Conversation
Notices
-
@charlie_root @kirby @sysrq
> just stating why it wasn't a good fit for my use cases.
You've got to know a thing before you evaluate it, but a rush to evaluate it is not useful either. "This is what people can do with this thing" is useful, and then there's taste (I do not like OSX or Windows, but may be obliged to use one or the other for something), but there's nothing that's a bad fit for every use case or nobody would use it.
I mean, you're doing music; you could do bytebeat on Plan 9, there's a port of ORCA, but I think it's not a media-focused OS in general, it's probably not a good fit for what you do. It *is* a good fit for some sysadmin stuff, even stuff like network dashboards on the monitor plugged into a broken Thinkpad. (See attached.)
> you have to understand, not everyone is on your level of computing and patience with these things.
Things you don't like, I have nothing to add except "I like that" or "I didn't like it but it grew on me or turned out to be an advantage" or "I also do not like it but the trade-off is worth it or I patched that behavior or something". But as far as what not everyone can do, I don't know, I don't think Plan 9 is a great OS for everyone, but the Linux disease where everything that doesn't run Linux is bad and wrong. Plan 9 works fine as *an* OS rather than the One True Only OS.
> video creator said that it's one system for many machines approach was antithetical to computer security,
I'm not sure where he got that idea, unless he means something broad about heterogenous networks (and is using it to make an argument...narrowing the choices). I don't think it's ever been the One System, but it's got a really nice security model that completely gives up on untenable things (no "root", physical access to a machine means physical access to the machine so you secure network resources instead of accounts on boxes, etc.). factotum gives you all kinds of cool shit and had locked down the auth service back when you had to invent that kind of thing to have it. A program (ssh, mail client, whatever) wishes to authenticate itself, it asks factotum, factotum either serves up auth data or pops up a box that gives the user the opportunity to type in a password, and you can selectively hide this from programs (infinitely malleable namespaces). If you don't have root on a Unix box, it's hard to hide ssh-agent from a program you run and nearly impossible to hide it from root, but on Plan 9, you can hide it from anyone except the person with physical access to the machine, and if you are using Plan 9 by PXE-booting a terminal and running from memory (thus being the only person with physical access to the machine), then the plaintext of your secstore doesn't even need to leave the machine and is gone when you log out of your terminal in the normal Plan 9 manner: you just turn the machine off. This is pretty cool.
screenshit.png