• 0 Posts
  • 8 Comments
Joined 2 years ago
cake
Cake day: June 11th, 2023

help-circle

  • D’oh. I only thought the rest of the comment and then submitted as it was because I needed to go find the text to copy.

    And from the 12th amendment:

    But no person constitutionally ineligible to the office of President shall be eligible to that of Vice-President of the United States.

    You can only be elected president twice. If you serve more than two years of someone else’s term you can only be elected once. If you can’t be president you can’t be vice president.

    So if you’re elected once, then serve as VP and the president goes away and you serve as president for 2 years and a day, you’ve already been elected once so you can’t run again, and you can’t be VP because you can’t be the president.
    If you’ve been elected twice you can’t be VP, so you can’t get any extra time that way.





  • While they created a set of patches that would implement the security features that selinux provides, what was actually merged was the result of several years of open collaboration and development towards implementing those features.

    There’s general agreement that the idea that the NSA proposed is good and an improvement, but there was, and still is, disagreement about the specific implementation approaches.
    To avoid issues, an approach was taken to create a more generic system that selinux would then take advantage of. That’s why selinux, app armor and others can live side by without it being a constant maintenance and security nightmare. Each one lives in their little self contained auditable boxes, and the kernel just makes the “check authorization” function call and it flows into the right module by configuration.

    The Linux community was pretty paranoid about the NSA in 2000, so the code definitely got a lot more scrutiny than the typical proposal.

    A much easier way to introduce a backdoor would be to start a tiny company that produces some arbitrary piece of hardware which you then add kernel support for.

    https://github.com/torvalds/linux/tree/master/drivers/input/keyboard - that’s just the keyboard drivers.

    Now you’re adding code to the kernel and with the right driver and development ability you can plausibly make changes that have non-obvious impacts, and as a bonus if someone notices, you can just say “oops!” And not be “the god-damned NSA” who everyone expects to be up to something, and instead be 4 humble keyboard enthusiasts with an esoteric set of lighting and input opinions like are a dime a dozen on Kickstarter.



  • Eh, anything interesting is going to be inside and out of sight. The desert is so big that people aren’t going to be sneaking up on it without you noticing.

    We’re not going to rely on obscurity to keep our research sites secure. People who have worked at similar secure sites report parking at the meeting building, changing into their work coveralls, going through a security screening and then being driven for an hour or two in a bus with blacked out windows to work in a sealed building with no windows before being driven back in similar conditions.

    Using your existing classified development facility has the advantage that you can keep activities at it at a roughly constant level, so anyone watching from a satellite can’t tell if there’s more or less activity that would indicate something interesting. Just make sure that a dozen busses show up every day, regardless of how many people are in them.

    It’s similar to how you can tell the Pentagons level of alert by looking at pizza delivery wait times at off hours on Google maps.