• 0 Posts
  • 86 Comments
Joined 1 year ago
cake
Cake day: July 8th, 2023

help-circle
  • This is how Wisconsin’s law is so fucked up: The three men he shot were not working together, were not coordinated, did not know each other. So, on the one hand, Rittenhouse may have subjectively felt under coordinated attack, he was not, but the subjective feeling is what matters for the law.

    From Huber:s POV, he was trying to disarm a murderer. Maybe he felt threatened, too? But the law is so fucked, his POV doesn’t matter because he’s dead. In Grosskreutz’s POV, he was approaching an active shooter who’d just killed two men and trying to defuse the situation. When Rittenhouse pointed his gun, Grosskreutz would have been justified under the same law in blowing him away.

    In short, the law incentivizes shooting first.






  • Case-sensitive is easier to implement; it’s just a string of bytes. Case-insensitive requires a lot of code to get right, since it has to interpret symbols that make sense to humans. So, something over wondered about:

    That’s not hard for ASCII, but what about Unicode? Is the precomposed ç treated the same lexically and by the API as Latin capital letter c + combining cedilla? Does the OS normalize all of one form to the other? Is ß the same as SS? What about alternate glyphs, like half width or full width forms? Is it i18n-sensitive, so that, say, E and É are treated the same in French localization? Are Katakana and Hiragana characters equivalent?

    I dunno, as a long-time Unix and Linux user, I haven’t tried these things, but it seems odd to me to build a set of character equivalences into the filesystem code, unless you’re going to do do all of them. (But then, they’re idiosyncratic and may conflict between languages, like how ö is its letter in the Swedish alphabet.)








  • How about a government-sponsored, non-profit authentication service? That is, it should be impossible to get a loan, open a line of credit, or anything else in somebody’s name, without the lending institution verifying that it’s actually on behalf of the named individual. Eliminate the security-through-obscurity technique of using bits of easily-leaked personal information as a poor substitute for actual authentication.

    I mean, (as a comparative example) I have to go through an OAuth2 consent dialog to connect a third-party app to my email account, yet somebody can saddle me with huge debts based on knowing a 9-digit number that just about everybody knows? It’s the system that’s broken, tightening up the laws on PII is just a band-aid.



  • I’m not a conspiracy theorist, either, but my preferred suspicion is that it’s aliens. They’ve tried a number of techniques, from implanting mind-control devices (Mitch McConnell and the way his face carries a look of horrified disgust at the things they make him do) to direct infiltration by putting one of their agents in an ill-fitting human suit (Ted Cruz). Ultimately, they seem to have given up the finesse approach, and settled on lobotomizing humans with existing personality disorders to create a RAID (redundant array of inexpensive dipshits) to simply overwhelm our system of government.

    It’s the only explanation that really makes sense to me.