• 0 Posts
  • 99 Comments
Joined 2 years ago
cake
Cake day: July 14th, 2023

help-circle
  • This is basically what the Luddites were fighting against:

    A world where labor has no opportunity to develop skills or use them, no authority over the machinery which dictates the nature of what is made and how, chasing fewer and fewer jobs for less and less pay.

    Their solution was to take sledgehammers to the factories. The owners, of course, hired thugs to shoot them. And the politicians ruled that the machines were sort of the property of the crown, and therefore destruction of these machines should be punishable by public execution.

    Funny enough, data centers today are considered strategic assets under the protection of DHS. Which is a fancy way of saying: still owned by the crown, still gonna shoot you if you try to negotiate via sledgehammer.



  • Think of it like your browser history but for Git. It’s a list of the SHAs related to your recent operations.

    And because Git is a content-addressable data store, a SHA is basically like a URL. Even if a branch no longer exists, if you know the SHA it pointed to then you can still check out the exact contents of that branch. The reflog helps you find that.












  • Lots of folks in the US don’t really have an understanding of religion as a separate thing from nationality.

    They think of “being Christian” as “being like the other white people in my neighborhood growing up”. End of thought.

    So drinking beer, watching football, and hating taxes are all “Christian things” to them.

    So when they say “Christians — and only Christians — died for this country”, they’re 100% correct, according to their understanding of “being a Christian”. Cuz to them it basically just means “being an American”.

    There’s really no way to convince them otherwise. It’s like telling someone that Velcro is really called “hook and loop”.


  • Depends on the use case, and what you mean by “external dependencies”.

    Black box remote services you’re invoking over HTTP, or source files that are available for inspection and locked by their hash so their contents don’t change without explicit approval?

    Cuz I’ll almost entirely agree on the former, but almost entirely disagree on the latter.

    In my career:

    I’ve seen multiple vulns introduced by devs hand-writing code that doesn’t follow best practices while there were packages available that did.

    I have not yet seen a supply chain attack make it to prod.

    The nice thing about supply chain attacks though: they get publicly disclosed. Your intern’s custom OAuth endpoint that leaks the secret? Nobody’s gonna tell you about that.