Though I guess it would be nice as somebody in my 20s to picture that my future is an established track to follow.
Though I guess it would be nice as somebody in my 20s to picture that my future is an established track to follow.
I appreciate the feedback on the writing!
I say this as someone who uses both.
Loading parent story...
Loading comment...
This is sort of the whole point of elections. The government's core interests are not static. When the article says "always", it's from the frame of reference of the current administration, and it's pretty standard for whoever is the current administration to speak as if their stance has always been correct and will always be correct.
The framing here is that "America" always holds these things to be true, and any past discrepancy from that was due to bad leadership. This writing style isn't unique to today's administration, you can find examples from basically any government across history.
One of the setups that gives me issues is machines that are resumed from a historical snapshot and start doing things immediately, if the NTP date hasn't been updated since the last snapshot you start getting issues (despite snapshots being updated after every daily run). Most sites won't break (especially with a 24h window, although longer always have issues), but enough sites change their certs so frequently now, it's a constant issue.
Even with a 10 year cert, if you access at the right time you'll have issues, the difference now is it isn't a once in a 10 year event, but once in every few days some times.
Perhaps if TLS clients requesting a time update to the OS was a standardized thing and if NTP client daemons supported that method it would be a lot less painful?