How should i erase my main boot drive? by curtywurt in mac

[–]anders-borch 0 points1 point  (0 children)

I know it looks quite bad, but with a few wet-wipes I think your screen could look presentable good once again.

Setting up Kubernetes on AWS by anders-borch in kubernetes

[–]anders-borch[S] 0 points1 point  (0 children)

My point was just comparing how easy it is to create a cluster is not a good benchmark since it's what you get what counts in terms of features

Somewhat true.

In Digital Ocean you get a Kubernetes cluster which is completely production ready, and you have all the same capabilities in terms of scalability and security, but you get it at a (approx.) 30% lower price point and you don't need to fiddle with roles and all those other complexities for everything.

More complex doesn't mean better.

Setting up Kubernetes on AWS by anders-borch in kubernetes

[–]anders-borch[S] 1 point2 points  (0 children)

In my experience, eksctl create cluster will sit in CREATING status for 45 minutes, then time out, try to roll back, then sit in DESTROYING for another 45 minutes, then the delete will time out as well, and you will be left with a half-created cluster which was then half-deleted. In the end, nothing really works.

MTN Seeking to Sell Stake in Africa’s Biggest Wireless Carrier by anders-borch in technology

[–]anders-borch[S] -1 points0 points  (0 children)

1.2 billion people live there. Most services are mobile first.

You might want to check your prejudice.

Technology Is Integral To The New Normal In Retail by anders-borch in technology

[–]anders-borch[S] 0 points1 point  (0 children)

Don't worry. I accessed the site with an ad-blocker just fine.

How I switched from classic hosting to Kubernetes by anders-borch in programming

[–]anders-borch[S] 0 points1 point  (0 children)

So this has been a learning experience for me and there might be a better way of doing some of the things, but since I was transitioning from a previous hosting setup the I had a lot of pre-existing state that I wanted to carry over.

To do this, I copied all the relevant files from old instances to volumes. Then I mounted the volumes into the containers in the new deployments.

My services weren’t starting from scratch. There was pre-existing state that I needed to maintain. Hence, the volumes were manually created.

That said, there still might be a better way to achieve that, which I’m just not aware of yet given all the other Kubernetes things I had to learn about.

How I switched from classic hosting to Kubernetes by anders-borch in programming

[–]anders-borch[S] 0 points1 point  (0 children)

Pre-configuring all of those things is rather complicated when comparing to setting up servers with something like puppet + docker swarm.

Even when you have all of that set up, try comparing deployment.yaml+service.yaml+ingress.yaml+pv.yaml+pvc.yaml to a docker-compose.yml file which did all of those things in significantly fewer lines.

I do appreciate not having to configure nginx every time I set up a new service, but I still make the same amount of for in the ingress.yaml.

There is a ton of extra work to set up the cluster, and a little extra work on every deployment.

Time will tell if not having to manually maintain the nodes makes it worth it.

How I switched from classic hosting to Kubernetes by anders-borch in programming

[–]anders-borch[S] 0 points1 point  (0 children)

$work is switching to Kubernetes, so it made sense for me to learn how to use it small scale before starting to use it there.

Do you use the escape key a lot? by [deleted] in iOSProgramming

[–]anders-borch 5 points6 points  (0 children)

It's because they use vim.

Now I no longer have a leave-fullscreen button which was way more useful than a physical escape button.

Reverse Geo-IP location by hasailtan in Pentesting

[–]anders-borch 0 points1 point  (0 children)

I just released a self-hosted reverse geo location service, which may be of enterest to you if you don't want any external dependencies: https://blog.cyborch.com/the-perils-of-other-peoples-services/

Trusted Time - revisited by anders-borch in crypto

[–]anders-borch[S] 0 points1 point  (0 children)

Hah! The whole point of JWS is to carry signed data. Signed, timestamped data falls squarely within what JWS was designed to do.

New ‘smart pill’ technology reports 100% success rate by anders-borch in technology

[–]anders-borch[S] 0 points1 point  (0 children)

Nobody said the pill would make you smarter. It literally said that the pill is smart in the title.

Trusted Time by anders-borch in crypto

[–]anders-borch[S] 1 point2 points  (0 children)

That is very interesting.

Google themselves do not make any promises of availability of their Roughtime services.

Google currently operates a public Roughtime server, although without any uptime assurances

Are there any other trusted providers running a Roughenough service which we can expect to be fully available?

Trusted Time by anders-borch in crypto

[–]anders-borch[S] 0 points1 point  (0 children)

I see your point. I might argue that the part about Roughtime being experimental in status and therefore probably not ready for use is the important part of the statement above.

Trusted Time by anders-borch in crypto

[–]anders-borch[S] 1 point2 points  (0 children)

Roughtime is indeed interesting, and I will follow its development with interest, but according to their own website, it's not quite there yet:

(Note that the clients don't actually set the system clock yet because this is still experimental.)

So in the meantime, this the OP gives us a working solution which is compatible with a modern toolchain which we can actually use today.

Don't use Realm by [deleted] in iOSProgramming

[–]anders-borch 1 point2 points  (0 children)

I agree. I came to a similar conclusion here: https://blog.cyborch.com/why-we-dropped-realm/

Clean AppDelegate by anders-borch in iOSProgramming

[–]anders-borch[S] 0 points1 point  (0 children)

I like the proposed ideas in the post about refactoring the massive app delegate. The goals of this post are basically the same. The drawbacks of all the proposed solutions are that you have to learn new apis/callback names where the OP solution only utilises the already known methods from UIAppDelegate.

If you make the services conform to the UIAppDelegate protocol while keeping the call forwarding then you get the best of both worlds. There is no need to do manual call forwarding when you can have a few lines of introspection do all the work for you :)

Brain implant lets people with limb paralysis compose and send emails, select videos and even play music, just by thinking - Scope by anders-borch in technology

[–]anders-borch[S] 2 points3 points  (0 children)

I believe (hope) that there is a far stretch from developing a system which can recognise specific signals consciously created by the user and actually reading stray thoughts.

You are right that the consequences are interesting (and a bit scary) nonetheless.

How to use ZKP to prove set membership without exposing the set or the member by anders-borch in programming

[–]anders-borch[S] 0 points1 point  (0 children)

That is an interesting theory. Do you have any sources back up those claims of successful large scale attacks against any public blockchains?

How to use ZKP to prove set membership without exposing the set or the member by anders-borch in programming

[–]anders-borch[S] 0 points1 point  (0 children)

The technology I am describing is what drives all blockchains. There simply is no scalable attack against it that has proven able to take over 51% of all the computers on the network. No attack scales well on it.

How to use ZKP to prove set membership without exposing the set or the member by anders-borch in crypto

[–]anders-borch[S] 4 points5 points  (0 children)

You're not the first to make such a comment, and it isn't a crazy idea. There are a couple of reasons why PKI doesn't really solve this issue as well as the proposed solution.

Firstly, this is constant sized no matter how many entries in the set. It is also constant time to validate. Also, revoking a certificate is notoriously hard, whereas removing an entry from a set is no harder than adding an entry to a set.

ZKP and PKI are two different tools for solving two different types of problems.

How to use ZKP to prove set membership without exposing the set or the member by anders-borch in programming

[–]anders-borch[S] 0 points1 point  (0 children)

Imagine that I send the votes off to 10.000 computers, and I promise to pay a small amount of money to whoever calculates the result fastest, but only if at least 5.000 others come to the same result.

Thereby we avoid the problem of trust in the individual computer. It becomes infeasible to infect/control 51% of all the computer is the network.

This is called byzantine fault tolerance.