

never heard of nushell, but sounds interesting… but it’s not default anyhwhere yet. I’d go for bash, perl or maybe python? your comments on zfs make a lot of sense, and invalidate my respective thoughts :D
never heard of nushell, but sounds interesting… but it’s not default anyhwhere yet. I’d go for bash, perl or maybe python? your comments on zfs make a lot of sense, and invalidate my respective thoughts :D
your first two points can be mitigated by using checksums. trivial to name the file after it’s checksum, but ugly. save checksums separately? safe checksums in file metadata (exit)? this can be a bit tricky 🤣 I believe zfs already has the checksum, so the job would be to just compare lists.
restoring is as easy, creation gets more complicated and thus prone to errors
and it’s wrong, too. it’s not pornography, it’s rape.
I’m not active on linked in, but 0 posts and 3500 followers rose my suspicions
I mean… like everything this comes in many levels… go on the main road with your car, cameras will catch you. sign in with your public transport card when boarding the bus… these are obvious. use a cab, pay cash. ride a bike, change cities, change states, change countreis… depends on your threat model I guess :D
if your travel with burner and normal phone for one hour, both switched on, cell tower registrations are in sync and both are easily linked. if your switch on your burner only occasionally at random locations, but your real phone is/was there at the same time they are linkable.
to use a burner:
it’s possible, but certainly not trivial.
also: depends on the power of your adversary, as always the personal threat model is relevant. using a burner to cheat on your spouse is not the same as using one when plotting to steal the nuclear codes.
it’s rather easy to link a burner phone to you if you don’t know exactly what you are doing. no need for a phone, don’t take any risk.
I’m disappointed. I thought you figured out how to have a decentralized scoring system 😃