The Market Ticker
Commentary on The Capital Markets- Category [Musings]
Logging in or registering will improve your experience here
Main Navigation
MUST-READ Selection(s):
Cut The Crap - NOW

Display list of topics

Sarah's Resources You Should See
Sarah's Blog Buy Sarah's Pictures
Full-Text Search & Archives

Legal Disclaimer

The content on this site is provided without any warranty, express or implied. All opinions expressed on this site are those of the author and may contain errors or omissions.


The author may have a position in any company or security mentioned herein. Actions you undertake as a consequence of any analysis, opinion or advertisement on this site are your sole responsibility.

Market charts, when present, used with permission of TD Ameritrade/ThinkOrSwim Inc. Neither TD Ameritrade or ThinkOrSwim have reviewed, approved or disapproved any content herein.

The Market Ticker content may be sent unmodified to lawmakers via print or electronic means or excerpted online for non-commercial purposes provided full attribution is given and the original article source is linked to. Please contact Karl Denninger for reprint permission in other media, to republish full articles, or for any commercial use (which includes any site where advertising is displayed.)

Submissions or tips on matters of economic or political interest may be sent "over the transom" to The Editor at any time. To be considered for publication your submission must include full and correct contact information and be related to an economic or political matter of the day. All submissions become the property of The Market Ticker.

Considering sending spam? Read this first.

2019-03-13 09:51 by Karl Denninger
in Musings , 133 references
[Comments enabled]  

I don't know whether to laugh or cry...

And according to a recent study at NYU Langone Health, chronic pot smokers (defined as more than 20 days per month) had almost a one out of three chance of developing Cannabinoid Hyperemesis Syndrome (CHS), an awful condition associated with varying degrees of pain and uncontrolled nausea and vomiting, which can for last several hours. This translates to over 3 million sufferers in the U.S., when you consider the current numbers of chronic pot smokers.

One out of three?

In my younger years I knew a lot of people who used to smoke a lot of weed.  Every day.  All day.

This seems to be associated with young folks -- as in "old high school and college" times.  I don't run with that group of people any more, of course, since I'm more than a bit older -- but I bet they're still around.  The faces and names change... but probably not much else.

And I'll lay very good odds that nowhere near 1 in 3 of them have ever had anything similar to what's being described happen.

Is it a real thing?  I don't doubt it.  There are people who have bad reactions to all sorts of things, including booze.  I personally avoid champagne, as it gives me a hell of a headache, and I see no reason to intentionally punish myself in that fashion.  A former very close friend of mine never smoked weed even when in the company of many people who did.  Why?  He was epileptic (under control via prescription drugs) and being stoned felt, to him, exactly identical to what he felt a few seconds or minutes before he had a seizure!  Needless to say that would be more than enough to convince me to never touch the stuff!

I'd have to ask exactly what sort of level of consumption is involved here too. That's a fair question, right?

What I find most amusing is that I don't think the level of consumption has gone up much in places like Colorado since it was legalized.  What's happened is that the state has collected a lot of tax revenue and the black market has been harmed, both of which look like pretty good outcomes from where I sit.  If consumption has gone up on average I bet it hasn't gone up much.

Let's face it -- being ****faced stoned isn't very conducive to a whole host of things most people do on a daily basis.  Like, for instance, going to work and actually performing a job.  For those who consume on a regular but much lesser basis, much like my having a beer in the evening after I'm done with whatever is important that I have to do in a given day, well, I ain't buying the "one in three" claim there at all.

But let's assume it's accurate.  This is all they've got -- you might puke in a very unpleasant fashion, and have to take a hot shower to stop it -- which would be a pretty good signal to you that perhaps your consumption of cannabis is a bad idea?

Come by the local bar on a "Sunday Funday" if you want to see some uncontrolled puking, and no, taking a hot shower won't stop that either.  In fact if you are around a college and find a Friday night party (maybe at a Frat House) I bet you will find plenty of alcohol-abuse induced hurling going on.

View this entry with comments (opens new window)

Guess what?


When Quadriga Fintech Solutions Corp. founder Gerald Cotten died, account holders feared the encrypted access keys needed to recover C$190 million ($143 million) of cryptocurrencies held by the exchange in offline storage could be lost forever.

It looks now like the storage Quadriga is known to have used -- dubbed cold wallets -- has been empty since April.

Oh darn, journalists who don't understand things should shut the hell up and if you don't have people on staff who do understand how this stuff works then either hire them or stop writing stories.

Bitcon, along with every other cryptocurrency, relies on the immutability of transactions.  If that's violated then I can trivially counterfeit said currency in any amount and it will collapse due to either accounting chaos (it's worth zero) or uncontrollable hyperinflation (it's also worth zero) since literally anybody can cause the effective amount outstanding to increase without boundary.

But immutability means that you need only the wallet ID (not the ability to open it) to determine down to the last decimal exactly how much cryptocurrency it holds at any time from the instant of its creation on forward to the present moment and, in addition, every single wallet that has ever held that specific piece of said cryptocurrency all the way back to its inception.  You have to be able to trace a coin that someone wants to "spend" this way all the way back to its origin -- in other words, that capability has to be available to the public and audited to return truthful results -- or there's no way to stop me from spending the same coin as many times as I want since no physical transfer of a thing (only a set of digits) occurs.  If I can cause untruthful things to go into the chain or truthful ones to be deleted I can make the "currency" appear or disappear at my whim and thus destroy same.

The problem is that any such system is insanely invasive when it comes to privacy and whenever civil rights can be implicated; if you can link a wallet to a person in any way (in other words, as soon as the "currency" is used to buy or sell something in real life that a person can be tied to), even if only once, the controlling party of that wallet and every transaction ever made with it is indisputably and permanently established.

If ever stores take Bitcon or anything like it then a trivial interception (remember, transactions are public exactly when they occur and cameras are everywhere!) of the perfectly-innocent purchase of a bunch of broccoli exposes everything you've ever done.

All remaining hint of "privacy" in anything financial for any physical good or service ever committed by you will be instantly and permanently destroyed.

Therefore there were no "cold wallets" that held anything; the alleged "money" is gone.

This is the reason that I believe current cryptocurrency designs can never actually find mass adoption as it's a fatal flaw.

The bottom line is that as soon as you use a digital wallet for any transaction that can be observed by person or machine, and thus a single transaction to or from a given cryptocurrency wallet can be physically connected to you, every single transaction ever made in that wallet -- past, present and future -- is linked to you at a standard of proof well beyond any reasonable doubt.  In other words it's not going to be an "allegation" to state you spent BTC 0.whatever at Nevada *****house X, it's going to be trivially proved fact.  Likewise if you buy something that is either illegal or worse, later banned since your precise and immutable transaction history is available to literally everyone in the world all the way back to the wallet's inception either arresting you or going door to door to confiscate same (whether the goons in question are government goons or not!) becomes utterly trivial too!

Think this one through because the risk isn't just governments -- it's everyone.  Yes, such a ledger, once linked to you (that is, just make one mistake ever) means your nice $50,000 purchase of a diamond ring, and exactly which ring it is (assuming the stone is serialized) becomes instantly known to literally the entire world including anyone who might want to make their living stealing said thing.

Do you think the exchanges and designers of these "things" don't know this?  Of course they do.

Now think about the implications of that.

View this entry with comments (opens new window)

2019-02-26 08:50 by Karl Denninger
in Musings , 132 references
[Comments enabled]  

Of course certain sites that begin with the first numeral in the series were trumpeting all the "danger", as were some "media" sites....

For nearly 20 years, a trio of 5-gallon (19 liters) paint buckets sat near the taxidermy exhibit at Grand Canyon National Park 's museum collections building. Those buckets, it turns out, weren't holding paint — they were actually loaded up with uranium ore, a naturally occurring rock rich in uranium that gives off potentially dangerous radiation.

Elston "Swede" Stephenson, a health and wellness manager at the park's South Rim, recently described the uranium find and subsequent "cover-up" in a series of email blasts to Congress, his fellow National Park Service employees and the staff of The Arizona Republic newspaper.

Stephenson warned that thousands of employees, tourists and school groups who visited the exhibit between 2000 and 2018 were likely "exposed" to dangerous amounts of radiation, especially groups of kids who sat for 30-minute presentations in the uranium's vicinity. These children may have been exposed to roughly 1,400 times the safe radiation dosage allowed by the Nuclear Regulatory Commission, Stephenson wrote. Scary stuff, if true.

Yeah, but not true.

Uranium ore is, as the name implies, the natural state of ore dug out of the ground that contains some uranium.  Uranium is slightly radioactive in its natural state.

However, most of the radiation is alpha particles, which are not dangerous provided you do not get the emission source inside your body.

That's because alpha particles are stopped by a piece of ordinary paper, a plastic bucket, a decent amount of air or... your skin (the outer layers of which are dead, and thus can't be harmed.)

If inhaled or ingested it's a different story.  Then alpha is extremely dangerous because alpha particles are quite large and thus, for a given amount of energy, are much more likely to cause a mutation (cancer) than either beta or gamma radiation.

Uranium also gives off a small amount of gamma, but it's low-energy and not dangerous.  I'd have no problem with handling such a rock -- just don't pulverize and inhale or eat it!

So while it's true that if you were to get that stuff in you it would be very bad news, in the state and condition the ore was in while in the buckets it posed no meaningful danger to anyone -- even if they were close to it or even sat on top of said bucket.

But heh, clicks you know..... must have clicks.


View this entry with comments (opens new window)

I've had my Lenovo X220 for a long time.  Time has moved on and yet until this last year I saw no compelling reason to spend money again.  The X220 works great and the "improvements" have been small in number but large in price -- and thus not worth it, in my view.

This last year the X1 Carbon Gen 6 units showed up.  The previous models were nothing special -- but the "6" was nice.  The problem was that "nice" came with a screamingly-stupid price tag, so I passed.  But now you can get the X1 Carbon Gen 6 models in a good configuration (i7, 16Gb RAM and a 500Gb SSD) at a nice price -- refurbished, but still with a decent amount of remaining factory warranty.

Incidentally, Lenovo has a rather nice "companion" app that allows you to (among other things) set the charge controller's maximum charge point on these machines (!!!)  Setting it to 80% will cost you 20% of your runtime but it will double or better the battery's cycle life.  In addition if you're connected to wall power and in the "no-charge window" (e.g. 75%-80%) the system will take its power from the A/C line but not charge, so the battery does not cycle in that state at all.  Setting this is not a Windows thing either -- it programs the charge controller hardware so once set it is persistent even if you boot something other than Windows or the computer is plugged in but off.  I like that a lot -- this ought to be mandatory on any sort of battery-powered mobile device (e.g. a phone), especially if the battery is not user-replaceable.  You know damn well Apple, Samsung and the rest will never do that however since it's part of how they sell both computers and phones -- build them so the battery pukes in about a year and guess what -- you're back in their store!  Oh Tim Crook you piece of crap jackass, why isn't this capability standard on all your MacBooks since you're allegedly the "innovation leader"?

In any event these machines can go 6+ hours of moderate use even with the charge point restriction in place, so you're not giving up much and with this set leaving the unit connected to power does nothing to battery cycle life, unlike virtually every other machine on the market.  Incidentally, the new Coffee Lake processors (Intel Gen 8) are damn fast on a comparative basis.  This is the first "innovation" in laptop CPUs that has been worth spending money on in five+ years, so if you're wondering if it matters -- it does.  In addition these units have Samsung nVME SSDs in them which are blistering fast, plus a Thunderbolt 3 port that can drive external video cards if you wish.  I've seen no reason to "upgrade" from my X220 until now; it's still perfectly functional too, by the way.....

If you want my short list of complaints with "modern" laptops it's the port problem.  Specifically, small and light means compromises when it comes to interior space and thus ports.  Full-size SD slots (for example) consume interior space which is at a premium, so they're disappearing.  Worse, on many machines so are USB Type A connections, which is IMHO utterly unconscionable.  Yes, I know Type C is both smaller and comes with USB-PD, which is superior but there are literally a billion USB-connected devices out there that come with and require a Type "A" plug -- or some sort of adapter -- to use.  Those devices aren't going away for a very long time, and as such having at least one (and preferably two) Type "A" port is IMHO required. Dell has screwed the pooch in this regard with their latest "ultrabook" models; Lenovo has only partially done so (there's no full-size SD slot, but there are two Type A ports.) 

One big advantage of USB-PD connections found on newer devices is that we're moving closer to true interchangeability when it comes to power in the mobile world.  Specifically, I can use the laptop's charger to charge my phone, I can use my phone USB-PD charger (provided it can do 20V output) to charge the laptop (slower, but it should work), my car's USB-PD charger can charge the laptop (I no longer need an inverter) as well my phone and I can use the laptop battery to charge the phone as well.  The latter means that if I need to I can plug the car into the laptop and the phone into the laptop as well on the second USB-C port and both will charge.  This allows me to get rid of multiple things I used to have to carry, or continue to carry them and gain redundancy -- and that's a good thing.

One of the things I find insanely annoying -- and insecure -- is anything Microslug.  Sadly I, like a lot of other people, cannot get away from it in that there's just too much software that I use on a regular basis but is either Apple or Microsoft only.  I prefer a FreeBSD desktop for a lot of things, never mind that I want to do some code development on it when traveling, which of course means I want the code environment I write in 90+% of the time on my laptop.

So if you're inclined the same way I am when it comes to operating systems here's how to dual-boot it -- yes, with UEFI (the "new way of the world.")  Oh, and to do so with full-disk encryption for both environments.  I consider full disk encryption essential on a portable machine because they're much more likely to be lost or stolen than a desktop.  Full disk encryption obviously won't stop someone from stealing the computer but it will make sure if someone does steal it they can't get to any of the data on it.

First, shut off secure boot in the BIOS settings.  That's a Microsoft-signature thing. It does provide (some) security on the boot process, provided you trust Microsoft. I do not, so therefore..... yep.  Note that if you have Bitlocker turned on (and you should if you've been using the machine) the restore process below will result in a non-encrypted Windows installation.  That's fine; you can re-enable it later (and should.)

Next, use Macrium Reflect (the free edition is fine) to make room for a FreeBSD partition.  The best way to do this is to back up the machine (make damn sure you create "boot media" and test it!), then RESTORE all the partitions using that boot media back to the machine's internal disk and, when restoring, resize the system ("Windows") partition to leave an appropriate amount of free space.  100Gb is quite a lot of storage for a user-style FreeBSD system, unlike most WinBlows machines that are flat-out bloated pigs -- which means that pigheaded Winblows and nice FreeBSD will handily fit on a 500Gb nVME SSD and even a 250Gb disk is more than enough (although you may wish to downsize the FreeBSD side to ~60Gb in that event, which is still going to leave you an insane amount of room on that side.)

CAUTION: Do not be tempted to use a partition resizer to do this instead of using Macrium to take a full backup and restore. Several of the below steps have no "are you sure" option or safeties to prevent data destruction; the commands below assume you know what you're doing and take effect instantly.  If you screw up during any of those steps and don't have a backup everything on the machine may be destroyed and it can be rendered unbootable, including any built-in recovery partition.  Without recovery media or a backup and boot media for it you're in big trouble if that happens. Doing it right means knowing you have a good backup and can restore it before you begin, which is exactly what you just did and proved.

Now go here to download his EFI boot manager, then install it.  UEFI machines are supposed to provide a decent set of boot management options but damn near none actually do; this bit of code overcomes that problem.  The pages look sort of scary in terms of the amount of material present; they're not.  You need the "zip" file which contains all the pieces necessary.  Grab the package and read the Windows installation instructions; it's very simple to install this from the Windows command prompt.  You only want the "x64" version (there are three; delete the other two before you copy it over.)  To test the installation reboot; the system should show you a boot menu, but the only "real" bootable option will be Windows.  If you screw up typing something what will probably happen is that Windows will start instead of you getting the menu -- go back and check your work if that happens.  You're now set up to choose multiple operating systems painlessly every time you boot the machine.

Download FreeBSD-12 (the x64 version) from in the memory stick format and use your favorite tool (e.g. "dd" or win32diskimager) to copy it to a USB key or other similar thing (an SD card in a reader works just fine too.)  Note: You want FreeBSD 12.  You can use 11.x if you wish, but the nice integrated encrypted storage option I'm describing here might not work; I'm not sure if the encryption-aware EFI loader was MFC'd back to 11.x.  You can still set up for encrypted disk storage without that but it's a lot more of a pain in the ass to do than what I'm describing here and makes maintenance using FreeBSD's internal tools more-complicated unless you're quite careful. Use 12; it's both more-secure in that there is no "exposed" non-encrypted boot partition and easy to set up by comparison.

FreeBSD's installer should, in theory, be able to handle a "multi-boot" environment with reasonable facility but doesn't and the only option it offers for automatic setup with encrypted storage uses ZFS on the entirety of one or more disks.  That's reasonable on a dedicated machine with multiple drives but not for a laptop or other computer with one disk and a dual-boot requirement -- so you get to do the disk setup by hand.

Now boot the stick with FreeBSD-12 on it.  On the Lenovo hit ENTER on initial start when prompted and then select F12 to change the "default" boot order and select the USB stick from the drop-down menu.  Start the installer but when you get to the disk layout (there will be four choices; one of which is UFS and one of which is ZFS) select manual (it'll warn you that you have to be an "expert.")

You'll get a "#" (root) prompt.

Now type "gpart show | more" and look.  You should see something like "nvd0" at the top -- which is your SSD.  There should be a large unallocated space (marked " - free - ") of the size you left.  Note it, and that it will not have an index number.

If there is no free space of the size you left YOU ARE LOOKING AT THE WRONG DISK.


# gpart add -t freebsd-ufs -l freebsd-root -a 4k nvd0 (assuming your disk is named "nvd0" in the above)

This will tell the system to add a partition for FreeBSD to the disk named, consume all remaining available space in that nice large block and put a label on it of "freebsd-root."  This is probably what you want; the label is optional but will help you avoid mistakes while putting the system together.

Now look again at "gpart show | more"; you should see the freebsd-ufs partition you created.  Remember the index number next to it.  If it's "6" then the disk partition is in /dev/nvd0p6.  The numbers may not (probably will not, if you resized from a backup) be in order.  That's ok.

Warning: If you do any of the following to the wrong partition you will destroy whatever is in it.  There are no warnings or safeties on any of these commands; you're acting as "root", and it is assumed "root" knows what he's doing.  That backup you made as the first step will come in real handy if you screw up here so don't do anything stupid to wherever you put the backup -- like erase or destroy it!

BEFORE you press RETURN in any of the below steps look -- TWICE -- at what you just typed or be prepared to use that backup you made and start over!

# geli init -b -g -l 256 -s 4096 /dev/gpt/freebsd-root  (note that "-l" switch is the letter "l" -- not a numeral one)

This initializes encryption on this partition.  "-b" and "-g" tell the system you are going to boot from it, and that the boot system should ask you for the password.  "-s 4096" sets the block size; 4096 is a good choice with a decent split between performance and XTS fuzzing (security), and matches most SSD page sizes which is important on SSDs.  "-l 256" says to use 256-bit AES instead of 128 and is optional.  There's debate over whether 128 or 256 is more-secure; 256 is a bit slower, but not much.  Note that you cannot change either the sector size or AES length once the partition is initialized without erasing everything in the partition you are encrypting.  Unlike Bitlocker on Windows there is no "encrypt in-place" option.

You will be asked for a password.  Use a strong password and do not forget it.  There is no way to recover anything on that partition if you lose it.  Ever.  Period.  There is no recovery key ala Bitlocker; you either have the password (the system does allow you to set a second one but that's beyond the scope of this document) or there's nothing you can do to get the data back.

When that command completes type:

# geli attach /dev/gpt/freebsd-root

And enter the password when prompted.  If it's correct you'll see a couple of lines announcing the filesystem is attached and another root prompt.  If the password is wrong it will tell you; repeat the command and put in the right one.  If you accidentally put in the wrong device name the password will obviously not work since it's not the correct part of the disk.

Now type:

# newfs -t -J -U -L rootfs /dev/gpt/freebsd-root.eli

Note: The ".eli" name on the end denotes the encrypted partition you just attached.  This initializes the filesystem itself; you are telling the system you are on an SSD and want it to use "TRIM" ("-t"), you want Journaling and Soft Updates (both good for performance and data security / reboot speed) and you also want a label called "rootfs".  The last switch isn't really necessary -- but it's good practice.

Now you have to mount that filesystem where the installer wants it so it can put the operating system on there for you:

# mount /dev/gpt/freebsd-root.eli /mnt

And then create two files necessary for the system to boot when you're done -- an /etc/fstab file to tell the system where the filesystem is you created and a loader.conf file so the system knows where to find the root filesystem and to load the encryption driver during the boot process:

In /tmp/bsdinstall_etc/fstab put:

/dev/nvd0p6.eli / ufs rw 1 1

And in /tmp/bsdinstall_boot/loader.conf place:


"vi" is a good choice to do that, assuming you know how to use that editor.  "echo" will work too (one line at a time.)  So will "ee" (Easy Editor.)

(nvd0p6.eli may be different depending on what you saw above -- if unsure look again with "gpart show | more" and look for the index number of the partition.  Note there is no "/dev" prefix and that ".eli" on the end must be present; that's the attached encrypted copy.  Without it the system won't boot as it will try to read the unencrypted device and will see garbage.)

Now you need to mount the existing EFI partition on the drive and copy in the FreeBSD loader. The UEFI boot manager you installed earlier will be able to find it automatically, but to do so you must place the FreeBSD loader that knows how to scan for and read encrypted disk partitions in the correct place. The following commands will do that (the "#" is the root prompt), assuming "nvd0p1" is your EFI boot partition on the disk:

# mkdir /tmp/mount
# mount -t msdos /dev/nvd0p1 /tmp/mount
# mkdir /tmp/mount/EFI/FreeBSD
# cp /boot/loader.efi /tmp/mount/EFI/FreeBSD/bootx64.efi
# umount /tmp/mount
# rmdir /tmp/mount

Now you can type "exit" at the "#" prompt and you will be back in the installer with all the "bits" in the right place for it to put the system on the disk for you.  Do the other usual things in the installer, including setting up networking and similar.

When you're done let the installer run and finish.  When it goes through the normal process and you reboot you should get a boot manager screen with TWO usable options (there will be others as well); one of them should be FreeBSD's "Beastie Head", and selecting that option should immediately prompt you for a password, which is required to unlock and boot the partition you have just set up.

Congratulations; you can then set up X11 if you'd like (e.g. gnome, etc); be aware that the Carbon Gen 6 wants the "scfb" driver declared for X11 to work which is a bit annoying; a file called "driver-scfb.conf" goes in /usr/local/etc/X11/xorg.conf.d once you have xorg loaded and should contain the following to tell it to probe that driver:

Section "Device"
    Identifier "Card0"
    Driver "scfb"

Without that Xorg's auto-configuration will not find the Intel graphics and X11 will refuse to start.

Now reboot into Windows and turn Bitlocker back on.  Unlike with X220 where I had to do some rather arcane things with the Group Policy Editor to make that work (Bitlocker would otherwise throw up as soon as I booted FreeBSD) so long as you have loaded the UEFI boot manager and the FreeBSD loader into the EFI partition before you do this it should be fine with you switching back and forth between operating systems -- it is on my machine.  Expect it to raise hell if you tamper with anything in that EFI partition after Bitlocker has initialized, but once you've set everything up there is no reason to screw with that area of the disk again, and in fact if someone does it's probably good for the system to raise a stink about it.  Do be aware that if you use Gnome by default it will try to mount all the partitions it can find when you sign in and will complain a lot if you have the Windows partition encrypted (as expected); the best option there is to turn the automount feature in Gnome off.  Be aware that without policy editing Bitlocker is only as secure as your physical machine and the login passwords on it; TPM-2.0 machines will boot a Bitlocker disk without a PIN entry so if your login password is crap or you use the fingerprint sensor the Windows partition is not secure against someone who can guess or spoof either and the very real possibility exists that Microsoft has a way in to such a booted machine via some Redmond-placed back door.

Finally, delete any existing Macrium Reflect backup XML profiles you used for Windows and re-create them.  Attempting to use the old ones from before you resized the partitions will not work since you've changed the partition layout; they will appear to run initially but error out during the process.  Make a final, new base backup for your Windows side and make sure it verifies, then use the FreeBSD tools of your choice to do so for the Unix side so you're protected there as well.

The only "gotcha" I've noticed is that 802.11ac WiFi isn't recognized but I believe this is still a FreeBSD limitation as of 12-RELEASE.  I don't have an external Thunderbolt dock so I have no idea if an external video card will come up, assuming appropriate entries in the x11 configuration files.


Note: The options I specify above in setting up the encryption environment make the basic assumption that the purpose of encryption is to protect against a thief getting access to your data.  If your assumption is that you're trying to protect against a determined adversary with nearly-unlimited resource (e.g. a government, a police force, etc) then you have plenty of work to do before choosing those options -- never mind that Bitlocker on Windows is likely not secure against such an adversary at all.

View this entry with comments (opens new window)

2018-04-20 09:41 by Karl Denninger
in Musings , 133 references
[Comments enabled]  

So, if I want to be "done" there's an easy way to do it.

Sell my LLC -- that runs this joint.

What do you get?

The Ticker -- the (registered) Trademark, the site, the domains, etc.

HomeDaemon-MCP -- as I've posted before.

Permanent RTU (right to use) on the forum / blog code -- we can talk about the source and right to distribute; I might be ok with that too.

And maybe I'll do guest articles from time to time too.

What is this?  A "Make me Move" sort of deal.

You know how to find me (look to the right, fool -- the link is right there.)

Yeah, I'm thinking about it, and it's cheaper now than later -- like next year -- when I can kill the "mandatory" Obamacare policy (which I don't need) and keep as much cash flow as all of the above can generate but the lower income-tax liability on the earnings.

So, if you want it, this is your opportunity to get it -- whether its to have it or to just shut me up.


View this entry with comments (opens new window)