tomfitz | 8 years ago | on: Project Euler
tomfitz's comments
tomfitz | 8 years ago | on: HAProxy 1.8
Is this true for A records too?
If so, neither haproxy nor nginx expire cached A records.
Nginx Plus does, and a few nginx plugins do, however.
https://github.com/airbnb/synapse is a process that polls DNS, and updates haproxy config accordingly and SIGHUPs haproxy I've used synapse to solve this issue, but it's a moving piece I'd rather not have involved.
tomfitz | 8 years ago | on: Tracking friends and strangers using WhatsApp
https://robertheaton.com/2014/07/14/getting-nothing-done-a-m...
tomfitz | 8 years ago | on: Anatomy of a Moral Panic
tomfitz | 8 years ago | on: Firefox Focus – A new private browser for iOS and Android
tomfitz | 8 years ago | on: Security Keys
This stops the proxy attack you describe getting a session key, but not getting your password. Of course, the password alone is insufficient.
tomfitz | 8 years ago | on: Security Keys
You might argue "well why bother with U2F, if you are going to set up TOTP anyway", to which I respond that using U2F is still a net win, because for the times you use U2F, you are safe from phishing attacks.
That in an emergency situation you have to use TOTP, and thus be vigilant that you aren't being phished, does not negate the benefits from having used U2F previously.
I can see that by enabling TOTP as a second-factor, it increases your attack surface. That is, you now have to care about whether your TOTP secret has been leaked. I consider this cost to be small, compared to the benefit of being able to fallback to TOTP. Others may decide this tradeoff isn't worth it.
tomfitz | 8 years ago | on: Facebook – You are the Product
Sweet!
tomfitz | 8 years ago | on: Proof of Work Without All the Work
tomfitz | 8 years ago | on: Message encryption a 'problem' – UK home secretary
Though I'm skeptical of how much a 3m42s interview can be said to represent the entirety of her views, I'd say she alludes to the harms by referring to such access as "warranted". That is, authorisation is restricted [because of the costs of unrestricted access].
> Second, that the spying will be used asymmetrically - you, dear citizen, will have all your communications recorded, stored indefinitely, and subject to discovery when some prosecutor or large corporation decides to do away with you.
This law would apply to politicians too, right? If they're suspected of a crime, a warrant could be issued for their communication details.
> But try and find out which corporations are sponsoring which politicians, who owns them, and what kind of deals those politicians are making in your name, and you'll meet a stone wall of silence - just like in the TTIP negotiations.
As mentioned, if those are crimes I expect them to be investigated similarly.
> I don't think this is a stronger argument. In fact, I don't think this is an argument at all.
Sorry yes, my single sentence wasn't the entirety of the argument. I was referring to arguments that rely on the benefits of privacy, rather than defeating a strawman (my, as you say, literal reading of top-level comment).
tomfitz | 8 years ago | on: Message encryption a 'problem' – UK home secretary
tomfitz | 8 years ago | on: Message encryption a 'problem' – UK home secretary
GP?
> Whether [...] you are simply pointing out that those in authority have a default duty/right to an individual's private conversations
Certainly not. Whether they do ought to should be decided by society and its representatives via the legislature.
tomfitz | 8 years ago | on: Message encryption a 'problem' – UK home secretary
I can see targetted spying is possible today. It sounds like she wants targeted spying to be cheaper, and restricted by the judicial system.
> But pointing out the harms of pervasive spying is a weak argument, because she didn't deny (or even address) those harms?
The argument I replied to wasn't pointing out the harms of pervasive spying. Nor was your argument.
"If she wants law enforcement to be able to see other's metadata, she should expose her metadata" is weak. We needn't waste time with that.
There are stronger arguments, such as asserting our right to privacy, or perhaps that it isn't technically possible without critically compromising encryption for everybody.
tomfitz | 8 years ago | on: Message encryption a 'problem' – UK home secretary
tomfitz | 8 years ago | on: Message encryption a 'problem' – UK home secretary
We ought to use strong arguments. This thread's arguments aren't strong.
tomfitz | 8 years ago | on: Message encryption a 'problem' – UK home secretary
tomfitz | 8 years ago | on: 'Using Emacs' Series
I use it, though I'm not a heavy emacs user.
tomfitz | 8 years ago | on: VISA offers restaurants $10,000 to stop accepting cash
tomfitz | 8 years ago | on: The Presence of One’s Own Smartphone Reduces Available Cognitive Capacity
tomfitz | 8 years ago | on: Mozilla and NSF offer $2M prize to decentralize the web
n^2 = sum(1..n) - sum(1..n-1) = 2sum(1..n-1) + n
=> n^2 - n = 2sum(1..n-1) => n(n-1) = 2*sum(1..n-1) => sum(1..n-1) = n(n-1)/2
And you can rewrite that as... sum(1..n) = n(n+1)/2