31 entries in 0.6s
mircea_popescu: what is your standard of proof anyway ? suppose x claims that koch works for
weimer ; and y claims
weimer works for koch. how do you distinguish these claims ?
r0nin-: every single assclown brings up zimbabwe or
weimer as their lame example of 'hyperinflation' without every understanding what happened there
mircea_popescu: the above being the ENTIRETY of "usg cyberwarfare capacity" by the way. that it got idiots (schneier, koch,
weimer etc), to write software that sets p as password everywhere independent of user input and then ten million imbecile lusers to use that "because it's what everyone does" where everyone is so defined to exclude everyone sane.
mircea_popescu: the only hostis humani generis are the anonymous usg tools. the gavin-koch-
weimer-boeck-younameit.
mircea_popescu: and then of course they'll discover this nice bug that's been there for 10 years and utterly ruins you. so you gotta update. except the only update available is made by florian "i eat shit for breakfast"
weimer and well... it contains 3 extra holes to be burned in 2025
mircea_popescu: yes. because this is why fucking
weimer exists, so anything you need you build from source. then PeterL can wonder if "linux repo in v".
mircea_popescu: the sad truth underneath this all is, that the "computer [security] industry" has slowly became dependent on usg-sponsored burnings to the degree that unless
weimer and co actually write all the stuff and put it out, they can't do it on their own, in any sort of timeframe.
mircea_popescu: apparently a nude statemet of "florian werner knew exactly what the hole was, to an extent larger than what was at the time specified" doesn't coalesce into "holy shit, florian
weimer puts the security holes in there!"