• 0 Posts
  • 10 Comments
Joined 6 months ago
cake
Cake day: June 4th, 2025

help-circle
  • Sounds a lot like Japan. There’s colored bags that you can buy at the store for “combustible” and not waste. Then there’s metal and glass pickup, small yard waste (mostly twigs), electronics, paper, and certain plastic has a dropoff. I’ve never heard of trash police issuing fines, but they’ll leave your items behind if it’s the wrong day or type.

    When I lived in the US it was just two bins - trash (which was really anything you can fit in a bag, nobody checks) and recycling. Recycling varied by municipality but it was mostly single-stream glass, metal, and most plastics. Things like plastic bags and Styrofoam couldn’t go in the recycling but most places like the grocer would take bags or fluorescent bulbs or batteries.

    Of course, multiple studies have shown that most plastics just end up burned or in the ocean so guess it doesn’t much matter how they are collected…



  • I’ll address the second objection first regarding the phone or browser. You’re always going to rely on some technology for the solutions that use cryptography, you just can’t do those calculations long-hand realistically. That said, look up frameworks like CTAP that allow a potentially untrusted user terminal, like a browser, to interact with a trusted hardware token. Those hardware tokens can be made fairly tamper-proof, see FIPS authorized Yubikeys, such that the phone is pretty much removed from the attestation process. Yes these can still be stolen, but they make hardware keys that are fingerprint authenticated and the biometric stays on the device. Doesn’t get much more self-sovereign than that.

    The existence of a trusted credential provider is a challenge. Fully self-sovereign credentials need to either be trust on first use or validated against a larger system everyone participates in. Even if we had some system of birth certificates tied to a distributed ledger, we would have to trust the third party recording that certificate in the first place, be it a hospital, doctor, or state entity. These trust and proof systems don’t create the trust, they just allow us to extend that trust from one claimant to a verifier. Whether you place that trust in the state, an individual, or an independent third party is up to you.



  • This is a fundamental misunderstanding of how the FIDO2 standard works. It is not designed to be vendor specific and as other people in this thread point out, plenty of open-source secrets managers and hardware implement passkeys.

    What we’ve seen is the typical Silicon Valley model of “embrace, extend, extinguish” so you’re right to be wary of any implementation by Google or Microsoft.

    Same goes for biometrics - how you unlock the passkey isn’t specified in the standard. It is left up to the implementation. If you don’t want to use biometrics, you don’t have to.


  • Alright, devil’s advocate here - maybe this setup can prevent it. You plug something permanent, like a mouse & keyboard, into the leftmost port and leave the right two open. Then when you try the first one and it’s misaligned, move to the other port and it’s correct. No flipping of the USB connector required.

    I don’t think that’s why they did it but hey…


  • I’ll play devil’s advocate here: agreed that the rest of the (US) economy seems to be slowing or shrinking but remains buoyed by AI / Mag 7 stocks. That said, a lot of the investment reflected above is in data centers and hardware (Nvidia, Coreweave, Oracle, Microsoft).

    The bubble pop will hinge on whether there is value in this data center buildup beyond AI. Unless everyone starts paying fistfulls of cash for AI chat, these companies may be able to find another use for all that compute and avoid a total crash. That could be a target for all that investment you mention.