50 Matching Annotations
  1. Last 7 days
    1. Affective forecasting is the process by which we attempt to pre-dict how we will feel in the future. One of the ways we fail at this task is called the end of history illusion,which suggests that we’re well aware of how much we’ve changed in the past ten years, but we imagine that that’s it—we’re done changing. When asked how much we think we’ll change in the next ten years, we assume we’re done.
  2. Jun 2020
    1. As billions of conversations transition online over the coming weeks and months, the widespread adoption of end-to-end encryption has never been more vital to national security and to the privacy of citizens in countries around the world.
    2. Proponents of this bill are quick to claim that end-to-end encryption isn’t the target. These arguments are disingenuous both because of the way that the bill is structured and the people who are involved.
    3. For a political body that devotes a lot of attention to national security, the implicit threat of revoking Section 230 protection from organizations that implement end-to-end encryption is both troubling and confusing. Signal is recommended by the United States military. It is routinely used by senators and their staff. American allies in the EU Commission are Signal users too. End-to-end encryption is fundamental to the safety, security, and privacy of conversations worldwide.
    4. The EARN IT act turns Section 230 protection into a hypocritical bargaining chip. At a high level, what the bill proposes is a system where companies have to earn Section 230 protection by following a set of designed-by-committee “best practices” that are extraordinarily unlikely to allow end-to-end encryption. Anyone who doesn’t comply with these recommendations will lose their Section 230 protection.
    1. Matrix provides state-of-the-art end-to-end-encryption via the Olm and Megolm cryptographic ratchets. This ensures that only the intended recipients can ever decrypt your messages, while warning if any unexpected devices are added to the conversation.
    1. More than two billion users exchange an unimaginable volume of end-to-end encrypted messages on WhatsApp each day. And unless an endpoint (phone) is compromised, or those chats are backed-up into accessible cloud platforms, neither owner Facebook nor law enforcement has a copy of those encryption keys.
    1. “End-to-end encryption,” NSA says, “is encrypted all the way from sender to recipient(s) without being intelligible to servers or other services along the way... Only the originator of the message and the intended recipients should be able to see the unencrypted content. Strong end-to-end encryption is dependent on keys being distributed carefully.” So, no backdoors then.
    2. On April 24, the U.S. National Security Agency published an advisory document on the security of popular messaging and video conferencing platforms. The NSA document “provides a snapshot of best practices,” it says, “coordinated with the Department of Homeland Security.” The NSA goes on to say that it “provides simple, actionable, considerations for individual government users—allowing its workforce to operate remotely using personal devices when deemed to be in the best interests of the health and welfare of its workforce and the nation.” Again somewhat awkwardly, the NSA awarded top marks to WhatsApp, Wickr and Signal, the three platforms that are the strongest advocates of end-to-end message encryption. Just to emphasize the point, the first criteria against which NSA marked the various platforms was, you guessed it, end-to-end encryption.
    3. And while all major tech platforms deploying end-to-end encryption argue against weakening their security, Facebook has become the champion-in-chief fighting against government moves, supported by Apple and others.
    4. While this debate has been raging for a year, the current “EARN-IT’ bill working its way through the U.S. legislative process is the biggest test yet for the survival of end-to-end encryption in its current form. In short, this would enforce best practices on the industry to “prevent, reduce and respond to” illicit material. There is no way they can do that without breaking their own encryption. QED.
    1. One thing that would certainly be a game-changer would be some form of standardized RCS end-to-end encryption that allows secure messages to be sent outside Google Messages.
    2. You should not use a messaging platform that is not end-to-end encrypted, it really is as simple as that.
    3. The answer, of course, is end-to-end encryption. The way this works is to remove any “man-in-the-middle” vulnerabilities by encrypting messages from endpoint to endpoint, with only the sender and recipient holding the decryption key. This level of messaging security was pushed into the mass-market by WhatsApp, and has now become a standard feature of every other decent platform.
    1. Just like Blackberry, WhatsApp has claimed that they are end to end encrypted but in fact that is not trueWhatsApp (and Blackberry) decrypt all your texts on their servers and they can read everything you say to anyone and everyoneThey (and Blackberry) then re-encrypt your messages, to send them to the recipient, so that your messages look like they were encrypted the entire time, when in fact they were not
    2. The only messaging app that has been proven, by an independent authoritative agency, is Apple’s Messages app (which uses Apple’s iMessage protocol that is truly end to end encrypted, Apple cannot read any of your texts which means that no one can read any of your texts)
  3. Apr 2020
  4. Nov 2019
    1. Tests implementation details a bit (child component props received), but pretty good other than that.

      https://www.robinwieruch.de/react-testing-tutorial, for example, says that is reasonable to do:

      an integration test could verify that all necessary props are passed through from the tested component to a specific child component.

  5. Jul 2019
    1. If you are an aspiring a developer or an entrepreneur interested to learn about Backend vs Frontend Programming Languages & Frameworks, you are in the right place. This blog will help you understand what are the basic differences between frontend and backend technologies.

      What's the difference between Frontend Vs Backend? The backend consists of a server, application, and database. The frontend is the look & feel of website or application.

  6. Feb 2019
    1. Once society is shattered, however, the process begins anew.

      Very interesting to think about -- this notion that the end of something, its ruin, may not actually be an end after all, but rather a beginning. Wow.

  7. Sep 2018
  8. Aug 2018
    1. Paul Kennedy's hugely successful The Rise and Fall of the Great Powers, which ascribes the decline of great powers to simple economic overextension.

      Curious how this may relate to the more recent "The End of Power" by Moisés Naím. It doesn't escape one that the title of the book somewhat echoes the title of this particular essay.

  9. Sep 2017
    1. The point of political protest is to change the world. And yet the process matters, too.
    2. To live in the present is not to avoid hard work or strife. Alongside the projects that occupy you in your profession, or in your political life, the telic activities that matter to you, is the atelic process of protesting injustice or doing your job. To value the process is not to flee from work or political engagement. That is why living in the present is not an abdication of ethical responsibility or a recipe for detachment.
    3. To live in the present is not to deny the value of telic activities, of making a difference in the world. That would be a terrible mistake. Nor can we avoid engaging in such activities. But if projects are all we value, our lives become self-subversive, aimed at extinguishing the sources of meaning within them. To live in the present is to refuse the excessive investment in projects, in achievements and results, that sees no inherent value in the process.
    4. To live in the present is to appreciate the value of atelic activities like going for a walk, listening to music, spending time with family or friends. To engage in these activities is not to extinguish them from your life. Their value is not mortgaged to the future or consigned to the past, but realized here and now. It is to care about the process of what you are doing, not just projects you aim to complete.
    5. “If you are learning, you have not at the same time learned.” When you care about telic activities, projects such as writing a report, getting married or making dinner, satisfaction is always in the future or the past. It is yet to be achieved and then it is gone. Telic activities are exhaustible; in fact, they aim at their own exhaustion. They thus exhibit a peculiar self-subversion. In valuing and so pursuing these activities, we aim to complete them, and so to expel them from our lives.
    6. Atelic activities, by contrast, do not by nature come to an end and are not incomplete. In defining such activities, we could emphasize their inexhaustibility, the fact that they do not aim at terminal states. But we could also emphasize what Aristotle does: They are fully realized in the present. “At the same time, one is seeing and has seen, is understanding and has understood, is thinking and has thought.” There is nothing you need to do in order to perform an atelic activity except what you are doing right now. If what you care about is reflecting on your life or spending time with family or friends, and that is what you are doing, you are not on the way to achieving your end: You are already there.
  10. Aug 2017
    1. Most of the UI (user interface) elements we needed already existed in our toolkit of parts, with a few modifications.

      example of a good reason to use a modular component-based approach / styleguide

  11. Feb 2017
    1. required guidelines

      FORCING us to keep track of our annotations is OPPRESSIVE and SILENCES our organic voice and STIFLES creative thinking.

  12. Jan 2017
    1. And hence we see that, in the interpretation of laws, whether divine or human, there is no end; comments beget com• ments, and explications make new matter for ex-plications; and of limiting, distinguishing, vary-ing the signification of these moral words there is no end.

      "There is no end." Another useful way to think through rhetoric in light of Muckelbauer.

      But, of course, there are often temporary ends achieved.

  13. Oct 2016
    1. He passed the stages of his age and youth

      Changing over the years, these different stages he encountered are his memories from his past. Up and down and back and forth. Ultimately ending in death.

  14. Sep 2016
    1. If efficiency incentives and tools have been effective for utilities, manufacturers, and designers, what about for end users? One concern I’ve always had is that most people have no idea where their energy goes, so any attempt to conserve is like optimizing a program without a profiler.
  15. Oct 2013
    1. They speak falsely, however, in this respect likewise, for we have already shown that oratory has an end and have stated what that end is, an end which the true orator will always attain, for he will always speak well.

      Refuting past philosophers, especially Plato. It has a subject and end, both of which are speaking well

    1. The end of democracy is freedom; of oligarchy, wealth; of aristocracy, the maintenance of education and national institutions; of tyranny, the protection of the tyrant.

      Various ends of government.