I am a weirdy, I guess. I prefer to do struct/enum first with method/functions/impls associated with the struct following, then add the next struct, etc.
You don't have any evidence to disprove him, so instead you attempt to attack his character? Where did you learn to debate?! Logical fallacies prove nothing! Jack bases his claims off evidence, inviting people to learn for themselves.
How is attestation being performed to prove the integrity of the file? How are you addressing stale file states (file gets removed from one source, but before the deletion is reported to the network, another person downloads it)? Do you have plans to allow sealing the content for specified users?
I would disagree with you opinion of it not being broken. It does work, but it has some painful flaws. If people switch to age, the argument could be reversed as far as popularity.
The JVM has the String pool. An area of memory which is NEVER garbage collected. It only cleans itself on heap dump or application restarts. Unless you are encrypting client-side, your PII and credentials are stored in plain text in memory. #NoMoreJava
That gets a little complicated. The short answer is yes, but the are not any security measures preventing heap dumps from memory access violations. If your application is on the device, it can cause a dump and grab the info from it.
Neither. This is a weakness in how the JVM responds to invalid memory access. While there are some security issues existing in the LXC namespace, they do not correlated with this issue.
Why? The internal construction would be abysmal to set up... How will you handle insulation or HVAC? It is cool in theory, but the long-term ramifications would be very costly.
I like PGP, and suggest it to people often, but lately I have been suggesting age as my defacto. Especially with rage (rust implementation) being available. https://github.com/str4d/rage
An unpopular opinion, but I will never trust WhatsApp. In fact, I frequently will evangelize against using it. Never trust a "secure" app which allows a company to "recover" your data. True end-to-end encryption is entirely in the hands of the user. No metadata, no tracking, no identification, and certainly no server-side "recovery." You are much better off using Signal, Telegram (with encryption enabled), Element (Matrix), SimpleX Chat, or a Nostr client.
Notes by eb7246eb | export