You can weed these people out with basically any question. "What's the difference between an inner join and an outer join". These guys always sound like they're reading out of a textbook.
What? They reused public packages that have been public for years. One guy made a public fork with some changes. Is that not what open source is intended for?
I think he’s saying that if their intent was to not get caught which you’d assume, they could have made a private repo instead of a public fork tied to a doge account
You misunderstand, open source is bad actually, when the heckin cheeto man is the one doing it.
Just as its only worth complaining about geriatric geezers in office until the cheeto man brings in young hackers, then the problem is that "the old impaired people were good, actually".
Don't observe. Don't think. Merely repeat the approved message.
> The Party told you to ignore the evidence of your eyes and ears. It was their final, most essential command.
Do domain names matter any more? What you need is a unique business name. Don't just name your app "bear" or something, because people are going to get search results for actual bears.
They describe the whole ceremony the guys go through to generate the random secret key that seeds their algorithm and needs to be kept secret in order to prevent anybody from counterfeiting coins. It was an elaborate setup supposedly designed to prevent people from observing any details they might be able to use to reverse engineer the algorithm. But, despite all their insistance on bespoke cloak and dagger shit, there were a lot of times the process could have been broken:
- They're supposed to be driving to a randomly selected electronics store to buy the laptop that will generate the number; but the guy makes an "unscheduled" stop at a costume store so he can buy a wizard hat (and potentially hand off information with a third party who wants to know their destination, or to pick up some kind of surveillance device)
- When the time comes to type random numbers on the laptop keyboard, the guy covers his hands and the keyboard. Arguable pro there is that nobody can see which keys he touches, but the big obvious con is that he can slip that USB device he picked up at the costume shop into one of the USB ports.
- People are using their phones while this whole process is going on? Ok, seems counterproductive to all that paranoid security they were trying to have...
- Oh look, they noticed strange indicators that strongly suggested somebody's phone got hacked and was being used to spy on their skype conversation? Somebody that paranoid should have immediately shut the process down and restarted it at a later date. They didn't do that? Something sure is fishy with the guy running this thing.
Here's Peter Todd's writeup of his part in the setup ceremony: https://petertodd.org/2016/cypherpunk-desert-bus-zcash-trust... . For what it's worth, he was completely physically separate from anyone else in the ceremony, and no such shenanigans are described in his part of it. As long as any one of the 9 did their part correctly, then it's good. His writeup is not without criticism of the Zcash system though.