=== ANCHOR POEM ===
════════════════════════════════════════════════════───────────────────────────────
 "if I work on the TTY then they can't forward my X session without my consent"
 
 - ramblings of the utterly deranged
 
 as if they couldn't just look at your unencrypted source-code as you save it
 to your hard drive smh
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════──────────────────────────────┘

=== SIMILARITY RANKED ===

--- #1 fediverse/2252 ---
══════════════════════════════════════════════════════─────────────────────────────
 ┌──────────────────────┐
 │ CW: tech-encryption  │
 └──────────────────────┘


 users don't want to have to think about encryption keys.
 
 they should be available for them if they need them, in like... a folder or
 something somewhere, but they don't need to really know that they exist.
 
 more friction like that keeps people away from being secure.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #2 messages/635 ---
════════════════════════════════════════════════════════════───────────────────────
 Yeah, sure, signal is encrypted, but they could just put a virus on your
 miniature pocket tv that streams your screen into a text recognition bot which
 streams that text into an LLM trained to report on suspicious seditious
 activity.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #3 fediverse/1310 ---
════════════════════════════════════════════════───────────────────────────────────
 that feeling when you type your password so fast that one hand is faster than
 the other and the letters get all jumbled and now you have to remake your ssh
 key -.-
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #4 fediverse/874 ---
══════════════════════════════════════════════─────────────────────────────────────
 oh yeah well if SSH keys are so secure then why doesn't every website on Earth
 require them
 
 really though why doesn't every website on Earth require them
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #5 fediverse/664 ---
═════════════════════════════════════════════──────────────────────────────────────
 @user-482 
 
 [secretly installs a keylogger and doesn't tell anyone upstream but still
 pushes it to production]
 
 [or worse, was told to do as such and given tools to fabricate "evidence" to
 the contrary to everyone else on the team]
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘

--- #6 fediverse/612 ---
═════════════════════════════════════════════──────────────────────────────────────
 Look all I'm saying is if I had an acolyte or two then my insane ramblings
 could be filtered and parsed by a real actual human instead of being copied
 wholesale onto the internet, where the inconsequential or inconceivable ones
 are left to rest alongside the gifts of knowledge from another realm.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘

--- #7 fediverse/1246 ---
═══════════════════════════════════════════════────────────────────────────────────
 @user-883 
 
 hehe if I don't understand how it works it's difficult for me to use things.
 My Linux friends get so exasperated with me because I'm like "cool script
 gimme like 2 days to figure it out" and they're like "bro just use these
 flags" and I'm like "no"
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #8 fediverse/3470 ---
════════════════════════════════════════════════════════───────────────────────────
 alternatively, when you initiate an SSH session it sends you a randomized
 public key whose private key is the password that you need to login. By
 decrypting the string of text it sent you and sending it back (plus the
 password at the end or whatever) you can ensure secure authentication without
 bothering with the passwordless keys which are wayyyyyy more trouble than
 they're worth and lack the "something you know" authentication method.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #9 fediverse/5919 ---
══════════════════════════════════════════════════════════════════════════─────────
 "but... why?"
 
 portable linux with buttons, great for pick-up-games or communication, can
 throw several in them in a backpack if you want clustered cooperation, they
 work as radios (if the signal reaches) and can transmit text (if you use a
 radial-style keyboard)
 
 [this is all just a pitch for... something, what, you want something? ha
 you'll find no things with me, I know nothing of antifa or whatever]
                                                           ────────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════────────┘

--- #10 fediverse/1221 ---
═══════════════════════════════════════════════────────────────────────────────────
 @user-883 
 
 either that or I might get lost in some C code we'll see how things develop
 >.>
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #11 fediverse/1064 ---
═══════════════════════════════════════════════────────────────────────────────────
 ┌──────────────────────┐
 │ CW: politics         │
 └──────────────────────┘


 @user-68 
 
 "if California isn't America then neither is Texas"
 
 sounds much different than
 
 "If Texas isn't America anymore then neither is California////"
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #12 fediverse/3469 ---
════════════════════════════════════════════════════════───────────────────────────
 you know how SSH password login is deprecated because the password needs to be
 transmitted in cleartext or whatever?
 
 what if we just... required two passwords?
 
 the first initiates the conversation, and sets up an encrypted line. It
 doesn't matter if anyone sees the first password because they'll get a new set
 of encrypted keys, meaning each session automatically is encrypted in a
 different, randomized way.
 
 the second password is the one that actually authenticates you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #13 fediverse/4946 ---
════════════════════════════════════════════════════════════════───────────────────
 I would trust the CIA if they gave me continual access to all surveillance of
 myself
 
 -- stack overflow --
 
 what if you made a program which cycled credentials?
 
 like... "give me a random credential for Zoom" because we share all of our
 digital resources
 
 did you get banned for account sharing? no you didn't because you routed
 through the correct VPN
 
 automagically
 
 [has never had a software job]
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════──────────────────┘

--- #14 fediverse/6209 ---
════════════════════════════════════════════════════════════════════════════───────
 okay just to clarify: if anyone is recording me or storing data about me, I
 would really prefer if you didn't delete it just because I realized it was
 happening. I like data! It's cool to know such things!
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #15 fediverse/5961 ---
══════════════════════════════════════════════════════════════════════════─────────
 @user-138 
 
 maybe it's evil hackers - idk that's beyond my expertise - good luck : )
 
 (I'd need to see the piece of technology to work on it. I'm a hardware kinda
 [girl, but pronounced guy])
                                                           ────────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════────────┘

--- #16 fediverse/581 ---
═════════════════════════════════════════════──────────────────────────────────────
 @user-428 
 
 sometimes I think about how much more productive I'd be if I had a code editor
 that let me draw arrows and smiley faces and such alongside the code. Or if I
 could position things strangely, like two functions side-by-side with boxes
 drawn around them. Or diagrams or flowcharts or graphs or...
 
 something that would output to raw txt format, but would present itself as an
 image that could be edited.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘

--- #17 messages/1488 ---
══════════════════════════════════════════════════════════════════════════════════─
 "what are you doing?" doxxing myself. If she wanted to save as many lives as
 possible, she'd do it in a shed. She's been tricked into doing it for the
 money by people who don't want to die in a warehouse. That's valid, but they
 aren't giving her money anyway.
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #18 fediverse/6437 ---
══════════════════════════════════════════════════════════════════════════════─────
 if I was writing a programming language, I'd name it C just to fuck with people
 
 (great, now others can decide how it's known)
                                                           ────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════────┘

--- #19 fediverse/3471 ---
════════════════════════════════════════════════════════───────────────────────────
 @user-883 
 
 it might be, I don't know much about it (hence why I'm asking questions) but I
 have heard that ssh keys are more secure than password authentication and it
 never made sense to me. If availability is important for security purposes,
 then wouldn't SSH keys (which are much more difficult to carry around than a
 password) be less suitable?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #20 fediverse/2307 ---
══════════════════════════════════════════════════════─────────────────────────────
 "If you can't find it, you don't have it"
 
 ugh I know, me-from-the-past, now shut up and tell me where my USB-C cable is.
 I have like 4 how did I hide them so good when packing ? ? ?
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘