People are adopting Bitcoin precisely because it doesn't include bullshit like arbitrary inflation and demurrage. If you don't like this switch to one of those alternate chains that nobody wants to use instead of trying to change Bitcoin into the opposite of what it is.
|
|
|
Is the reference to the specific version necessary? "v0.85-beta"? Couldn't you just use "master", and then the ebuild will always access the latest version only? The EGIT_COMMIT line could be deleted entirely and it would have the behavior you describe. By convention ebuilds like that are given a version number of -9999 but I don't like that method because the package manager itself doesn't know when an update is available.
|
|
|
A lender is unhealthy if their assets (including loans) don't significantly exceed their obligations (including deposits). A lender is also unhealthy if the value of its assets are overstated, for example, if many of the loans are shaky. It's commonly accepted to consider loans to be assets for the purposes of determining solvency, but I believe this to be an error (and one of the causes of the ongoing financial difficulties since 2008). A loan itself is not an asset - the collateral (if it exists) is an asset. If you really want to determine the financial stability of a fractional lending institution no credit at all should be given for unsecured loans.
|
|
|
Adding the commands to register the icons fixes the issue I was seeing before. The other commands don't appear to be necessary on my KDE setup because your makefile already installs the .desktop files in the right place. EAPI=4 inherit git-2 DESCRIPTION="Armory is a full-featured Bitcoin client, offering a dozen innovative features not found in any other client software!" HOMEPAGE=" http://bitcoinarmory.com/" EGIT_REPO_URI="git://github.com/etotheipi/BitcoinArmory.git" EGIT_COMMIT="v0.85-beta" LICENSE="AGPL-3" SLOT="0" KEYWORDS="~x86 ~amd64" RDEPEND="net-p2p/bitcoin-qt" DEPEND="dev-python/PyQt4 dev-lang/swig dev-python/twisted x11-misc/xdg-utils" src_install() { emake DESTDIR="${D}" install dodoc README } pkg_postinst() { xdg-icon-resource install --novendor --context apps --size 64 /usr/share/armory/img/armory_icon_64x64.png armoryicon xdg-icon-resource install --novendor --context apps --size 64 /usr/share/armory/img/armory_icon_64x64.png armoryofflineicon xdg-icon-resource install --novendor --context apps --size 64 /usr/share/armory/img/armory_icon_green_64x64.png armorytestneticon }
|
|
|
There are .desktop files in the dpkgfiles directory. They get installed but there is no icon for them. As for CXXFLAGS and MAKEOPTS -- I'm not very good with makefiles. I put together whatever I could to make it work. If you have recommendations for improving it, or making it more versatile, I'll be happy to update it.
I know even less about writing makefiles.
|
|
|
It turned out to be easier than I thought. Here is a working ebuild for net-p2p/armory-0.85: EAPI=4 inherit git-2 DESCRIPTION="Armory is a full-featured Bitcoin client, offering a dozen innovative features not found in any other client software!" HOMEPAGE=" http://bitcoinarmory.com/" EGIT_REPO_URI="git://github.com/etotheipi/BitcoinArmory.git" EGIT_COMMIT="v0.85-beta" LICENSE="AGPL-3" SLOT="0" KEYWORDS="~x86 ~amd64" RDEPEND="net-p2p/bitcoin-qt" DEPEND="dev-python/PyQt4 dev-lang/swig dev-python/twisted" src_install() { emake DESTDIR="${D}" install dodoc README } A few things I noticed: 1. There is no icon for the associated .desktop files. 2. The build process doesn't appear to honor CXXFLAGS or MAKEOPTS. 3. Do you have any suggestions about the minimum (maximum?) required versions for the build dependencies?
|
|
|
That was it. I had forgotten there was anything to compile.
If I wanted to write an ebuild for Armory to automate the compilation and install it to a standard location like a real Linux application what files would I need from the source directory?
|
|
|
0.82.4 worked, but now with 0.85 I get this: Setting netmode: 1 (ERROR) armoryengine.py:11323 - Error processing BDM input (ERROR) armoryengine.py:11324 - Received inputTuple: GoOnlineRequested [13, 30068791, False] (ERROR) armoryengine.py:11325 - Error processing ID (30068791)
|
|
|
This assumes that the greatest threat to freedom actually comes from government. I would argue greatest threat to freedom in many cases actually come from big business in the private sector. The distinction you are making is an illusion. Corporations are creations of government. They exist because the government invented the concept of limited liability to shield them from the negative consequences of their actions, thus allowing them to grow artificially large.
|
|
|
Sociopaths also will exist in AnCap, and render their personal brand of hell in all their ways within such a society as well. What is your point again? In a free society the damage sociopaths can cause to society will finally be limited to what they can accomplish via their own efforts instead of amplified by access to armies, nuclear weapons, police forces and taxation.
|
|
|
The possibilities for ironic unintended consequences here is very high. I'd laugh when prohibiting US subjects from betting on Intrade causes Tor-hosted prediction markets to flourish, and those markets start to be used to bet on the lifespans of public figures, and somebody Jim Bells the head of the MPAA.
|
|
|
Idunno how many people will have their wages direct-deposited into their BitInstant CU account for BTC, though. Once once the long-awaited paycard is available I'd set up direct deposit to have my wages converted 100% into bitcoins, but only if the BTC were deposited to an address I control instead of being held in a hosted account somewhere.
|
|
|
Has anything fundamentally changed since February of this year? http://www.schneier.com/blog/archives/2012/02/verisign_hacked.htmlVeriSign Hacked, Successfully and Repeatedly, in 2010
Reuters discovered the information:
The VeriSign attacks were revealed in a quarterly U.S. Securities and Exchange Commission filing in October that followed new guidelines on reporting security breaches to investors. It was the most striking disclosure to emerge in a review by Reuters of more than 2,000 documents mentioning breach risks since the SEC guidance was published.
The company, unsurprisingly, is saying nothing.
VeriSign declined multiple interview requests, and senior employees said privately that they had not been given any more details than were in the filing. One said it was impossible to tell if the breach was the result of a concerted effort by a national power, though that was a possibility. "It's an ugly, slim sliver of facts. It's not enough," he said.
The problem for all of us, naturally, is if the certificate system was hacked, allowing the bad guys to forge certificates. (This has, of course, happened before.)
Are we finally ready to accept that the certificate system is completely broken?
|
|
|
The answer is: it makes MitM attacks dramatically more difficult to execute by an arbitrary attacker. That's the theory, where's the proof? How difficult is it really to get a fake certificate? If every Tom, Dick and Harry can get one basically on demand, the illusion of protection extremely harmful.
|
|
|
Then, I guess we might as well start using http:// for credit cards transactions and email now. Since there's no value added by the CA system... That's a false dichotomy and dishonest. The relevant question is how much value the CA system adds compared self-signed certificates, not compared to unencrypted traffic. What percentage of attackers who want to perform a MITM attack are actually prevented from doing so by CAs?
|
|
|
In other words, a typical story from a typical news outlet.
Usually they put a little more effort into making it less obvious.
|
|
|
Just because there have been security breaches, doesn't mean that the system is useless. Of course it does. If you can't rely on it you don't have security. "This fire extinguisher doesn't always fail, it only has problems when I try to use it. It's fine most of the time."
|
|
|
it is logical and normal to expect people to inform themselves and to stand up against atrocities commited by their government in their name. There are smart ways to stand up against the most powerful government the world has ever seen and there are stupid ways to do it.
|
|
|
|