Isn’t it a bit disingenuous to equivocate terrorism, which actively targets/kills innocent civilians, with DDOS attacks against services which are responsible for moral atrocities? Could it be compared to vigilante justice? Perhaps. But comparing it to terrorism is unfair, to put it mildly.
In many (most?) manufacturing industries there is an upper limit on export product performance. If you make steel, there are a bunch of types/grades subject to limits related to their use in nuclear technology. If you make microphones there is a limit on those that might be used in sonar arrays. Certainly all manner of limits exist in aerospace. Even game consoles have been limited (Iran). This is not an unusual regulation.
Even travel for US citizens was restricted. I have relatives who were in the semiconductor and aerospace industries during the 1980s. They were advised by the government to not attempt to travel to the Eastern Bloc. Some kinda related reading:
I knew about the previous cryptography restrictions, but I also knew that the Supreme Court overruled them by ruling (as I understand it) that “code is speech”. I’ll have to check out the other links though
The opposite was of course done when the US sold a ton of Xeon Phi accelerators to China when they built the Tianhe-2 supercomputer.
My favourite conspiracy theory is that this was done deliberately by the US, since Xeon Phi was a large pile of steaming turd, so the Chinese wasted money on a machine with high theoretical FLOPS but crappy real world performance, and also wasted the time of their scientists and programmers who were porting code to a programming paradigm that went nowhere fast.
Apple made a fairly big deal of the fact that the G5 processor, when they started putting it into their machines (or maybe it was when they went to dual G5s?), had just recently stopped being export-controlled by virtue of being classified as a "supercomputer".
(What really happened was that the Feds revised the definition of "supercomputer", and suddenly the G5 configuration they were using didn't qualify anymore... it had nothing to do with anything Apple did, except perhaps lobbying for it so they could build computers in China.)
There was also a ban export of strong cryptography. So Java couldn’t use string ciphers and algorithms without adding some additional jar which basically just turned the `enableStrongEncryption` flag on. This isn’t necessary anymore but I don’t know what changed legally.
I believe this is what changed legally:
> One of EFF's first major legal victories was Bernstein v. Department of Justice, a landmark case that resulted in establishing code as speech and changed United States export regulations on encryption software, paving the way for international e-commerce
Let's not forget that these policies fostered the development of encryption in Canada, Australia and other countries (See SSLEay for example).
So it ended up being counter-productive.
The simplest way to stop competition is to subsidize a product. In this case, offer the tools openly.
According to the website [1] there is a strict license to this programming language.
> The License is intended for free learning and hobbyists and is a personal use license which means the Software may be installed and run only on Licensee computer as required for the purposes of Licensee’s code to produce a binary executable output (the “Executable Product”) only on Licensee-controlled Endpoint. An Endpoint is defined as a computer operating system (“OSE”) of any type physically hosted, but limited to Licensee’s internal personal use and not for distribution or any other use. For certainty, Licensee may not: distribute, assign, sell or grant any rights in or to the Software OR the binary executable product created by using the Software.
People of course can license the fruits of their labor however they wish to, I just can’t understand why someone would license their compiler in a way that prohibits me from sharing a useful program I made with my family or friends.
What important differences are there between Apple’s iCloud Keychain password management and Minimalist Password? Is it just the (coming soon) Chrome support?
iCloud Keychain password manager is becoming more capable but still pretty limited. Aside from the extensions to support more browsers soon, Minimalist Password provides some of the sugar that 1Password has, like the ability to store different things beyond just passwords (credit cards, crypto wallet keys for hot wallets, software licenses, secure notes, etc.) It also includes the ability to add custom fields of various types to password entries, and tags for grouping. It's more of a comprehensive secrets manager.
> If someone asked me about my hobbies, I’d stare blankly, wondering if they really want to hear that I go to the gym, or the hours I spend on obscure corners of Wikipedia, or doing math for fun.
I just looked through the website and I’m struggling to understand exactly how it works - how do you have signing / verification without the risk of key compromise?
The same way LetsEncrypt makes compromised TLS certificates (almost) useless; short-lived certificats.
What the sigstore project does is having an oauth portal which can authenticate one of your online identities. It uses this to sign a temporary certificate for you with it's root CA. This certificate is what you use to sign commits and artifacts with.
With Gitsign, by default a new keypair is generated per signing event (i.e. per commit) and never hits disk. The cert in the commit signature holds the public key, which we can check against Rekor (https://docs.sigstore.dev/rekor/overview) to verify it was valid at the time of signing.
I may be misunderstanding your question, but here is the answer if I understand you correctly.
This is all based on public key cryptography. In public key cryptography, there are actually 2 keys, a public key and a private key. Sites like get hub and the repose can store the public keys, while into while individual users keep their private key's secret. Anyone with the public key can verify a signature, but only an individual with the private key can create the equivalent signature.
The trick is to determine if a given public key corresponds to an individual. There are various methods to try to address that.