luis_in_brief,
@luis_in_brief@social.coop avatar

(scrolling the timeline, jaw drops) Welp, going to add "my vision of software freedom leads me to reject two-factor authentication on my source code repository" to examples for a future revision of my old talk on how "software freedom" is often a very selfish, libertarian, anti-liberation, anti-ally framing of software philosophy.

https://lu.is/blog/2016/03/23/free-as-in-my-libreplanet-2016-talk/

vathpela,
@vathpela@better.boston avatar

@luis_in_brief yeah the "I won't use MFA on source code because then it's not a hobby" argument came as a bit of a surprise.

luis_in_brief,
@luis_in_brief@social.coop avatar

@vathpela There are many simple ways to keep it a hobby. 2FA… ain’t it.

luis_in_brief, (edited )
@luis_in_brief@social.coop avatar

If your theory of software freedom is such that you reject basic security precautions that benefit others because they are inconvenient to you we are not allies.

Important note: I've spoken about how rejecting 2fa and deleting now-insecure projects is reasonable to protect your time. But don't dress up self-care for yourself as protecting "freedom". https://explore.tidelift.com/upstream/main-2023/upstream-23-session-luis-villa-keynote

beamflash,
@beamflash@hachyderm.io avatar
luis_in_brief,
@luis_in_brief@social.coop avatar

@beamflash I am not an expert on npm, but that one of the top responses is "I am sure virtually everyone understands 'code signing' to mean what it has meant historically" and is talking about... pgp, suggests the issue is complicated (because lolololololololol at "virtually everyone understands" pgp).

luis_in_brief,
@luis_in_brief@social.coop avatar

@beamflash Obviously npm needs to take security seriously, but I'm extremely skeptical that in 2023 that pgp == seriousness, given the many known challenges with it.

beamflash,
@beamflash@hachyderm.io avatar

@luis_in_brief Sure, PGP isn't the be-all and end-all these days, but an optional centrally managed signing service doesn't seem that great either. Looking into it more, it's more the developer's fault for blindly trusting code from a CDN (which is a pretty nifty attack vector). Just trying to link it back to the "security is hard, let's not worry" attitude that you are against.

https://www.coinfabrik.com/blog/attack-on-ledger-wallets-what-happened/

luis_in_brief,
@luis_in_brief@social.coop avatar

@beamflash yeah, the optionality is a real problem. At the same time, as I've written on my company's blog, piling on more requirements sort of sucks too - there's no great answer, only least-bad choices :( https://blog.tidelift.com/pay-to-play-dont-expect-maintainers-to-solve-your-supply-chain-issues-for-free

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • cubers
  • DreamBathrooms
  • ethstaker
  • magazineikmin
  • thenastyranch
  • ngwrru68w68
  • Youngstown
  • slotface
  • tester
  • love
  • kavyap
  • everett
  • InstantRegret
  • mdbf
  • provamag3
  • khanakhh
  • tacticalgear
  • osvaldo12
  • rosin
  • normalnudes
  • GTA5RPClips
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • modclub
  • megavids
  • JUstTest
  • All magazines