1 |
On Thu, 5 Sep 2013 04:54:46 +0000 (UTC) |
2 |
Duncan <1i5t5.duncan@×××.net> wrote: |
3 |
|
4 |
> Kent Fredric posted on Wed, 04 Sep 2013 23:38:40 +1200 as excerpted: |
5 |
> |
6 |
> > I see. I have a few gvim instances also reading/writing to that |
7 |
> > terminal I didn't know about, interesting. |
8 |
> |
9 |
> Which brings up the privacy point. |
10 |
|
11 |
Not really, because those instances wouldn't appear in logs. |
12 |
|
13 |
> Anything getting this fancy and convoluted in terms of |
14 |
> implementation is going to have to be very careful to narrow the |
15 |
> scope of what it's looking at, lest it become the NSA in terms of |
16 |
> dragnet. |
17 |
|
18 |
It would be narrowed down to just the processes of the log; so, I don't |
19 |
think anything special needs to be done. |
20 |
|
21 |
> Even then, how many people would REALLY trust it, knowing |
22 |
> the lengths to which it has to go to narrow down and focus in on JUST |
23 |
> the info it needs? I don't think I'd trust it, for the same reason I |
24 |
> don't trust the NSA doing similar things under "just trust us" |
25 |
> pretenses. Would YOU? (Granted, our implementation would presumably |
26 |
> be open, something the NSA most certainly is NOT, but still...) |
27 |
|
28 |
You already put trust in us; a tiny feature difference that doesn't |
29 |
really reveal anything (compared to eg. `emerge --info --verbose`), |
30 |
isn't going to make a difference in that. |
31 |
|
32 |
-- |
33 |
With kind regards, |
34 |
|
35 |
Tom Wijsman (TomWij) |
36 |
Gentoo Developer |
37 |
|
38 |
E-mail address : TomWij@g.o |
39 |
GPG Public Key : 6D34E57D |
40 |
GPG Fingerprint : C165 AF18 AB4C 400B C3D2 ABF0 95B2 1FCD 6D34 E57D |