
https://puri.sm/posts/see-your-junk-behind-the-scenes/
Thanks @purism for taking the time to put that together, especially since it's such a specialized domain that many people don't have exposure to. -
Mike Gerwitz (mikegerwitz)'s status on Tuesday, 11-Jun-2019 01:27:36 UTC Mike Gerwitz On the topic of #privacy and #surveillance, I often seen arguments that can be phrased as: "if someone you loved were lost, wouldn't you do everything you could to find them?"
Of course I would. I have two young children. They mean more to me than anything, and that includes my principles. I can't imagine the desperation I would feel if they were lost, and I would do almost anything to find them.
And that's part of the problem. We have these pervasive surveillance systems---be it government or civilian (like Ring)---that produce enormous amounts of data. We have mobile devices, cars, ALPRs, and such tracking most every person's moves. We have services analyzing DNA for family history being used for other uses. So on and so fourth.
And it doesn't matter what those data are collected for---maybe it's for certain purposes now, but once enough people become desperate enough, they'll be used for other things too. Even if those people think it's wrong to do so.
We need to avoid putting these systems in place to begin with. That's the only way we can't be tempted by them in difficult times.
And when something does happen, people say, "but if we had X, I wouldn't have lost the person I love". The problem is: it's impossible to satisfy that argument. You can never have enough. And as a consequence, the lives of everyone are affected, not just those who are in that terrible situation.
These aren't easy decisions to make. I say that as both an activist for user privacy, and as a father. -
Mike Gerwitz (mikegerwitz)'s status on Monday, 10-Jun-2019 03:21:51 UTC Mike Gerwitz @mangeurdenuage Any solution to any problem can be viewed as a specific application of some more general principle, recursively. If you first write that more general program, and then write the program you were _going_ to write in terms of that general program, then it might be useful for a larger class of problems, and more interesting to write (...also recursively). And it may also take orders of magnitude longer to write, and require more research, and possibly never get written.
As a professional, one learns to identify and avoid this problem, unless generalization is warranted (perhaps through incremental development). Yet at home, I fail to control myself. Which leads to a whole lot of interesting research, and a whole lot of incomplete projects. -
Mike Gerwitz (mikegerwitz)'s status on Monday, 10-Jun-2019 02:49:04 UTC Mike Gerwitz How I doom almost every personal project I start to work on: "Oh, I could generalize this." -
Mike Gerwitz (mikegerwitz)'s status on Monday, 10-Jun-2019 02:14:53 UTC Mike Gerwitz cnet: "Amazon's helping police build a surveillance network with Ring doorbells"
https://www.cnet.com/features/amazons-helping-police-build-a-surveillance-network-with-ring-doorbells/ -
Mike Gerwitz (mikegerwitz)'s status on Friday, 07-Jun-2019 03:59:54 UTC Mike Gerwitz https://news.stanford.edu/2019/06/05/edit-video-editing-text/
This is impressive, and concerning. This is only going to get more convincing.
A method like watermarking doesn't make sense---someone will just develop a system for their own use that _doesn't_ use watermarking. There's no choice but to develop better forensic tools.
Inevitably, one day, those too will fail. If you want to know that something legitimately originated from someone, we need to do so cryptographically. If you want to know that something was legitimately recorded and unaltered by the legitimate source of the video, well, there'll always be a way around that. -
Mike Gerwitz (mikegerwitz)'s status on Thursday, 16-May-2019 02:06:01 UTC Mike Gerwitz @cwebber Ah, well, to actually answer your question:
- I generally prefer to mitigate issues, even if that means inconvenience or lack of performance. I put a great deal of time into making life intentionally difficult for myself, for many different things, in the name of security.
- In certain circumstances, I may choose not to adopt that practice depending on my threat model and the tradeoffs.
- For people who aren't able to understand the risks and tradeoffs thoroughly, I'd recommend that they go with less performant systems in favor of mitigations.
- BUT, in the context of Intel, their microcode updates are non-free, and so I won't install them, and I won't recommend that people install them. But I will warn them of the risks.
TBH this is the main thing making me wary of purchasing a Purism laptop---I really would like to eventually, but I'm having a lot of trouble justifying using an Intel processor (or most modern hardware, for that matter, that isn't libre) for any computing that I may consider sensitive. And a personal laptop inevitably falls under that category.
It's a shitty situation. But yes, I would consider purchasing a computer that's 3x slower for personal computing. If I'm doing something CPU or memory intensive like compilation, I usually offload to a separate box anyway, since that isn't usually sensitive.