• 0 Posts
  • 29 Comments
Joined 1 year ago
cake
Cake day: July 2nd, 2023

help-circle
  • For other examples of countries-in-countries, we can look to Switzerland, Germany, and the USA. A casual observation of all three are that their first-level political subdivision is known as a “state” and not “province” or “territory”.

    Swiss history – which I admit I’m not that clear on – shows that the modern sovereign state formed as a loose confederation of smaller kingdoms unifying together. Indeed, the foundational document of the modern Swiss Confederation in 1848 directly drew inspiration from the USA Constitution of 1789. However, they made some modifications, such as having a 7-person Federal Council, which together fulfill the role akin to the American President. That is, the role of Head of State and also Head of Government (aka a Prime Minister). This style of executive governance hews more closely to the rich Swiss traditional of direct democracy, rather than that of a purely representative republic.

    Germany, specifically the successor state of West Germany post-WW2, and then the unified state of Germany post reunification, is a federal republic. A republic to restore the functions of the earlier Weimar Republic, and a federation of states because of USA influence in drafting the Basic Law – Germany’s Constitution – following WW2. But unlike the USA federal system, the German system would mimic the parliamentary system of Westminster, being that of the United Kingdom. So while governmental power is distributed amongst the several states and the federation, the governance would be through indirect election of the Prime Minister. The idea is that by dividing power this way, no mustached fellow with fascist ideas could take control of the organs of power again.

    Finally, examining the oldest continually-operating example, the USA currently is composed of a strong federal entity and 50 US States that wield all remaining power not reserved to the federal government. But initially, this is not what the American Founding Fathers had in mind at all. The late 1700s envisioned the original 13 colonies of the early United States of America to be independent countries that confederated for common causes, like defense and foreign policy. The precursor to the US Constitution – the Articles of Confederation (1777) – tried this, but problems quickly arose because each State had their own currency, debt levels, legal systems, and often undermined each other to advance their own position, such as favoring in-state citizens in lawsuits filed by out-of-state citizens. This made trade difficult and the federal government had little power to do anything about this.

    Even with the revised US Constitution document, the whole weak federal government thing continued until the 1860s during the American Civil War, with the aftermath being a federal government that fully asserted its powers under the US Constitution. Any notion of US States being country-like would have fully evaporated by then, especially during Reconstruction when the Guarantee Clause was used to install military governance in the defeated southern states until reintegration into the Union. Such a thing would be impossible for a modern country/sovereign state.

    Fun fact: the Guarantee Clause is why a US State cannot convert itself into a hereditary monarchy. The Constitution does not allow for a Monarchy of South Carolina, and we’re probably all better off for it anyway. Although if the role was an elected position – like with the Co-Prince of Andorra – then that might be permissible.

    To that end, the modern US State is still a sovereign entity, in that certain things are wholly within their domain and not of the federal government’s. But US States are still beholden to the US Constitution, use the same money as the Union, and must honor interstate commerce and contracts from in- and out-of-state, as well as judicial rulings from the federal court system. But this dual sovereignty system post 1860s continues to evolve, with some states encroaching on federal authority, such as with border control.

    Aspects of these three example countries find their way into most of the modern governments of Western countries, so hopefully this was a useful explainer.


  • I’ll take a cursory stab, but other references exist for the minutiae of how these things came to be.

    Britain == United Kingdom

    Great Britain == an island wholly within the UK

    United Kingdom: a sovereign state (eg USA, Germany) composed of the constituent countries of England, Scotland, Wales, and Northern Ireland, plus a few overseas territories.

    Briton: a British citizen, or someone tracing their ancestry to the UK constituent countries

    The short answer for why a country (UK) can have countries (eg Scotland) in it is because the notion of sovereign states (the modern definition of countries) only came into existence in the 18th century or so.

    Canada, formerly the Dominion of Canada, formed from the British North American holdings plus the French parts that the British bought (ie Quebec). Granted self governance in the 1860s, independence in the 1930s, and finally full “patriation” in the 1980s to remove all vestiges of the UK from Canadian laws. However, the independent Monarchy of Canada remains, and just happens to coincidentally follow the exact same selection rules as the British Monarch. So the King of Canada will be the same person as the King of the United Kingdom, even though the Government of Canada is no longer controlled by the Government of the United Kingdom. In both sovereign states, the King is a figurehead from where authority and governmental legitimacy emanates, and the current King of Canada continues the tradition since Queen Elizabeth II that the Monarch’s appointed Governor-General of Canada shall represent the Monarch in all Canadian matters, meaning the Monarch will not directly involve themselves. In fact, it’s frowned upon for politicians to involve the Monarch directly, except to kindly ask for a new Governor-General (see 1975 Australia).

    Why still keep the Monarchy of Canada? The voters haven’t chosen otherwise, to pursue a republic or any other form of government. The same applies in Australia, although it’s slightly more complicated as each Australian State derives their state-level authority from the Australian Monarch, whereas Canadian provinces exist as a part of the singular Canadian confederation; each Australian State would have to sever their connection to the Monarch, or could do so piece-meal. Nevertheless, with the Monarch delegating power within each of his “realms” to the respective Governor-General, becoming a republic is a matter of passing bills in the parliamentary system. Barbados did exactly this in 2022, replacing Queen Elizabeth II with a republic. Countries formerly part of the British Empire (circa 1930) usually join The Commonwealth of Nations, which just means they’d like to keep trading with each other but without the whole colonialism thing.

    The end of the British Empire was basically slow-going, since once some parts (eg Canada) received a measure of devolved powers (like having their own parliament), the door was swung open for other parts to demand the same. Post WW2, with the status of the UK greatly diminished in deference to the USA and USSR, overseas colonies became expensive and untenable. Plus, one of the basic tenets of the United Nations – put in place to avoid yet another world war – was the right to self determination. So the colonies had to go free.

    Ironically, the Scottish Parliament was not restored until 1998, having legally stopped existing with the Acts of Union 1707 that merged England and Scotland into the United Kingdom, with a single parliament but otherwise separate institutions and laws. To this day, the English Parliament has not been restored, and thus England affairs are directed by the UK Parliament at large.

    The British Isles includes both the Island of Great Britain (where Wales, Scotland, and England are) plus the Island of Ireland (where the Republic of Ireland, and Northern Ireland are), and a few smaller islands. So yes, every part of Great Britain is a part of the UK sovereign state, but the UK also includes the Isle of Mann and the upper part of the Island of Ireland, and some others.

    In all circumstances, “Ireland” means the Republic of Ireland; that republic is almost never called “southern Ireland”. The whole history of British colonialism in Ireland is long, sordid, and full of misery, culminating with The Troubles of the 1960s and still causing concern post-Brexit due to the EU border basically dividing the Island of Ireland.

    TL;DR: everything about British history is messy. Even their former colonies have messy history, despite some being at most a few hundred years old.



  • To start, let’s verify that Bluesky the app is indeed open-source. Yep, it is. But that’s not the same as having all the machinery be open-source, where anyone could spin up their own, compatible service; maybe named ExampleSky. To be compatible, ExampleSky would need to use the same backend interface – aka protocol – as Bluesky, which is known as ATProto. The equivalent (and older) protocol behind Mastodon and Lemmy is ActivityPub.

    ATProto is ostensibly open-source, but some argue that it’s more akin to “source available” because only the Bluesky parent company makes changes or extensions to the protocol. Any alternative implementation would be playing a game of chase, for future versions of the protocol. History shows that this is a real risk.

    On the flip side, Mike Masnick – founder of Techdirt, author of the 2019 paper advocating for “protocols, not platforms” that inspired Bluesky, and recently added member of the board of Bluesky, replacing Jack Dorsey – argues that the core ability to create a separate “Bluesky2” is where the strength of the protocol lays. My understanding is that this would act as a hedge to prevent Bluesky1 from becoming so undesirable that forking to Bluesky2 is more agreeable. To me, this is no different than a FOSS project (eg OpenOffice) being so disagreeable that all the devs and users fork the project and leave (eg LibreOffice).

    But why a common protocol? As Masnick’s paper argues, and IMO in full agreement with what ActivityPub has been aiming towards for years, is that protocols allow for being platform-agnostic. Mastodon users are keenly aware that if they don’t like their home instance, they can switch. Sure, you’ll have to link to your new location, but it’s identical to changing email providers. In fact, email is one of the few protocol-agnostic systems in the Internet still in continued use. Imagine if somehow Gmail users couldn’t send mail to Outlook users. It’d be awful.

    Necessarily, both ActivityPub and ATProto incorporate decentralization in their designs, but in different fashions. ActivityPub can be described as coarse decentralization, as every instance is a standalone island that can choose to – and usually does – federate with other instances. But at the moment, core features like registration, login, or rate limiting, or spam monitoring, are all per-instance. And as it stands, much of those involve a human, meaning that scaling is harder. But the ActivityPub design suggests that instances shouldn’t be large anyway, so perhaps that’s not too big an issue.

    ATProto takes the fine-grained design approach where each feature is modular, and thus can be centralized, farmed out, or outright decentralized. Now, at this moment, that’s a design goal rather than reality, as ATProto has only existed for so many years. I think it’s correct to say for now that Bluesky is potentially decentralizable, in the coarse sense like how Mastodon and Lemmy are.

    There are parts of the Bluesky platform – as in, the one the Bluesky organization runs – which definitely have humans involved, like the Trust and Safety team. Though compared to the total dismantlement of the Twitter T&S team and the resulting chaos, it may be refreshing to know that Bluesky has a functional team.

    A long term goal for Bluesky is the “farming out” of things like blocklists or algorithms. That is to say, imagine if you wanted to automatically duplicate the blocks that your friend uses, because what she finds objectionable (eg Nazis) probably matches your own sensibilities, then you can. In fact, at this very moment, I’m informed that Bluesky users can subscribe to a List and implement a block against all members of the List. A List need not be just users, but can also include keywords, hashtags, or any other conceivable characteristic. Lists can also be user-curated, curated by crowd sourcing, or algorithmically generated. The latter is the long goal, not entirely implemented yet. Another example of curation is “Starter Packs”, a List of specific users grouped by some common interest, eg Lawsky (for lawyers). Unlike a blocklist which you’d want to be updated automatically, a Starter List is a one-time event to help fill your feed with interesting content, rather than algorithmic random garbage.

    So what’s wrong with Bluesky then? It sounds quite nice so far. And I’m poised to agree, but there’s some history to unpack. In very recent news, Bluesky the organization received more venture capital money, which means it’s worth mentioning what their long term business plan is. In a lot of ways, the stated business plan matches what Discord has been doing: higher quality media uploads and customizations to one’s profile. The same statement immediately ruled out any sort of algorithmic upranking or “blue checks”; basically all the ails of modern Twitter. You might choose to take them at their word, or not. Personally, I see it as a race between: 1) ATProto and the Bluesky infra being fully decentralized to allow anyone to spin up ExampleSky, and 2) a potential future enshittification of Bluesky in service of the venture capitalists wanting some ROI.

    If scenario 1 happens first, then everyone wins, as bridging between ActivityPub and ATProto would make leaps and bounds, and anyone who wants their own ATProto instance can do so, choosing whether they want to rely on Bluesky for any/all features or none at all. Composability of features is something that ATProto can meaningfully contribute to the protocol space, as it’s a tough nut to crack. Imagine running your own ATProto instance but still falling back on the T&S team at Bluesky, or leveraging their spam filters.

    But if scenario 2 happen first, then we basically have a Twitter2 cesspool. And users will once again have to jump ship. I’m cautiously hopeful that the smart cookies at Bluesky can avoid this fate. I don’t personally use Bluesky, being perfectly comfortable in the Fediverse. But I can’t deny that for a non-tech oriented audience, Bluesky is probably what I’d recommend, and to opt-in to bridging with the Fediverse. Supposed episodes of “hyping” don’t really ring true to me, but like I said, I’m not currently an invested user of Bluesky.

    What I do want to see is the end result of Masnick’s paper, where the Internet hews closer to its roots where interoperability was the paramount goal, and the walled gardens of yore waste away. If ATProto and ActivityPub both find their place in the future, then IMO, it’ll be no different than IMAP vs POP3.


  • Pew Research has survey data germane to this question. As it stands, a clear majority (79%) of opposite-sex married women changed their family/last name to their husband’s.

    But for never-married women, only a third (33%) said they would change their name to their spouse’s family name. 24% of never-married women were unsure whether they would or wouldn’t change their name upon marriage.

    From this data, I would conclude that while the trend of taking the husband’s last name is fairly entrenched right now, the public’s attitude are changing and we might expect the popularity of this to diminish over time. The detailed breakdown by demographic shows that the practice was less common (73%) in the 18-49 age group than in the 50+ age group (85%).

    Pew Research name change data

    However, some caveats: the survey questions did not inquire into whether the never-married women intended on ever getting married; it simply asked “if you were to get married…”. So if marriage as a form of cohabitation becomes less popular in the future, then the change-your-family-name trend could be in sharper decline than this data would suggest.

    Alternatively, the data could reflect differences between married and never-married women. Perhaps never-married women – by virtue of not being married yet – answered “would not change name” because they did not yet know what their future spouse’s name is. No option for “it depends on his name” was offered by the survey. Never-married women may also more-strongly consider the paperwork burden – USA specific – for changing one’s name.

    So does this help answer your question? Eh, only somewhat. Younger age and left-leaning seem to be factors, but that’s a far cry from cause-and-effect. Given how gradual the trend is changing, it’s more likely that the practice is mostly cultural. If so, then the answer to “why is cultural practice XYZ a thing?” is always “because it is”.



  • I’m not a water or energy expert, but I have occasionally paid attention to the California ISO’s insightful – while perhaps somewhat dry – blog. This is the grid operator that coined the term “duck curve” to describe the abundance of solar energy available on the grid during the daylight hours, above what energy is being demanded during those hours.

    So yes, there is indeed an abundance of solar power during the daytime, for much of the year in California. But the question then moves to: where is this power available?

    For reference, the California ISO manages the state-wide grid, but not all of California is tied to the grid. Some regions like the Sacramento and Los Angeles areas have their own systems which are tied in, but those interconnections are not sufficient to import all the necessary electricity into those regions; local generation is still required.

    To access the bulk of this abundant power would likely require high-voltage transmission lines, which PG&E (the state’s largest generator and transmission operator) operates, as well as some other lines owned by other entities. By and large, building a new line is a 10+ year endeavor, but plenty of these lines meet up at strategic locations around the state, especially near major energy markets (SF Bay, LA, San Diego) and major energy consumers (San Joaquin River Delta pumping station, the pumping station near the Grapevine south of Bakersfield).

    But water desalination isn’t just a regular energy consumer. A desalination plant requires access to salt water and to a freshwater river or basin to discharge. That drastically limits options to coastal locations, or long-distance piping of salt water to the plant.

    The latter is difficult because of the corrosion that salt water causes; it would be nearly unsustainable to maintain a pipe for distances beyond maybe 100 km, and that’s pushing it. The coastal option would require land – which is expensive – and has implications for just being near the sea. But setting aside the regulatory/zoning issues, we still have another problem: how to pump water upstream.

    Necessarily, the sea is where freshwater rivers drain to. So a desalination plant by the ocean would have to send freshwater back up stream. This would increase the energy costs from exorbitant to astronomical, and at that point, we could have found a different use for the excess solar, like storing it in hydrogen or batteries for later consumption.

    But as a last thought experiment, suppose we put the plant right in the middle of the San Joaquin River Delta, where the SF Bay’s salt water meets the Sacramento River’s freshwater. This area is already water-depreased, due to diversions of water to agriculture, leading to the endangerment of federally protected species. Pumping freshwater into here could raise the supply, but that water might be too clean: marine life requires the right mix of water to minerals, and desalinated water doesn’t tend to have the latter.

    So it would still be a bad option there, even though power, salt water, and freshwater access are present. Anywhere else in the state is missing at least one of those three criteria.


  • Specifically for toilet bowls, if you find that a stain won’t shift even after using a normal toilet bowl cleaner solution and a normal toilet brush, don’t try to brush harder as this will scratch the porcelain surface. Also don’t try something abrasive like steel wool or the green/blue side of a kitchen sponge.

    Instead, what you want to do is dissolve the stain. Others have suggested CLR and that might work. But if not, then you can obtain “acidic toilet bowl cleaner”, which contains hydrochloric acid, aka muriatic acid. This will remove most anything normally staining a toilet bowl, but make sure you handle it sturdily and carefully; it can mess you up. Gloves and eye protection are highly recommended, until the bowl is brushed, the stain is gone, and the bowl is flushed. Turn on the bathroom fan or open a window for ventilation during and after cleaning.

    In general, for difficult cleaning jobs, don’t try to clean harder, but clean smarter. If you’re putting your whole body weight into a towel or a brush, there’s almost certainly an easier way. Good luck!


  • Like many things, it’s very fact-intensive, varying in different circumstances. As others have noted, the abilities of the person undertaking the decompilation will influence the decision. But so will strategy: the overall goal can drive how decompilation is approached.

    For example, suppose you’re working for an airline company and need to rewrite some software used on an ancient IBM System/360 machine and was written in the COBOL language, for which no source code is available and you cannot find many people who even know COBOL. Here, since the task is to rewrite the code, decompilation is just to tell you how it works and then you’ll want to write the new program in a modern language. It may be useful to decompile to a different language if such a decompiler is available, say to the C language, which you better understand.

    Sure, it may be that C isn’t what the new program will be written in, but if your C reading skills are sufficient, then this is a valid strategy.

    The skill of a decompiling engineer – or any engineer really – is leveraging your skills and your tools to tractably attack the difficult problem at hand. Many equally-skilled engineers can plausibly approach the same problem differently.


  • The implicit assumption with decompiling code is that the goal is either to inspect how the code works, or to try compiling for a different machine. I’ll try to explain why the latter is quite difficult.

    As you said, compilation to machine code only keeps the details needed for the CPU to accomplish what was instructed. And indeed, that is supposed to be efficient to run on that CPU, by reason of being targeted exactly for that CPU. But when decompiling, the resulting code will reflect the specificity to that same CPU. If you then try to compile that code for a different CPU, it will likely work, but will likely be inefficient because the second CPU’s unique advantages won’t be leveraged.

    To use an example, consider how someone might divide two large numbers. Person A learned long division in school, and so takes each number and breaks it down into a series of smaller multiplications and subtractions. Person B learned to do division using a calculator, which just involves entering the two numbers and requesting that they be divided.

    Trying to do division by blindly giving Person B that series of multiplications and subtractions to do on the calculator is extremely inefficient because Person B knows how to do division easily. But Person B is following Person A’s methods, without knowing that the whole point of this exercise is to just divide the two original numbers. Compilation loses context and intent, which cannot be recovered from decompilation, for non-trivial programs.

    Here is an example why source code is useful when it provides context: https://en.m.wikipedia.org/wiki/Fast_inverse_square_root#Overview_of_the_code . Very few people would be able to figure out how this works from just the machine code.


  • I’ll take a stab at this, although I profess no professional experience in network management and my interest in IPv6 is primarily in advocacy and in homelabs. With that said…

    This seems like a situation where ULAs make some sense, but only for inter-site traffic. So I’d probably first provision for global addressing from each site’s ISP. Then overlay ULA addressing to those sites as well, carving /48 subnets using the procedure from an RFC that I can’t remember, so that the prefixes are randomized. This reduces the chance that a future site will conflict, as well as any conflicts due to mergers and acquisitions of the company.

    Keeping the ULA traffic off the WAN is relatively easy with a reject rule on egress, and the ISP should be dropping that traffic anyway. Keeping global traffic off of the tunnels can be done the same, with reject rules if a non ULA src or dst address is used.

    DNS for internal site resources can use ULA just fine, unless you absolutely need reverse DNS. For resources needing exposure externally, I’m not sure if this plan accommodates that.

    TL:DR: use both ULA and global addresses. Routing rules to reject.


  • If the server is sent a signal to shutdown due to a grid outage, who is telling it the grid was restored?

    Ah, I see I forgot to explain a crucial step. When the UPS detects that grid power is lost, it sends a notification to the OS. In your case, it is received by apcupsd. What happens now is a two step process: 1) the UPS is instructed to power down after a fixed time period – one longer than it would take for the OS to shut down, and 2) the OS is instructed to shut down. Here is one example of how someone has configured their machine like this. The UPS will stay off until grid power is restored.

    In this way, the server will indeed lose power, shortly after the OS has already shut down. You should be able to configure the relevant delay parameters in apcupsd to preserve however much battery state you need to survive multiple grid events.

    The reason the UPS is configured with a fixed time limit – as opposed to, say, waiting until power draw drops below some number of watts – is that it’s easy and cheap to implement, and it’s deterministic. Think about what would happen if an NFS mount or something got stuck during shutdown, thereby running down the battery, ending up with the very unexpected power loss the UPS was meant to avoid. Maybe all the local filesystems were properly unmounted in time, but when booting up later and mounting the filesystems, a second grid fault and a depleted battery state could result in data loss. Here, the risk of accidentally cutting off the shutdown procedure is balanced with the risk of another fault on power up.


  • Answering the question directly, your intuition is right that you’ll want to limit the ways that your machine can be exploited. Since this is a Dell machine, I would think iDRAC is well suited to be the control mechanism here. iDRAC can accept SNMP commands and some newer versions can receive REST API calls.

    But stepping back for a moment, is there any reason why you cannot configure the “AC Power Recovery” option in the system setup to boot the machine when power is restored? The default behavior is to remain as it was but you can configure it to always boot up.

    From your description, it sounds like your APC unit notifies the server that the grid is down, which results in the OS shutting down. Ostensibly, the APC unit will soon diminish its battery supply and then the r320 will be without AC power. When the grid comes back up, the r320 will receive AC power and can then react by booting up, if so configured. Is this not feasible?



  • Trademark law addresses confusion in commerce. So if someone boarded a flight based in part on the flag of the destination, hoping to reach the sunny shores of San Diego but instead landed at the cold shores at Duluth, then perhaps whoever drew up the ad for that flight might be liable for something closer to fraud rather than trademark violations. Maybe the Visit California department could raise a trademark challenge, but that’s an uphill battle because it’s not disallowed to use a state flag in other situations.

    Texas Roadhouse, a chain of BBQ restaurants, flies the Texas flag on their buildings. And while they do heavily lean into the whole Texan thing, no one is under the impression that Texas Roadhouse is an official arm of the State of Texas, to proselytize the BBQ religion to people far and wide, or some such.


  • I’m not a lawyer, but I’m willing to have some fun with this idea.

    A cursory review of the relevant California Government Code section 420blaze it! – provides a description of the California state flag, and also a picture of it. Or it would in the print version of the code. While there doesn’t appear to be a specific bit of law which authorizes the state to retain the copyright on the flag, there is case law which disallows the state from retaining copyright for “government documents”, with exceptions which wouldn’t apply here. So it’s reasonable to assume that California doesn’t have the copyright on its state flag, with it likely being in the public domain.

    This would suggest that Minnesota could indeed use the flag to mean something else, the same way anyone can with public domain material. Now, if this occurs outside of California, that state could not enforce any sort of rules pertaining to how the flag is used. Even within the state, California’s authority to control how public domain material – or more broadly, any material at all – is circumscribed by the First Amendment in any case. The exception would be for those agencies and subdivisions of the state itself, which it can and does control. See Gov Code section 435, which disallows cities from having confusingly similar flags. The other exception would be uses of the flag which perpetuate fraud or some other related crime, since then it’s not the speech being punished but the conduct, which happens to involve a flag-related expression. But neither of these really speak to the flag being used by another sovereign entity within the state.

    Supposing for a second – and this is where we’re really departing from reality – the several states had embassies at each other’s state capitals, but without the equivalent protections afforded by the Vienna Convention on Diplomatic Relationships. And by that, I mean each state buys land in other states, without creating sovereignty issues, owning that land as any other individual or corporation could. In such a case, if the Minnesota Embassy in Sacramento were to fly the flag of California as its own, what could California do? If they drafted a law like section 435 that applies to individuals, the First Amendment would present a barrier. If the law applies to out-of-state entities, it might run against the Dormant Commerce Clause, in a very broad interpretation of interstate commerce. If they apply it to all sovereign entities operating within the state – which would include the Minnesota Embassy, since the State of Minnesota owns it – then the thorny question of state sovereign immunity in state court would arise.

    In a California state court, would the State of Minnesota have sovereign immunity? If instead of Minnesota, it were a foreign country like Scotland, the answer would be a resounding yes. But here is a state vs state issue. The proper venue would be a court with original jurisdiction over states, and there’s only one of those: the US Supreme Court.

    As to what the state of California would assert as a cause of action? I suppose they could raise a criminal violation of their freshly-drafted law, with the risk of devolving into whether a US State has its own rights of free speech, which other states must respect. Alternatively, they could raise an action in equity, such as a tort (MN’s use of the flag is costing CA somehow) or defamation (MN’s use of the flag asserts falsehoods about CA).

    At this point, we’re deep into legal fanfiction and it’s time to stop haha. Needless to say, I think the situation in real life would be messy if it were to happen.


  • With the way that the BitTorrent v2 protocol works, each file of the original, underlying torrents wouldn’t have to be re-seeded, but rather would reuse each file’s individual hash and thus incorporate those files into the meta torrent without necessarily having to download or even upload any part of the meta torrent.

    That said, the .bittorrent file would be massive and might run up against certain limits in the current protocol.