I guess my #introduction post has vanished in the mists of time.
I am a professional Python developer, working almost exclusively on #opensource and #freesoftware of the #privacy genre. I sometimes do #tor volunteer work.
Outside of that I #run, #cycle, and #ski and currently trying to become a #unicyclist
"If we remain addicted to wealth, status, influence and self-esteem, we are likely to promote problematic responses to societal breakdown."
@woozle @meejah this type of edit-with-history is a good feature, though it’s separate from providing future-forward deletes. in federated systems it’s important, so that for example you can see how something you boosted has changed. p2p people often pretend they’re one and the same (not what you’re doing) which frankly infuriates me.
Also, there's more to "delete" than "I want to prevent any recipients from having copies of this". It's more commonly "oops, that wasn't exactly what I meant to send, and I don't want its presence to disrupt or confuse, so please remove it (by default, at least".
I for one would be perfectly content with a "delete" option which allows recipients to reveal what I deleted, when I posted it, and when I requested deletion. A wiki-like memo indicating reason for deletion wouldn't be bad, either.
If a recipient wanted to explicitly remove it completely from their device, that should also be an option.
That's all we're talking about here, as I understand it -- informing peers that a message deletion has been requested (and, ideally, informing the requester that clients have reported compliance). I don't think there's even a theoretical way of enforcing deletion.
I don't think anyone who uses these apps is under the illusion that it's impossible for someone in the discussion to keep copies of messages that were later deleted. Copy/paste and screenshots are both things that exist.
@woozle @meejah i think it’s fair to accept that some things can’t be avoided, like screenshots. once someone has your data, that’s it, and that’s true of every system. but i can still remove the data from the UI, and from disk. i can make it hard for others to find that data in the future. just because we can’t retroactively purge all instances of that byte arrangement across all machines doesn’t mean we should give up on trying to provide a reasonable delete method.
I think we're in strong agreement.
For clarity, my point was that actually ensuring that data is deleted is basically impossible within the given constraints, and was therefore never a goal -- so if anyone is defending "deletes are hard" with an explanation of how difficult it is to ensure that the data is truly deleted, they are... misinterpreting the ask.
...in a way that makes me wonder if they actually misunderstood it, or are just trying to change the subject.
First 100,000 KG Removed From the Great Pacific Garbage Patch
If enough #food could be produced without conventional economics then that would go a long way towards laying the foundation for post-capitalism. I appreciate that we are a very long way off from achieving this.
Any serious opposition to capitalism is going to need to include things like land reform and land redistribution, or the creation of new commons. The Diggers, even though they didn't last long, were onto something.
Skimmed over a pure-Haskell TLS implementation: https://hackage.haskell.org/package/tls
I have no clue whether they got their crypto correct, but nothing looks fishy from a Haskell-coding perspective (easier to tell than for C...).
Seems to be mostly code for (de)serializing TLS communications & negotiating parameters. The crypto algorithms are implemented elsewhere.
I'm a lemming with opinions about python and I deserve cartoons about me!
*A Half-Built Garden* (published today) is Ruthanna Emrys's new novel, a spectacular first-contact novel about complicated utopias and networked conflict - it's a *wild* ride, and a perfect example of one of the smartest structural analyses of science fiction I ever heard:
It's an idea that's been posited for real-world ecosystem management, and that has appeared in other sf, like Karl Schroeder's *Stealing Worlds*:
The people of the dandelion networks use neural interfaces to sense their environments, literally *feeling it* when an ecological process is running smoothly - or going off the rails - and these same sensory augmentations are used to understand the tenor of their networked debates, as well.
Which means the only real reason that Java is considered a compiled language is because the compiler is a separate program from the interpreter...
Professional Python programmer
#twisted #python #tor #infosec #privacy
I re-toot all reasonable replies
"rumoured to be Canadian"
The original server operated by the Mastodon gGmbH non-profit