Things we didn't do:
- Start the fire
- Shoot the deputy
- Steal the cookies from the cookie jar
Things we did:
- Tried to fight it
- Shot the sheriff
- Put the sham in the shama-lama-ding-dong
Things we will do:
- Survive
- Rock you
- Walk 500 miles
- Walk 500 more
Things we won't do:
- Get fooled again
- Back down
- That
Things we will never do:
- Give you up
- Let you down
- Run around
- Desert you
(Oops:
- I did it again)
@lucifargundam I’ll correct myself before you or somebody else does, as there is “usually always” this other option:
@lucifargundam I think I just described what it’s like to run a snooping Tor exit node (not to mention an everyday VPN/ISP)…or perhaps a full blockchain node that caches/correlates queries from upstream lite nodes (not to mention an everyday Coinbase/centralized exchange)…
@lucifargundam I use aggressive containerization and encrypt outbound traffic. But short of requiring manual airgapped decryption, I can’t guarantee that packets aren’t compromised at the destination. I also can’t promise that all inbound traffic has been encrypted from the source. But the bigger issue is the sheer volume of packets traversing my gateway, to which I have to rely on a single Pi2 running unsupervised ML in order to identify the malicious signals amongst all the noise.
@BenjaminHimes if @Gargron forks & integrates with the protocol, and a meteor filled with fossilized Pi’s lands in my backyard, I’ll turn them into turnkey mastodon nodes + scrapers & ship them (with port forwarding instructions) to any student who wants one. Project #PiedPiper. No pun intended.
I suspect there are bad actors across the planet looking for an opportunity to take #TwitterDown
Founder of https://depozit.app Visionary for the UniKey Protocol