On Sun, Dec 9, 2018 at 10:32 PM Ronald Oussoren via Python-ideas <
python-ideas@python.org> wrote:
> BTW. I wonder how many actually verify these checksums,
>
Hardly anyone -- most of us verify the download by trying to use it :-)
Which doesn't mean that we shouldn't have it -- but it will
On Mon, Dec 10, 2018 at 5:23 AM E. Madison Bray
wrote:
> Indeed; I believe it is very useful to have a map-like object that is
> effectively an augmented list/sequence.
but what IS a "map-like object" -- I'm trying to imagine what that actually
means.
"map" takes a function and maps it onto a
On Tue, 11 Dec 2018 09:31:36 +1100
Steven D'Aprano wrote:
> Hi Max, and welcome!
>
> On Mon, Dec 10, 2018 at 09:47:07PM +, Franke, Maximilian Julian Shawn
> wrote:
> [...]
> > We are currently looking into implementing TAPS, a novel way to offer
> > transport layer services to the
Hi Max, and welcome!
On Mon, Dec 10, 2018 at 09:47:07PM +, Franke, Maximilian Julian Shawn wrote:
[...]
> We are currently looking into implementing TAPS, a novel way to offer
> transport layer services to the application layer.
[...]
> TAPS is currently being standardized ...
> Here you can
Hi,
I am a student worker with the Internet Networks Architecture department at TU
Berlin and I am working with APIs for network protocols.
We are currently looking into implementing TAPS, a novel way to offer transport
layer services to the application layer.
The idea is to offer an API on
A Hash is surely useful in the context of locking versions of software
packages in Pipfile.lock because we tell us that the code we are
downloading has not changed since the first we saw this particular version
of the package, but only a signature scheme tell us with a reasonable
degree of
My two cents.
Automation tools should check the PGP signature. The public keys should be
obtained once via https from an odd number of different trustworthy sources
from a set of well know domains that use DNSSEC. Users should be advised to
check the certificate chain from those domains at the
If the discussion gets to which SHA-2 should be used, I would like to point
out that SHA-512 is not only twice the width of SHA-256 but also faster to
compute (anecdotally) on most 64-bit platforms.
___
Python-ideas mailing list
Python-ideas@python.org
On Sun, Dec 2, 2018 at 11:52 PM Greg Ewing wrote:
>
> Steven D'Aprano wrote:
> > Perhaps more like the principle of most
> > astonishment: the object changes from sized to unsized even if you don't
> > modify its value or its type, but merely if you look at it the wrong
> > way:
>
> Yes, but keep