From mboxrd@z Thu Jan 1 00:00:00 1970 Date: Wed, 20 Aug 2008 13:56:51 +0100 From: Eris Discordia To: Fans of the OS Plan 9 from Bell Labs <9fans@9fans.net> Message-ID: <9857CD0765466E1BE9BD9051@computer> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Content-Disposition: inline Subject: Re: [9fans] Using the Acme Editor Topicbox-Message-UUID: 02a02f06-ead4-11e9-9d60-3106f5b1d025 > The ascii that is 8 bits is not the true ascii. I answered that one. > No. Private namespaces. And how does that solve the problem of whom to trust with mounting? Or with configuring a network interface? If someone has access to, say, eth0 then they have access to eth0. No amount of private namespaces keeps them from reading everything that goes through eth0, including other users' unencrypted traffic. Plan 9's model says if you have physical access to a terminal there is no way to secure _that_ terminal against your mischief. Therefore, it totally trusts you _that_ terminal. However, your home computer doesn't run only a terminal. To be usable, it has to run at least a cpu and an auth, in addition to a term. Now, where is the difference between running authentication on the same machine as the terminal and the traditional UNIX way of keeping authentication/authorization databases on each machine? Or from Kerberos' distributed authentication model? > Sorry, that should have been "no such file or directory". You need a > mkdir. The directory could've been there beforehand. In any case, your deflection has nothing to do with the fact that Pietro Gagliardi's demand for "a few commands" to accomplish a certain task has been supplied with an adequate UNIX answer. He's under the false impression that abstraction actually _does_ things, and that because Plan 9 has an everything-is-a-file model it is any more trivial to access a cell phone over its proprietary communication protocol over the cellular network. An impression perpetuated by the 9people. --On Wednesday, August 20, 2008 5:53 PM +0800 sqweek wrote: > On Wed, Aug 20, 2008 at 5:15 PM, Eris Discordia > wrote: >>> Wow. Does memorising codepoints fall under your job description aswell? >> >> No. I looked it up in Microsoft Windows' Character Map. Saw it was below >> 255. Knew UTF-8 corresponds to ASCII in lower character codes (not sure >> 7-bit or 8-bit). Figured it could as well be 8-bit ASCII. > > The ascii that is 8 bits is not the true ascii. > >>> ifconfig: only root can do that >>> mount: only root can do that >> >> Funny, but then not funny. >> >> What's the Plan 9 way of solving that? Trusting the user at the terminal? > > No. Private namespaces. > >>> cp: /mnt/cell: permission denied >> >> Why "permission denied?" > > Sorry, that should have been "no such file or directory". You need a > mkdir. -sqweek >