I won’t argue that isn’t true. I’m just saying beam is a value prop that speaks to me. Jvm isn’t, but objectively is for sure.
- 8 Posts
- 910 Comments
theherk@lemmy.worldto
Ask Lemmy@lemmy.world•Is the role of a government to do the will of the people, or to do whats right for the country?
82·7 hours agoThat feels like a false dilemma to me. The country and government, ideally, are the people.
At least there is a good reason to use elixir. Beam.
theherk@lemmy.worldto
Technology@lemmy.world•Electric Flying Cars Now for Sale by California Company PivotalEnglish
4·14 hours agoIt also means the people operating them will have a high threshold for consequences and maybe not care so much about the community.
theherk@lemmy.worldto
politics @lemmy.world•Witness told FBI Trump threatened to ‘disappear’ girl and have her ‘whole family killed’
37·1 day agoWhat would that do? Dead bodies don’t put off heat very long. Well aside from decomposition, but that’s negligible.
Proton also has mail and password management.
theherk@lemmy.worldto
Ask Lemmy@lemmy.world•How much trash is there on the surface nearest to you right now?
6·1 day agoHey, don’t talk about our friend Denjin that way.
And we’re only halfway through the rawring 20’s. I’m imagining massive global human migrations away from the equator for compounding reasons in the next few decades.
These birds are so fun to watch. Very nimble little creatures, alongside nuthatches that actually walk headlong down trees.
theherk@lemmy.worldto
Programming@programming.dev•FOSDEM 2026, one of the world's largest software meeting will start in 2 days in Brussels 🇧🇪. This edition features 1176 speakers and 1063 events
3·1 day agoWhat funny is it is Mozilla giving away free cookies with a sign that says, “Only accept my cookies”.
theherk@lemmy.worldto
politics @lemmy.world•Woman Told FBI Trump Abused Her at 13, Epstein Files Reveal
15·2 days agoPepperidge Farm remembers.
theherk@lemmy.worldto
Programming@programming.dev•FOSDEM 2026, one of the world's largest software meeting will start in 2 days in Brussels 🇧🇪. This edition features 1176 speakers and 1063 events
11·3 days agoActually going this year. Have wanted to for many. Really looking forward to it.
Modelling how you want to handle trust in your architecture doesn’t have a best answer really. Many ways to pet a cat, and all that jazz. Some prefer to trust only end to end, meaning not just establishing trust at the API entry, but all the way to the backend. There are arguments to be made for doing it either way. As long as your services behind the API gateway are in a private network, it is maybe okay to establish complete trust here and you could even terminate TLS and use clear communications. Another more secure pattern is to authenticate the call to the API, authorize which backends can be called, then verify the source caller in the backend as well.
theherk@lemmy.worldto
Programming@programming.dev•How can I earn money with coding WITHOUT working in the corporation area?
21·4 days agoThere are many public sector organizations that need programming done. There are also organizations that back FOSS work. However, if it can’t involve devops, cloud, or containers, I don’t know how much will be left for you to do. There are tasks that don’t involve those, but they’re few and far between. And anybody who said those aren’t part of “REAL programming” wouldn’t get a second listen from me in a hiring scenario.
theherk@lemmy.worldto
You Should Know@lemmy.world•YSK how to protect yourself at a protest
30·5 days agoThat’s dark, hilarious, and horrifying.
theherk@lemmy.worldto
Technology@lemmy.world•Lawsuit Alleges That WhatsApp Has No End-to-End EncryptionEnglish
4·5 days agoActually great questions. Yes and no. There are vulnerabilities if the private key leaks, but public keys are just that; perfectly okay public in any hands. You only encrypt data with it.
What makes the Signal protocol so awesome, and other algorithms like it, is that it reduces the threat surface area further by using onetime keys. So even if your key is leaked, it cannot be used to decrypt old or forthcoming messages as the keys have already ratcheted to the next pair.
theherk@lemmy.worldto
Technology@lemmy.world•Lawsuit Alleges That WhatsApp Has No End-to-End EncryptionEnglish
7·5 days agoThey share it with you. Their public key is generated by them. You encrypt a message to them with their public key. They use their private key to decrypt it.
I want to add before I get completely roasted here, that this is intentionally reductive. Signal actually uses a much more interesting multikey sharing algorithm, double ratchet. This uses onetime keypairs, and really is worth reading about.
theherk@lemmy.worldto
Technology@lemmy.world•Lawsuit Alleges That WhatsApp Has No End-to-End EncryptionEnglish
4·5 days agoI’m not following. In the WhatsApp case, yes, because we can’t see how those keys are managed. In the Signal case, we can. So the centralized server has zero impact on the privacy of the message. If we trust the keys are possessed only by the generating device, then how does the encrypted message become compromised?
I’m not talking about anonymity, only message privacy. No different than any of the other proxies or routers along the way. If they don’t have the key, the message is not readable.
theherk@lemmy.worldto
Technology@lemmy.world•Lawsuit Alleges That WhatsApp Has No End-to-End EncryptionEnglish
17·5 days agoSorry but you’ll need to hold the L on this one. If I encrypt a message with public key material for which the only private key material that can decrypt the message is in only my possession, it doesn’t matter if the message passes centralized servers.
I’m not trying to be rude, that’s just how it works.






Not at all. Tongue was firmly in cheek. I work with jvm professionally. I was specifically trying to clarify that I find the beam vm exciting but not jvm and was therefore just kidding around when I made the first comment. Not gate keeping at all. Like whatever you please.