That's unlikely due to extremely high taxes in the EU for individuals. People who know their stuff tend to migrate where they get more in return for their talents.
I'd call it luck.
I doubt that in the planning stages they could anticipate the auto industry order-then-Pandemic-cancel-then-order-again wave that messed up the logistics of the semiconductor industry.
I feel Europeans looking in on the US from the outside consistently have a misleading view on healthcare. I'm saying this as a European in the US working in big tech.
My plan's maximum out-of-pocket in a year is ~$3k, which I can pay pre-tax thanks to an HSA. It is less than 2% of my total comp in the worst case (in 2020 I spent less than $300 on healthcare). In return I get coverage that is generally better than the free public healthcare back in Europe.
I think CoL is similar, but not as clear cut. One thing CoL discussions often miss is that many expenses are independent of the local CoL; for example, a Macbook Pro costs the same in every US city. If your salary adjusts exactly for CoL, you're actually doing better because of this.
Spread out over time, in the places I lived outside of the US that was not really a concern. Same with most other "social care" situations. In the US, it all felt a lot more tenuous which was a source of constant low-key anxiety.
For a specific example take signing git commits. Even fossil scm delegates this task to pgp. Personally keybase is the only project that may provide some form of alternative, but they do so by supporting pgp.
I definitely agree that PGP was and is no longer the correct tool for every use case as it sort out to be, but I find there are still pockets where PGP has no alternative. I'd be interested what HN's thoughts are on PGP for this specific use case and if there could be an alternative.
Deleted Comment
Deleted Comment
For signing SSH certificates, we run a small service (prototype code dump at https://github.com/pardot/sshsigner) that uses this key to sign short lived certificates. Auth to the service is via OIDC issued ID tokens.
On the client side we have a custom SSH agent that uses an ephemeral in-memory private key. The agent manages the OIDC web flow and calling out to the service for signing on demand. This lets us keep the cert duration small and scoped, and allows us to force re-auth for sudo etc. via the web flow.
We also do a similar thing for host keys, IAM auth the instances and sign certificates.
Altogether works well, provides a nice user experience, and keeps long-lived/leakable creds out of out environment.