On Thu, 5 Sep 2013 04:54:46 +0000 (UTC)
Duncan <[email protected]> wrote:

> Kent Fredric posted on Wed, 04 Sep 2013 23:38:40 +1200 as excerpted:
> 
> > I see. I have a few gvim instances also reading/writing to that
> > terminal I didn't know about, interesting.
> 
> Which brings up the privacy point.

Not really, because those instances wouldn't appear in logs.

> Anything getting this fancy and convoluted in terms of
> implementation is going to have to be very careful to narrow the
> scope of what it's looking at, lest it become the NSA in terms of
> dragnet.

It would be narrowed down to just the processes of the log; so, I don't
think anything special needs to be done.

> Even then, how many people would REALLY trust it, knowing
> the lengths to which it has to go to narrow down and focus in on JUST
> the info it needs?  I don't think I'd trust it, for the same reason I
> don't trust the NSA doing similar things under "just trust us"
> pretenses.  Would YOU? (Granted, our implementation would presumably
> be open, something the NSA most certainly is NOT, but still...)

You already put trust in us; a tiny feature difference that doesn't
really reveal anything (compared to eg. `emerge --info --verbose`),
isn't going to make a difference in that.

-- 
With kind regards,

Tom Wijsman (TomWij)
Gentoo Developer

E-mail address  : [email protected]
GPG Public Key  : 6D34E57D
GPG Fingerprint : C165 AF18 AB4C 400B C3D2  ABF0 95B2 1FCD 6D34 E57D

Attachment: signature.asc
Description: PGP signature

Reply via email to