asciilifeform: also exemplary retardation. yeeeeh let's have null-terminated strings!111 we Luuuuuv doing O(N) length calculation, and random breakage !
asciilifeform: pattern and substituted with a list of all filenames that match it.'
asciilifeform: 'If a filename contains whitespace, it undergoes WordSplitting. Assuming we have a file named 01 - Don't Eat the Yellow Snow.mp3 in the current directory, the for loop will iterate over each word in the resulting file name: 01, -, Don't, Eat, etc. If a filename contains glob characters, it undergoes filename expansion ("globbing"). If ls produces any output containing a * character, the word containing it will become recognized as a
asciilifeform: environments in the lisp sense, which resemble c-machine stack frames except not retarded.
asciilifeform: mircea_popescu: the answer is called 'environment' and was a solved problem in lisp circa 1958.
asciilifeform: if 'subshells' were a rare and largely unnecessary thing, that'd be one thing. but shells as a rule offer no clean way of doing 1,001 things other than subbing out to self
asciilifeform: 'correct' in the down's syndrome sense.
asciilifeform: because it has genuinely nfi, apparently, that it is a sub.
asciilifeform: didja know, folks, that you cannot exit-with-return-code the script from a 'subshell' ?
asciilifeform: ( i could even see an argument that, e.g., rawtx eater doesn't belong in trb , and that tx ought to be injected via the ordinary tcp method. but i dun recall having this argument )
asciilifeform: whaack: packets sent between btc nodes on the wild net have been known to 'mysteriously' vanish, like in bermuda triangle. the folks who control the backbones dislike bitcoin. the gold standard for syncing a newly-birthed node is to do so with a working node on your lan, or otherwise, if transporting it is impractical, via ssh tunnel to same.
asciilifeform: btw, mircea_popescu , mod6 , et al: might be interesting to have a mempool-less mode (block relay only) for cases like this.
asciilifeform: (for the uninitiated, 'busybox' is simply a 'swiss army knife' thing that stuffs simplified versions of ~every~ basic unix util into 1 executable)
asciilifeform: and i realize now that all of my boxes that 'only have sh' are actually busyboxtrons (e.g., pogo)
asciilifeform: aha, it is why you won't find a 'sh' tarball in, e.g., your gentoo's /usr/portage/distfiles.
asciilifeform: if ssri'd water were economically-feasible, it would probably have been made sop in the '90s.
asciilifeform: the one with the H(S+J) and the multiple timestamps, etc.
asciilifeform: lulzily enough, best as i can tell, 'guy fawkes algo' is actually ~= the scheme i suggested here a few days ago.
asciilifeform: except that it is falsely advertised as 'equivalent to real signatures'
asciilifeform: 'What is actually happening of course is that a middleperson attacking the integrity channel has to participate in it from the start; she cannot join in later' << mighty heavy limba de lemn ...
asciilifeform: since when is 'the onus would be on the objector' ?!
asciilifeform: ntion (such as a digital signature law, or a contract between members of an EDI system) and the validation of even conventional digital signatures involves reference to an online or at least near real-time certificate revocation list.'
asciilifeform: 'So if it is claimed that the Guy Fawkes protocol is not really a signature, then the onus would be on the objector to show how to deal with the many other kinds of signature that use interaction, as well as the importance of context — the framework of certification and revocation services, legal conventions and so on — to the utility of digital signatures. In most applications, the value of signatures ultimately depends on conve
asciilifeform: and holy FUCK, the sheer depth of retardation,
asciilifeform: (in actuality, in 'identity-based' crypto, folks actually encipher to a pubkey that is produced by F(Pc, X) where Pc is the chump's email addr and X is a public key of the great inca; chump (email addr holder) can decipher with his Pk_c private key, and so can the inca.☟︎
asciilifeform: either these folk never tire, or the rubbish is actually churned out by fresh crop of conscripts every quarter
asciilifeform: 'He was concerned about the team’s communication skills and lack of maturity, which has compromised bitcoin’s ability to attract new protocol developers.' << lel
asciilifeform: vic was historical, and interesting, and the linked trestment is not wholly bad.
asciilifeform: 'The ultimate development along these lines was the VIC cipher, used in the 1950s by Reino Häyhänen. By this time, most Soviet agents were instead using one-time pads. However, despite the theoretical perfection of the one-time pad, in practice they were broken, while VIC was not.'