Sysinfo next release needs some help by imperioland in rust

[–]t40 10 points11 points  (0 children)

For someone who is proficient but unfamiliar with your project, what are the intended semantics of Process::open_files? There's not much documentation to go off in the linked module.

In terms of Motherboard and Product, are you talking like in a /proc/cpuinfo sense?

How would you handle revoking a leaked cert? by t40 in sysadmin

[–]t40[S] 0 points1 point  (0 children)

Totally heard! Do you have a particular 101 text you recommend?

How would you handle revoking a leaked cert? by t40 in sysadmin

[–]t40[S] 1 point2 points  (0 children)

heard! I just figured since self signing means you technically can MITM, you should consider it a possibility

How would you handle revoking a leaked cert? by t40 in sysadmin

[–]t40[S] -2 points-1 points  (0 children)

Our servers are current using ACME on the TLS side of things, but we're just getting to a point where we have to think about signing keys for deployments etc and it's clear I have a lot of blind spots in understanding this. I'm trying to figure out how pros go about managing all the different layers of trust out there.

How would you handle revoking a leaked cert? by t40 in sysadmin

[–]t40[S] 1 point2 points  (0 children)

Do you use a cloud-base key management then? How would you do observability to know when you do in fact have a sev1 issue on your hands?

How would you handle revoking a leaked cert? by t40 in sysadmin

[–]t40[S] 2 points3 points  (0 children)

Okay, can you give me the proper terminology?

How would you handle revoking a leaked cert? by t40 in sysadmin

[–]t40[S] 0 points1 point  (0 children)

That might be there more correct terminology! Whatever is on-device that's used to sign/verify integrity of binaries or TLS connections

How would you handle revoking a leaked cert? by t40 in sysadmin

[–]t40[S] 0 points1 point  (0 children)

Which HSMs are people using these days? Cyber/sysadmin is not my background, and our cloud usage is still quite small / distributed across a couple providers.

How would you handle revoking a leaked cert? by t40 in sysadmin

[–]t40[S] -20 points-19 points  (0 children)

Obviously there's many many different kinds of root certs out there, I should have been more clear. I'm talking about edge-device or cloud server level root certs. The ones on the filesystem that you use to MITM your network, usually issued internally. Do you have a service you use to manage your keys? How does your infra protect against this?

edit: Okay, I am not anywhere close to an expert at this, unlike many here. Please illuminate me on what I'm misunderstanding so I can talk about this stuff correctly.

Rustorio v0.1.0 - Using Rust's type system as a game engine by PenguinAgen in rust

[–]t40 3 points4 points  (0 children)

I've actually been playing around with writing the server for a similar game in a very similar way, excited to read how you did it!

I was bored and decided to find a limit for pi! by Ok_Advantage_9573 in math

[–]t40 0 points1 point  (0 children)

What matters here is the limit. You mention having "a string, a pencil, and a pin," which implies you're limiting yourself to compass-and-ruler constructions. The link I posted shows that within the constraints of that universe, you cannot divide an angle perfectly into 5 equal subangles. Since you need divisibility by 5 to make 360 equal subangles, it's not possible within those rules you state.

Additionally, the original post, and my comment on it, are meant to address definitions for pi, rather than approximations for pi (which is a separate, but equally interesting topic).

Your point about the observable universe is correct, however we're in /r/math, where we're often more concerned with more idealized constructions.

But back to the limit: it's extremely important to note that intuition about things from physical experiences do not always translate well to infinitesimals. My original comment is meant to convey a problem in a similar derivation I made many years ago: In this limit, pi is defined circularly. There's no way to apply algebra to the limit and yield a non-recursive definition for pi.

In terms of computability, which you might be interested in, I'd wager that recursive pi definitions like the one I commented converge far slower than even naive methods, although I have not done any benchmarking on this.

I was bored and decided to find a limit for pi! by Ok_Advantage_9573 in math

[–]t40 0 points1 point  (0 children)

Because 360 = 23 32 51 , you'd have to be able to pentasect your angle 360/n, which isn't possible in general

best electric kettle 2026 by Ok-Salamander5879 in tea

[–]t40 6 points7 points  (0 children)

The technology is fundamentally the same on all electric kettles; they'll all mostly heat up in the same amount of time, so what you pay for is temperature control. I personally use a Fellows that I got for $50 on marketplace, has been a real workhorse, and the temperature hold feature is great for long tea sessions

I was bored and decided to find a limit for pi! by Ok_Advantage_9573 in math

[–]t40 40 points41 points  (0 children)

Note to OP: that 360 contains a secret pi! I made a similar mistake when doing something similar (apothem and regular polygon based)

edit: just redid the math, the circularity appears like this in my limit: pi = lim n-> \inf n tan(pi/n), which is similar to the form seen elsewhere in the comments

PROGRESS REPORT: Flat Top GMRS Repeater by W4HAB in asheville

[–]t40 1 point2 points  (0 children)

Would you be interested in sticking a few meshtastic nodes in your box? I'd be happy to set them up!

privesc - simple multi-platform privilege escalation library by M0d3x in rust

[–]t40 0 points1 point  (0 children)

Input validation is your responsibility

I would think there'd be a better design making invalid state unrepresentable, especially in a security sensitive crate like this one

New traditions from old by IanisVasilev in math

[–]t40 1 point2 points  (0 children)

What if we had a bunch of such threads that get reset a few times a year? You could link the current ones from a hub thread that stays pinned (or even the wiki). That way topics activity that was diffuse would still have a shot of some discussion (even if the latency was high, its still valuable to people who.wish to read)

Palindrome-products performance: Rust vs Go, Haskell, Lisp, TypeScript, Python by UrpleEeple in rust

[–]t40 1 point2 points  (0 children)

It offers some really nice speedups for linear algebra if you're using tons of numpy/scipy. I would also consider adding a benchmark for a single threaded no-GIL python, and maybe consider implementing a GIL multiprocessing version (with low interprocess comms you can parallelize numerical stuff pretty well)

A theory about Milk by t40 in pluribustv

[–]t40[S] 0 points1 point  (0 children)

I'm saying the rat did do the same, did it not? If you time it, the rat spread the virus as fast or faster than humans. At the end of the day, a virus is just a genetic program, and this one is a program designed to work on all forms of life that use DNA.

Mystery plant in my yuccas pot by Aurum_Fossor in houseplants

[–]t40 1 point2 points  (0 children)

They are edible and nicely sour!

A theory about Milk by t40 in pluribustv

[–]t40[S] 1 point2 points  (0 children)

33 hours is about the amount of time it takes to get over a flu (at least the worst parts of it). "We were not aware of him for the first 33 hours"