On Thu, 5 Sep 2013 04:54:46 +0000 (UTC) Duncan <[email protected]> wrote:
> Kent Fredric posted on Wed, 04 Sep 2013 23:38:40 +1200 as excerpted: > > > I see. I have a few gvim instances also reading/writing to that > > terminal I didn't know about, interesting. > > Which brings up the privacy point. Not really, because those instances wouldn't appear in logs. > Anything getting this fancy and convoluted in terms of > implementation is going to have to be very careful to narrow the > scope of what it's looking at, lest it become the NSA in terms of > dragnet. It would be narrowed down to just the processes of the log; so, I don't think anything special needs to be done. > Even then, how many people would REALLY trust it, knowing > the lengths to which it has to go to narrow down and focus in on JUST > the info it needs? I don't think I'd trust it, for the same reason I > don't trust the NSA doing similar things under "just trust us" > pretenses. Would YOU? (Granted, our implementation would presumably > be open, something the NSA most certainly is NOT, but still...) You already put trust in us; a tiny feature difference that doesn't really reveal anything (compared to eg. `emerge --info --verbose`), isn't going to make a difference in that. -- With kind regards, Tom Wijsman (TomWij) Gentoo Developer E-mail address : [email protected] GPG Public Key : 6D34E57D GPG Fingerprint : C165 AF18 AB4C 400B C3D2 ABF0 95B2 1FCD 6D34 E57D
signature.asc
Description: PGP signature
