jeanjq's comments

jeanjq | 12 years ago | on: Can I Be Trusted?

No, I do not. I have no reason to distrust him but equally no reason to unthinkingly trust. I listen to his opinions and take them into account.

jeanjq | 12 years ago | on: Lua: the world's most infuriating language?

Welcome to HN where the top-rated comment is from someone who admits they didn't read the presentation, doesn't understand what the author was saying and manages to complain.

jeanjq | 12 years ago | on: A quick look at the Redis source code

Fun. This isn't really specific to Redis, but is a good introduction to the sort of thing that C programmers often get up to. You'll see this sort of function table in all sorts of C programs. Take a look at GNU stuff like make and you'll see the same format.

Congratulations on the exploring.

jeanjq | 12 years ago | on: Air Gaps

I don't think this is right. You should reduce the entire attack surface. Since Bruce is worried about malware getting in via a removable device and cites examples that attacked Windows he should not use Windows.

jeanjq | 12 years ago | on: Air Gaps

Seems to me the only reason to choose Windows for this would be to use Microsoft Office to read the NSA documents and he's stated that he's using OpenOffice, so...

jeanjq | 12 years ago | on: Air Gaps

Surprised that he decided to use Windows.

jeanjq | 12 years ago | on: Meet the Nest Protect smoke and CO alarm

I wonder what battery life is like on this? A typical smoke alarm battery can last years but this appears to have a lot of functions and WiFi and a light.

BTW Why do smoke alarm batteries die at night? Because temperature drops and a weak battery's voltage output drops with temperature.

jeanjq | 12 years ago | on: Edward Snowden Q&A

The Guardian approach to this thing is infuriating. There's little useful information from it. eg this question and answer

Question: Is encrypting my email any good at defeating the NSA survelielance? Id my data protected by standard encryption? Answer: Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.

Pfft. What size RSA keys are unbroken (2 048, 4 096, 8 192)? Is there a backdoor in the ECC NIST P256 (or similar) curve? How many TOR exit nodes does the US government manage and how good are they at in/out correlation?

page 1