| ▲ | gritzko 2 hours ago |
| I work on a revision control system project, except merge is CRDT. On Feb 22 there was a server break-in (I did not keep unencrypted sources on the client, server login was YubiKey only, but that is not 100% guarantee). I reported break-in to my Telegram channel that day. My design docs https://replicated.wiki/blog/partII.html I used tree-sitter for coarse AST. Some key parts were missing from the server as well, because I expected problems (had lots of adventures in East Asia, evil maids, various other incidents on a regular basis). When I saw "tree-sitter in go" title, I was very glad at first. Solves some problems for me. Then I saw the full picture. |
|
| ▲ | ctmnt an hour ago | parent | next [-] |
| Wait, are you suggesting that OP broke in to your server and stole code and is republishing it as these repos? I have questions. Have you reviewed the code here to see if it matches? What, more specifically, do you mean when you say someone broke in? What makes you think that this idea (which is nice but not novel) is worth stealing? If that sounds snarky, it’s not meant to; just trying to understand what’s going on. Why is that more likely than someone using Claude to vibe up some software along the same lines? |
| |
| ▲ | gritzko 22 minutes ago | parent [-] | | 1. Just saying, strange coincidence 2. How can we compare Claude's output in a different language? 3. Detecting break-ins and handling evil-maids: unless the trick is already known on the internets, I do not disclose. Odds are not in my favor. 4. Maybe worth, maybe not. I have my adaptations. Trying to make it not worthy of stealing, in fact. |
|
|
| ▲ | ctmnt an hour ago | parent | prev [-] |
| Also, evil maids, what? |
| |
| ▲ | atonse 23 minutes ago | parent [-] | | I can't speak for the specificity of parent's "evil maids" phrase but the concept of an "Evil maid" is used in security scenarios. A maid tends to be an example of a person who's mostly a stranger, but is given unmonitored access to your most private spaces for prolonged periods of time. So they theoretically become a good vector for a malicious actor to say "hey I'll give you $$ if you just plug in this USB drive in his bedroom laptop next time you're cleaning his house" - it's often used in the scenario of "ok what if someone has physical access to your resource for a prolonged period of time without you noticing? what are your protections there?" I wonder if that's what OP meant? :-) | | |
| ▲ | gritzko 20 minutes ago | parent | next [-] | | Evil maids (example): I put my laptop into a safe, seal the safe, seal the room, go to breakfast. On return, I see there was cleaning (not the usual time, I know the hotel), the cleaner looks strangely confused, the seal on the safe is detached (that is often done by applying ice; adhesive hardens, seal goes off). This level of paranoia was not my norm. Had to learn these tricks cause problems happened (repeatedly). In fact, I frequented that hotel, knew customs and the staff, so noticed irregularities. | |
| ▲ | gritzko 19 minutes ago | parent | prev [-] | | If you are wondering why my life is that difficult, am I a spy or a scizo. My birthday is 5 Apr, same as Satoshi, I work on decentralized systems since mid 2000s. |
|
|