Guest User

Untitled

a guest
Sep 5th, 2024
124
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.13 KB | None | 0 0
  1. dzwdz@fleshwing:/tmp/lobs$ diff -C 1 old.txt new.txt
  2. *** old.txt 2024-09-05 19:35:57.949201336 +0200
  3. --- new.txt 2024-09-05 19:35:51.805113042 +0200
  4. ***************
  5. *** 161,173 ****
  6. 15 This is reminding me of a quote:
  7. - 13 >Then instead of testing all of that shit every time we built something from
  8. - . 6 Gentoo had that a feature (search "portage feature confcache"). But as far
  9. - . 5 > maybe it’s that people would rather write rants about autoconf than do an
  10. - . 4 It used to be more common 25 years ago but once you got a wrong entry, it w
  11. - 9 I don't think you can have a simple notation that declares what is supported
  12. - 8 Is backdooring a software package a criminal act in <your, the committer's co
  13. - . 8 IANAL, but in the US this is covered by [18 USC 1030 (b)](https://uscode.ho
  14. - . . 1 Does this cover giving away code for free on the internet? I suppose may
  15. - . . . 9 According to this [comment on HN](https://news.ycombinator.com/item?id=
  16. - . . . 2 I don't think you can unwillingly conspire. If someone hacks your compu
  17. - . . . . 2 > I don’t think you can unwillingly conspire. If someone hacks your c
  18. 14 > Why didn't we end up with a situation where it was just a standard thing t
  19. --- 161,162 ----
  20. ***************
  21. *** 197,198 ****
  22. --- 186,198 ----
  23. . 1 I wonder what this tcc configure script magic is for…
  24. + 13 >Then instead of testing all of that shit every time we built something from
  25. + . 6 Gentoo had that a feature (search "portage feature confcache"). But as far
  26. + . 5 > maybe it’s that people would rather write rants about autoconf than do an
  27. + . 4 It used to be more common 25 years ago but once you got a wrong entry, it w
  28. + 9 I don't think you can have a simple notation that declares what is supported
  29. + 8 Is backdooring a software package a criminal act in <your, the committer's co
  30. + . 8 IANAL, but in the US this is covered by [18 USC 1030 (b)](https://uscode.ho
  31. + . . 1 Does this cover giving away code for free on the internet? I suppose may
  32. + . . . 9 According to this [comment on HN](https://news.ycombinator.com/item?id=
  33. + . . . 2 I don't think you can unwillingly conspire. If someone hacks your compu
  34. + . . . . 2 > I don’t think you can unwillingly conspire. If someone hacks your c
  35. 6 Where possible, it makes sense to guard access to sshd beind a simpler daemon
  36. ***************
  37. *** 247,248 ****
  38. --- 247,249 ----
  39. 4 This essay is odd in the way it poses "skin in the game" as an one-way deal.
  40. + 4 I once found an autoconf/automake tutorial after having been mystified by the
  41. 3 I’d love to be wrong but I just don’t see anyone actually catching #xz withou
  42. ***************
  43. *** 260,263 ****
  44. 3 Seems that this hack had an extensions system already in place https://gynva
  45. - 4 I once found an autoconf/automake tutorial after having been mystified by the
  46. - -10 Comment removed by author
  47. 2 This Bluesky post from security expert Filippo Valsorda adds useful additiona
  48. --- 261,262 ----
  49. ***************
  50. *** 311 ****
  51. --- 310,311 ----
  52. 1 > The first difference is that the script makes sure (very sure!) to exit if
  53. + -10 Comment removed by author
  54.  
Advertisement
Add Comment
Please, Sign In to add comment