Also Nordic noir books fucking rock, I love me some good Nordic noir.
Alt account of @Badabinski
Just a sweaty nerd interested in software, home automation, emotional issues, and polite discourse about all of the above.
Also Nordic noir books fucking rock, I love me some good Nordic noir.
Man, why would you do this type of shit with a username that’s easily linked back to your real name and business ventures? I found this person’s GitHub profile, LinkedIn page, current employer, and a link to some sort of startup business page just by doing a simple search for their very public username: https://webug.xyz/
Several people over at Hackernews have posted this same info because security people are curious. It’s just baffling to me. If you’re going to be a scumbag, you should at least try to distance yourself from it.
(also, wtf is that page of AI slop even trying so say? What the fuck is any of that for?)
I could see it being nice for software appliances. I spent many years working for a company that made an appliance (run this OVA/stick this pre-imaged box on your network), and they had this godawful mess of perl they used to orchestrate the box (e.g. updating a configuration file from the GUI and then restarting the sysvinit (and later systemd) service). I could see someone writing a system orchestrator in Guile that, rather than shelling out to systemctl
, imports (or whatever it’s called in Scheme) the service definition and directly starts the service using a function call, complete with error handling and all of the nice shit that you don’t get by exec
ing some binary.
libsystemd
exists for systemd which lets you have some of the same benefits, but it’s a C library which doesn’t integrate nicely with all languages. I remember not liking any of the Python wrappers I tried, even though Python generally does a great job interfacing with C.
Does runit have the equivalent of systemctl --user
for managing per-user daemons like pipewire? I had some issues with pipewire recently and being able to journalctl --user -u pipewire
and systemctl --user restart pipewire
was a total godsend for me.
I’m a developer who does the whole devops thing and I’d consider systemd to be a professional tool with pretty advanced features. My team deploys and operates Kubernetes across tens of thousands of VMs (using our own images, not managed node pools), and all those nodes are using systemd as the foundational service manager.
Shepherd just seems to be another implementation of service management that’s centered around the use of GNU Scheme. I think it’s neat, and it’s far more flexible than systemd units. Flexibility is good, but to much flexibility also lets you build your own footguns. I have no idea if Shepherd lets you build a gun to blow your foot off, so this may not be a concern at all. Scheme is a really powerful language that I know nothing about, so I’m going to assume that the GNU folks are using language features (or the runtime itself) to prevent accidental amputation. The example service looks almost entirely declarative which gives me warm fuzzies.
As an example of something too flexible, just look at old sysvinit scripts. You could do literally anything you wanted because you were just writing Bash. Bash is already the shittiest language in existence and service management is hard, so there were a lot of terribly broken init scripts out there (which is why systemd was created).
From an aesthetic perspective, I do kinda hate Scheme (and the example service by extension). My eyes just do not want to read it, but that’s a personal failing. Many folks love Scheme and lispy languages.
EDIT: I used “Scheme” a lot, but to be technically correct, I should have been saying Guile. It’s GNU’s implementation of Scheme with some nice extensions.
Damn, that’s crazy to hear! Zooz stuff has been the bedrock upon which I’ve built all my automation. Like, I have dozens of ZEN04 LR plugs all over my house. What specific Zooz stuff has been unreliable for you? I’ve only used the ZEN04 LR, ZEN14 LR, and ZEN15 LR plugs so maybe it’s just not anything I’ve ever touched.
Z-wave LR isn’t a mesh, and I’d highly recommend it. I have some very chatty smart plugs (I use them to share load on a breaker, so I need power usage updates quickly or the breaker will pop) and they’ve done a great job on LR.
I avoid anything using WiFi unless it’s running open source software. I don’t want to manage an IOT VLAN, and there’s just no reason my sensors and plugs need to understand IPv4. I just want things to be reliable and self-contained.
Like, I am a very choosy and grumpy person and I get immediately annoyed if I have any sort of connectivity issues. I’ve been using two Ruckus R750 APs in my 2400ft² (220m²) house with properly set minimum RSSIs, xmit power, and channel usage. IOT stuff owns 2.4 on its own channel as you’ve said. It’s wonderfully reliable and fast! My BLE proxies have had 100% availability (outside of power outages, since only my central rack has battery backup). So is my single 800 series Z-wave LR radio that runs off of PoE and is wired in just like any other AP.
I absolutely ditched zigbee for anything other than sensors though. I just couldn’t count on it.
ngl, I’d think that someone with the word “water” tattooed on them in a sharpie style like that is cool. It just has a vibe I like.
it’s trivial to break that approach by obfuscating strings. You can do things like using base64 encoded strings in the source code, building strings from smaller component parts, or using rot13 on, say, the host component of a URI. That last one could be pretty interesting if you, as a threat actor, owned both permutations. The hostname (minus TLD) in the source code could be the nice, human readable version (www.happysite.org) that appears to be something legit. Then, when you rot13 it to www.uncclfvgr.org, traffic is sent to the evil site doing scary things. People can be far more tricksy than that. There’s also the whole issue around whether or not the binaries you’re running actually match the code in the repo. The xz kerfuffle showed how much can be hidden that way.
EDIT: I should make it clear that I don’t use Deepin or the DE it provides because I only use WMs with no desktop, so the distro and DE are of no interest to me. I don’t know if it’s a security hazard or not, I have no horse in this fight.