Search

Search this site:

Gunnar Wolf - Nice grey life - page 17

Showing posts 161 – 170

Hey, everybody, come share the joy of work!
I got several interesting and useful replies, both via the blog and by personal email, to my two previous posts where I mentioned I would be starting a translation of the Made With Creative Commons book. It is my pleasure to say: Welcome everybody, come and share the joy of work! Some weeks ago, our project was accepted as part of Hosted Weblate, lowering the bar for any interested potential contributor. So, whoever wants to be a part of this: You just have to log in to Weblate (or create an account if needed), and start working! What is our...

Reporting progress on the translation infrastructure
Some days ago, I blogged asking for pointers to get started with the translation of Made with Creative Commons. Thank you all for your pointers and ideas! To the people that answered via private mail, via IRC, via comments on the blog. We have made quite a bit of progress so far; I want to test some things before actually sending a call for help. What do we have? Git repository set upI had already set up a repository at GitLab; right now, the contents are far from useful, they merely document what I have done so far. I have...

Made with Creative Commons: Starting a translation project
Dear Lazyweb, About a week ago, I learnt about the release of an interesting book by the fine people at Creative Commons: Made with Creative Commons. The book itself is, of course, CC BY-SA-licensed. I downloaded it and started reading right away. Some minutes later, I ordered a dead-tree copy, which arrived a couple of days ago. (I’m linking to the publisher’s page, but bought it from Amazon México… Shipping it from Denmark would not have been as cheap and fast, I guess). Anyway, given my workplace, given the community I know, given I know something like this is much...

Open Source Symposium 2017
I travelled (for three days only!) to Argentina, to be a part of the Open Source Symposium 2017, a co-located event of the International Conference on Software Engineering. This is, all in all, an interesting although small conference — We are around 30 people in the room. This is a quite unusual conference for me, as this is among the first “formal” academic conference I am part of. Sessions have so far been quite interesting. What am I linking to from this image? Of course, the proceedings! They managed to publish the proceedings via the “formal” academic channels (a nice...

Progression and Forecast of a Curated Web-of-Trust: A Study on the Debian Project's Cryptographic Keyring
Attachments Article in proceedings (1991 KB)

Starting a project on private and anonymous network usage
I am starting a work with the students of LIDSOL (Laboratorio de Investigación y Desarrollo de Software Libre, Free Software Research and Development Laboratory) of the Engineering Faculty of UNAM: We want to dig into the technical and social implications of mechanisms that provide for anonymous, private usage of the network. We will have our first formal work session this Wednesday, for which we have invited several interesting people to join the discussion and help provide a path for our oncoming work. Our invited and confirmed guests are, in alphabetical order: Salvador Alcántar (Wikimedia México)Sandino Araico (1101)Gina Gallegos (ESIME Culhuacán)Juliana...

Construcciones reproducibles
El premio Turing1 de 1983 fue otorgado a Ken Thompson y Dennis Ritchie por «su desarrollo de la teoría genérica de los sistemas operativos, y específicamente, por la implementación del sistema operativo Unix». Su discurso de aceptación del premio, «Reflections on Trusting Trust»2 (pensamientos acerca de confiar en la confianza) ha sido uno de los pilares de la práctica de la seguridad informática. En dicho trabajo, Thompson sostiene que mientras haya gente como él, capaces de escribir un compilador a pelo, no podremos confiar auditoría alguna que hagamos a nuestro código — Su artículo demuestra cómo se puede troyanizar un...

On Dmitry Bogatov and empowering privacy-protecting tools
There is a thorny topic we have been discussing in nonpublic channels (say, the debian-private mailing list… It is impossible to call it a private list if it has close to a thousand subscribers, but it sometimes deals with sensitive material) for the last week. We have finally confirmation that we can bring this topic out to the open, and I expect several Debian people to talk about this. Besides, this information is now repeated all over the public Internet, so I’m not revealing anything sensitive. Oh, and there is a statement regarding Dmitry Bogatov published by the Tor project...

Cannot help but sharing a historic video
People that know me know that I do whatever I can in order to avoid watching videos online if there’s any other way to get to the content. It may be that I’m too old-fashioned, or that I have low attention and prefer to use a media where I can quickly scroll up and down a paragraph, or that I feel the time between bits of content is just a useless transition or whatever… But I bit. And I loved it. A couple of days ago, OS News featured a post titled From the AT&T Archives: The UNIX Operating System....

Dear lazyweb: How would you visualize..?
Dear lazyweb, I am trying to get a good way to present the categorization of several cases studied with a fitting graph. I am rating several vulnerabilities / failures according to James Cebula et. al.’s paper, A taxonomy of Operational Cyber Security Risks; this is a somewhat deep taxonomy, with 57 end items, but organized in a three levels deep hierarchy. Copying a table from the cited paper (click to display it full-sized): My categorization is binary: I care only whether it falls within a given category or not. My first stab at this was to represent each case using...


subscribe via RSS