Gregory Maxwell [ARCHIVE] on Nostr: 📅 Original date posted:2014-08-19 📝 Original message:On Tue, Aug 19, 2014 at ...
📅 Original date posted:2014-08-19
📝 Original message:On Tue, Aug 19, 2014 at 6:26 PM, Troy Benjegerdes <hozer at hozed.org> wrote:
> If a project cannot be organized enough to run its own hosting/web presense/
> counterintelligence/security that starts with installing an OS and patching
> kernels, then it is really not wise for me to trust my financial future to
> software written by such a group.
Please take the hyperbole elsewhere. Good dialog it's going to happen
with the insults and adhomenem.
Regardless of where the repositories live their integrity is protected
by digital signatures and cryptographic hashes. Running them elsewhere
can be virtuous for other reasons, but it doesn't play much into this
since the same tools must be used to guarantee their security.
Published at
2023-06-07 15:25:28Event JSON
{
"id": "ad7da89994ddd2a63ca50c6bcb8794275daeae527935ffeeccc8a8d6ad4ed861",
"pubkey": "4aa6cf9aa5c8e98f401dac603c6a10207509b6a07317676e9d6615f3d7103d73",
"created_at": 1686151528,
"kind": 1,
"tags": [
[
"e",
"c005f45b1cb77392a2804d02a4c758eb9ca30d9af3fd9e762780478d5aeddb7a",
"",
"root"
],
[
"e",
"2ad92798b0491dd8680a0d96853ade13421320e57ae746c718f923fbcc896c91",
"",
"reply"
],
[
"p",
"de834b230daa8e6d04c44e51929c52dfdc36dc2f4105a0b67060d9dfc30d6ccc"
]
],
"content": "📅 Original date posted:2014-08-19\n📝 Original message:On Tue, Aug 19, 2014 at 6:26 PM, Troy Benjegerdes \u003chozer at hozed.org\u003e wrote:\n\u003e If a project cannot be organized enough to run its own hosting/web presense/\n\u003e counterintelligence/security that starts with installing an OS and patching\n\u003e kernels, then it is really not wise for me to trust my financial future to\n\u003e software written by such a group.\n\nPlease take the hyperbole elsewhere. Good dialog it's going to happen\nwith the insults and adhomenem.\n\nRegardless of where the repositories live their integrity is protected\nby digital signatures and cryptographic hashes. Running them elsewhere\ncan be virtuous for other reasons, but it doesn't play much into this\nsince the same tools must be used to guarantee their security.",
"sig": "bde2aceb9a4f2e56e226f0d55a9feef51af41aa40467a7f541e75786cec17c08a1298765e146a21f223a0e7c59ca7ab35d9a9a7ea9cd867129323eaebacff437"
}