• 0 Posts
  • 26 Comments
Joined 1 year ago
cake
Cake day: June 7th, 2023

help-circle




  • I like this sentiment, but giving the US intelligence apparatus what amounts to a veto for elected/appointed officials feels like a recipe for disaster.

    The only way I see that being workable is if the clearance grantors are transparently beholden to elected officials or the people directly. Which are essentially what elections and the congressional confirmation process are supposed to be. But both of those processes feel like they’ve been subverted. (Elections by the two-party system and the fact that half the population seems intent on electing a dictator, and the other by the senators/representatives that come out of that electoral system).














  • Seedless grapes already exist, but I suppose you could now insert the gene into other plants/varieties to make those seedless as well.

    I’m thinking more about how big ag companies could use this to prevent farmers from saving seeds/propagating a copyrighted variety (though I don’t know if that’s common with any crops where the seed itself isn’t the end product) or maybe more charitably, preventing their copyrighted plants from cross pollinating neighboring fields of the same species (e.g. ruining that neighbor’s non-gmo status).

    Finally, this could be useful if it can be “switched on” i.e. by deliberately polluting an invasive plant’s gene pool with this gene and then switching it on to stall the invasive’s population growth. But I think most invasives are perennials, so would still need to be removed some other way.


  • In practice, I believe the private key should contain the public key (or at least sufficient data to recover it): https://superuser.com/questions/814409/gnupg-opengpg-recovering-public-key-from-private-key#814421

    I believe you only need your private key to sign files so, technically you only need to back up the private key, but you should test this to be sure it fits your use case.

    Depending on how you’re backing things up, and what your security goals are, remember that backing up a private key may involve putting that private key on somebody else’s computer - i.e. if you use a remote git repo, or cloud backup service, or even send the key to your own (different) machine over an insecure network. Make sure that you’ve got a way of securely backing up your private key, otherwise you may undermine the whole cryptography thing anyways :).

    As always, you should test by backing up your key(s) and then testing that you can actually restore them and successfully sign a file. Backups are only as good as the last time you tested restoring from them.