But the things doing the testing could be bots instead of human actors, so it may very well be that no human does in fact know.
I work in I.T. and am interested in every sub-field. I also study English, Spanish, German, French, Koine Greek, Latin, Mandarin & Swahili. I’m interested in human culture.
I like Linux, but mainly use Windows because of work.
But the things doing the testing could be bots instead of human actors, so it may very well be that no human does in fact know.
That is the real dead Internet theory: everything from production to malicious actors to end users are all ai scripts wasting electricity and hardware resources for the benefit of no human.
Obviously hand coded. After all, he just discovered that there are people, or more probably bots, who will use open resources for their own uses.
This makes a really good point. If the U.S. government’s security has been breached, which apparently it has, then no other nation will trust their data to be valid at all.
This is a good question. On your home network, that’s pretty easy. On other networks, setting up a VPN that tunnels to your network seems like it should work.
That’s true. Let the largest BGP routers go down for 5 minutes and any demands the people who run them have would be met.
Increasing the CPU optimization by 0.02% does seem crazy to me. If you’re going to spend time working on something, make it worthwhile. Also, isn’t while(true) {print(money)} Microsoft, Apple and Amazon:s business model?
That sounds more like Gentoo. With Arch, you at least get the foundation with plumbing and electrical run to the site.
Good point! Thanks for pointing that out.