Preston Maness ☭

  • 9 Posts
  • 234 Comments
Joined 3 years ago
cake
Cake day: March 2nd, 2022

help-circle
  • Khalil, who has a green card, is a lawful permanent resident. In ordering Khalil’s deportation, Rubio relied on a rarely used federal statute from the 1950s that played a major role in shaping American immigration during the Cold War. The McCarran-Walter Act, or the Immigration Nationality Act of 1952, gives the secretary of state authority to decide that a noncitizen’s presence in the United States threatens the country’s foreign policy goals. [emphasis added]

    I think it’s telling that, 30 years since the Cold War’s conclusion, news outlets are still steering clear of describing what the war was actually fighting against: socialism. The statute was developed during the second Red Scare and was an outgrowth of McCarthyism, a series of anti-communist witch hunts. 30 years later, the mass media are still Inventing Reality.







  • Every manufactured product, from toasters and automobiles to ballistic missiles, runs on computer chips. The United States invented the integrated circuit but now fabricates just 12 percent of the world’s chips, and none of the most advanced versions.

    As a dude that got a BS in Computer Engineering only to give up on the industry, yeah. That tracks. AMD and Intel were like “got a PhD and post-doc work? No? Maybe go fuck yourself, work in verification/validation for a decade at 40k/year, and then maybe we’ll consider you.” So I said “oh well” and wrote code instead. If I could tell my decade-younger self one thing, it’d be: Learn Chinese.








  • Can you explain more about how this relates to alleviating the problem? I’m curious and admittedly, when I read “crypto”, I think of big tech grifters, but I know that’s not all of cryptography as a field.

    Cryptocurrency has forever ruined “crypto” :(

    But in any case, m-of-n cryptography (Shamir Secret Sharing) permits “m” keys out of a total “n” keys to unlock a secret, such as the login credentials for a domain registrar. So long as “m” keys are available, the login credentials can be recovered. This avoids having a single point of failure, for example, where only one person knows the login credentials and is AWOL. So long as “m” other folks are still around and active, they can recover the login credentials without the AWOL person.




  • This is one of the things that bugs me about the design of a lot of the internet. Far too much that ultimately comes down to one single person, with zero accountability process. … I don’t know what the answer is there because it’s hard to have accountability and a stable structure in disjointed borderline anonymous environments, but it has long bothered me.

    Part of the answer is m-of-n cryptography (and other crypto), but the tools around it are barely usable for technically inclined people, much less those that aren’t. It’s a common enough story, unfortunately. Theoretically, the tech is all there to ameliorate these problems. Practically, only people with encyclopedic knowledge of esoteric tooling have access. And typically, there aren’t enough of those people to go around.


  • You know, the thing that always seemed really scary about the OG Nazis is that they were competent, intelligent, put-together people that were just fucking evil. Then you look at the US Nazis and the fucking bozo density is off the charts, but they seem to be succeeding anyway.

    Not every fascist and Nazi needed to be competent, intelligent, and put-together. Just enough of them. I suppose we’ll find out in real-time if they have amassed sufficient numbers this go 'round.