Cryptogopher / Go cryptography maintainer
Professional open source maintainer
https://filippo.io / https://github.com/FiloSottile
https://mkcert.dev / https://age-encryption.org
https://sunlight.dev / https://filippo.io/newsletter
Touch-friendly tap-to-definition/references with jump stacks.
Semantic-equivalent refactoring into more understandable code, or input/range propagation.
Cross-codebase identifier coloring.
So many things could be tried.
Touch-friendly tap-to-definition/references with jump stacks.
Semantic-equivalent refactoring into more understandable code, or input/range propagation.
Cross-codebase identifier coloring.
So many things could be tried.
Mermaid diagrams are great to write in text, but then we look at them as rendered.
Mermaid diagrams are great to write in text, but then we look at them as rendered.
Doesn't mean we need to look at them in that format!
SQLite database pages are easy to query, but we generally don't dump them in a B-Tree on the screen.
Doesn't mean we need to look at them in that format!
SQLite database pages are easy to query, but we generally don't dump them in a B-Tree on the screen.
Reverse engineering tools are light-years ahead of the tools we use to look at well-structured typed code.
Reverse engineering tools are light-years ahead of the tools we use to look at well-structured typed code.
For example, it's incredible to me that there is no iPad app that does LSP features plus bookmarks, navigation tree, etc.
Maybe now that LLMs made it more people's job to read code, we'll get good code reading tools?
For example, it's incredible to me that there is no iPad app that does LSP features plus bookmarks, navigation tree, etc.
Maybe now that LLMs made it more people's job to read code, we'll get good code reading tools?
Having explained the problem a number of times, I finally decided to write it down so now I can just share a link.
Having explained the problem a number of times, I finally decided to write it down so now I can just share a link.
github.com/FiloSottile/...
github.com/FiloSottile/...
This means my home office now has an Ampere Altra 64-core NAS with 96 TB HDD, a Dell PowerEdge R6515, a Milk-V Jupiter RISC-V 64-bit, redundant fiber, a Turris Omnia, a USB Armory, and an Enigma replica. And a MacBook.
This means my home office now has an Ampere Altra 64-core NAS with 96 TB HDD, a Dell PowerEdge R6515, a Milk-V Jupiter RISC-V 64-bit, redundant fiber, a Turris Omnia, a USB Armory, and an Enigma replica. And a MacBook.
You just can’t have Claude resume halfway its own turn.
You just can’t have Claude resume halfway its own turn.
A few "DSD TECH MagicConn" USB-C + PD trigger + barrel power jack all-in-one cables.
One spare USB-C PD trigger board for a manual mod.
One dumb USB-C to barrel for 5V.
A few "DSD TECH MagicConn" USB-C + PD trigger + barrel power jack all-in-one cables.
One spare USB-C PD trigger board for a manual mod.
One dumb USB-C to barrel for 5V.
I was worried about (1) but I got lucky on the first power supply I got. Otherwise I was planning to return it and try another one.
I was worried about (1) but I got lucky on the first power supply I got. Otherwise I was planning to return it and try another one.
It might be the most satisfying thing I've done all year.
It might be the most satisfying thing I've done all year.
The risk is collect-now-decrypt-later attacks.
Again if we only changed the default in response to CVEs we’d have the same defaults as 2014.
You can keep an old go.mod version, or just not use the defaults. (Or get a correct TLS implementation.)
The risk is collect-now-decrypt-later attacks.
Again if we only changed the default in response to CVEs we’d have the same defaults as 2014.
You can keep an old go.mod version, or just not use the defaults. (Or get a correct TLS implementation.)
Otherwise Go would have the same defaults it had in 2014.
Otherwise Go would have the same defaults it had in 2014.