Damus

Recent Notes

Lesley Carhart :unverified: · 3w
Feels different than Iraq. In 2001-03 everyone was in for whatever and it was blasphemy to say the war was unjust or ill advised. Everyone was ready to enlist. People donโ€™t want to die for Israel ...
Eleanor Saitta profile picture
@nprofile1q...
There was definitely a broad base of support then for military action and security โ€” one which was viciously abused in ways that we are still now seeing the fallout from domestically, let alone internationally.

That's said, as others have, I cannot let that statement that everyone was all in go unchallenged โ€” tens of millions of us were dead set against it and in the streets trying to stop what was in the end as predicted โ€” another round of pointless warfare that left the country and the world a much worse place.
Eleanor Saitta profile picture
Today I've been told that C is memory safe if you're just very neat, that code is documentation, and that expecting protocol specs is a form of bias?

I didn't realize it was 90s week; I'll go get a flannel.
๐“ผ๐“ฎ๐“ป๐“ช๐“น๐“ช๐“ฝ๐“ฑใ€ใƒ„ใ€‘โ˜ฎ(๐Ÿ“๐Ÿ‡จ๐Ÿ‡ฆ) · 4w
nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqq2u2afqm22e4k9kt4rxvl205pks6zmxuwq5dkuzgc6g8rp3x6cqqn9x9w4 nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpq5zducn0qs573hhreraem60awk3dpfc8...
Eleanor Saitta profile picture
@nprofile1q...
@nprofile1q... @nprofile1q... @nprofile1q... and why would bittorrent not have threat model? Certainly, I'd expect that a safety critical app using it as a transport layer would need to take the time to figure what threat model it de facto implemented and make sure that was suitable for how they were using it. That's much more expensive than doing it the other way around, though, and leads to dangerous cases where the upstream does not know what security properties of their system downstream users are depending on them, leading to nasty and hard to fix vulnerabilities when they're broken without notice. Which is why folks building systems where security matters usually build on tools with a proper security engineering foundation.
Eleanor Saitta profile picture
Many, many years ago, at school for CS and before that interning at NASA Ames, I learned to take programming seriously as engineering work, and also the level of rigor that engineering work requires. In the intervening thirty years, I have had to come to terms with the degree to which this attitude is rare in theory and vanishingly rare in practice again and again. Tooling has gotten better, but the rigor applied to the average line of code has gotten worse.

I would hope that safety-critical systems would be different, and in some cases they really are. However, the number of people who want to build secure communications systems that they want to be safety critical and who expect thousands of people to literally use in a case where a breach of the threat model means the users will die and who as developers cannot bother to meet the basic design rigor requirement of 2006 โ€” have a fucking threat model that is accurate and up to date โ€” will never cease to shock me.
๐“ผ๐“ฎ๐“ป๐“ช๐“น๐“ช๐“ฝ๐“ฑใ€ใƒ„ใ€‘โ˜ฎ(๐Ÿ“๐Ÿ‡จ๐Ÿ‡ฆ) · 4w
nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpq5zducn0qs573hhreraem60awk3dpfc8xsqj4cy9yj0d76epxrmasuu2aqy nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqq2u2afqm22e4k9kt4rxvl205pks6zmx...
Eleanor Saitta profile picture
@nprofile1q...
@nprofile1q... @nprofile1q... @nprofile1q... Not having a baseline way of explaining what the set of threat models and security guarantees it's designed to be able to meet is a red flag, especially on a complex, reconfigurable protocol stack. It means that if someone wants to use it for something real, they have to start from scratch in analyzing the security properties of each element in the configurations they might use, then analyze how those elements interact, etc. The same thing applies with trying to figure out if this protocol stack is or can be appropriate to solve a given particular problem.

In a lot of cases, it's going to be easier to start from scratch and build simpler, smaller components designed directly around the security guarantees and architecture your specific project needs. The expensive part of a piece of software is not the code, it's the team that has a living, detailed model of the code in their heads โ€” a technical model, a user experience model, a security model, and a performance model, at a minimum. To be worth seriously adopting, a protocol stack should at the very least attempt to make this legible to developers.
2
๐“ผ๐“ฎ๐“ป๐“ช๐“น๐“ช๐“ฝ๐“ฑใ€ใƒ„ใ€‘โ˜ฎ(๐Ÿ“๐Ÿ‡จ๐Ÿ‡ฆ) · 4w
nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqq2u2afqm22e4k9kt4rxvl205pks6zmxuwq5dkuzgc6g8rp3x6cqqn9x9w4 nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpq5zducn0qs573hhreraem60awk3dpfc8xsqj4cy9yj0d76epxrmasuu2aqy nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqlksxw7gqy3tyvzvzv...
KT · 4w
nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqq2u2afqm22e4k9kt4rxvl205pks6zmxuwq5dkuzgc6g8rp3x6cqqn9x9w4 nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqkvmgdpe0vke6c76u0ag2ykr5f5a8cprsj99cymtmzasf25tnc8fq07ezqw nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqlksxw7gqy3tyvzvzv...
Eleanor Saitta profile picture
Probably mostly not my audience here, but I'm currently looking for a business-side/CEO cofounder for an encrypted radio startup. There are solid funding options, but while I can build the team to make the product happen, I'm not the person to navigate the money side of things. I'm looking for a cofounder with previous startup CEO experience and executive-level experience (although not necessarily CEO) in a hardware startup specifically. EU citizen and resident, although it'll be a remote team, so where is less important.
1
sister_sam · 4w
Not my background but I would love to hear more about the project when you aren't in stealth mode.
๐“ผ๐“ฎ๐“ป๐“ช๐“น๐“ช๐“ฝ๐“ฑใ€ใƒ„ใ€‘โ˜ฎ(๐Ÿ“๐Ÿ‡จ๐Ÿ‡ฆ) · 4w
nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqq2u2afqm22e4k9kt4rxvl205pks6zmxuwq5dkuzgc6g8rp3x6cqqn9x9w4 nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqlksxw7gqy3tyvzvzv4wn0he6045z7k68nhnlec9tz4njkk3xdfmqtwsut4 No, this is dat - started in 2013 - and is a fully secure open source ...