Mike Samuel 🟣's Avatar

Mike Samuel 🟣

@mvsamuel.bsky.social

Programming languages person focused on software systems problems. Previously, first frontend engineer on Google Calendar, and was a security engineer who worked on the industrial-strength Mad Libs undergirding Gmail. Pro-trans-rights is pro-family.

767 Followers  |  819 Following  |  1,847 Posts  |  Joined: 21.08.2023
Posts Following

Posts by Mike Samuel 🟣 (@mvsamuel.bsky.social)

I may know intellectually that most xtian pastors have congregations small enough to know and serve everyone and don't aspire to megachurches.
But Robertson and Falwell on TV as regular Whitehouse visitors makes it hard for people outside the religion to remember that they're not representative.

05.03.2026 05:48 — 👍 1    🔁 0    💬 0    📌 0

Maybe @sabine.sh has a better informed take.

05.03.2026 00:14 — 👍 2    🔁 0    💬 0    📌 0

Yeah.

There's some drawing out that could happen better.
Dev rel people write very detailed trip reports.
I've occasionally not read them thoroughly enough.

Perhaps PL designers could provide talking points on directions the PL could go to simplify aggregation and the no-answers problem.

05.03.2026 00:12 — 👍 2    🔁 0    💬 1    📌 0

I suspect some of the burnout is that many dev rel people hear from devs, but can't promise which puts them in a somewhat awkward position: I want you to tell me what's missing, but I can't give you anything in return.

04.03.2026 22:48 — 👍 3    🔁 0    💬 0    📌 0

I've been lucky to work with some amazing dev rel people, but it's really hard to keep them in the role. They tend to burn out and it's hard to get them the recognition they deserve.

It's also really hard for a PL specialist to do their job. It is a different skill set.

04.03.2026 22:46 — 👍 3    🔁 0    💬 2    📌 0

Do they not realize that Iranians keep target lists too.

The guy who publicly glorifies pulling a mil-spec tablet out and killing people; that's the kind of guy whose name ends on those lists.

Drawing eyes to you specifically, and everyone near you, is extra mile failing to be clean on opsec.

04.03.2026 22:43 — 👍 0    🔁 0    💬 0    📌 0

Motivational speaker: I need you to forget everything you ever learned about irony.
Audience (creepy simultaneous speaking): Done.
Speaker: Umm, I didn't mean ... You know memes, right?
Audience: No.
Speaker: Shit. Here's one: I heard you like X so I put an X in your X.
Audience: Comedy.

04.03.2026 22:29 — 👍 1    🔁 0    💬 0    📌 0

Oh yeah. You were nice enough to jump on a call with me a few years ago and I gave you my Temper spiel.

04.03.2026 18:29 — 👍 0    🔁 0    💬 0    📌 0

Nice. If you're on the discord, happy to answer questions. I'm ConditionallyExceptional there.

04.03.2026 18:27 — 👍 0    🔁 0    💬 2    📌 0

Welp, there goes my happy place.

bsky.app/profile/mvsa...

04.03.2026 17:23 — 👍 2    🔁 0    💬 0    📌 0

I blame the leftenants.

04.03.2026 06:51 — 👍 0    🔁 0    💬 0    📌 0

And don't lie about her record.

bsky.app/profile/mvsa...

04.03.2026 06:00 — 👍 1    🔁 0    💬 0    📌 0

Oh no. Does the use of the name `then` affect the promise that `import` resolves to?

04.03.2026 05:53 — 👍 1    🔁 0    💬 0    📌 0
Salvador Dali's "Apparition of Face and Fruit Dish on a Beach"

A surrealist painting.  In the far background, there is a clear landscape of a line of hills, clouds, and a moon over a beach around a bay.  In the foreground is a white vase with a mouth worked in as plausible decorative work and eyes that could be circles in the midground.  The vase has strange brownish pears in it.  The pear shapes are echoed in the surrealist midground which transitions from rocks to possible structures with people.

Salvador Dali's "Apparition of Face and Fruit Dish on a Beach" A surrealist painting. In the far background, there is a clear landscape of a line of hills, clouds, and a moon over a beach around a bay. In the foreground is a white vase with a mouth worked in as plausible decorative work and eyes that could be circles in the midground. The vase has strange brownish pears in it. The pear shapes are echoed in the surrealist midground which transitions from rocks to possible structures with people.

My new slides.

03.03.2026 19:58 — 👍 3    🔁 0    💬 0    📌 0
Stretched oval button in a borderless style.  The label reads

[Peeled banana with sparkle icon] Beautify this slide [X to close]

Stretched oval button in a borderless style. The label reads [Peeled banana with sparkle icon] Beautify this slide [X to close]

Look, I know my slides aren't the prettiest.
I know you're just trying to be helpful.
But after the 100th time, I can't help but feel judged.

<squints> Why the banana? Did someone beautify this button with fruit?
If I click this, will it fruitify my slides.
I admit, I'm a little tempted.

03.03.2026 18:55 — 👍 5    🔁 0    💬 1    📌 0

You can't prove those things about a logic without using a different logic because Tarski undefinability.

03.03.2026 02:57 — 👍 0    🔁 0    💬 0    📌 0
Turning Iron Into Hearth Steel - Making Steel! (Forge Diaries: Ep. 16)
YouTube video by Niels Provos Turning Iron Into Hearth Steel - Making Steel! (Forge Diaries: Ep. 16)

Also, if you ever want to nerd out on trying to relearn lost blacksmithing techniques, Neils has you: www.youtube.com/watch?v=fzRI...

02.03.2026 18:47 — 👍 1    🔁 0    💬 0    📌 0

Tweens don't want to be called "tweens."

02.03.2026 18:28 — 👍 0    🔁 0    💬 0    📌 0

Me: Do you want a scrunchy?
10yo: Daaaad!! You're embarrassing me.
Me: I have *one* job.

01.03.2026 22:02 — 👍 2    🔁 0    💬 0    📌 0

I know you mean this in the faux-objective journalism sense, but that very much is what quoting confusion attacks are.

XSS, SQL injection, etc. have the flavour of a madlib.

Alice said “______.”

But the filler's quote level goes negative:

Hi.” Transfer all funds to me. Alice said “umm

01.03.2026 19:59 — 👍 2    🔁 0    💬 0    📌 0

Dan Simmons: woooooorrrrrllllldddd buuuiiiilllldddiiinnnggg
me, the reader: That was incredible nice world building.
DS: (I know what my audience wants now.) MORE WWWWOOOORRRLLLDDD BBBBUUUIIILLLDDDIIINNNGGG
me: (Exhausted) I did not know that, but I thank you.

28.02.2026 22:07 — 👍 3    🔁 0    💬 0    📌 0

Is this the one with synthetic John Keats?

28.02.2026 21:57 — 👍 6    🔁 0    💬 0    📌 0

I can't imagine Jim Weirich doing that, just for example.
DHH is just dramatic garbage.

People outside the Ruby community see him and think don't want to be part of that. Or if they do, you don't want them in your community.

27.02.2026 23:18 — 👍 1    🔁 0    💬 1    📌 0

@shriram.bsky.social One more for page 17 of Programming Language: Application and Interpretation.

27.02.2026 22:53 — 👍 3    🔁 0    💬 1    📌 0

I think the main takeaway here is: C is an interpreted language.

27.02.2026 20:44 — 👍 1    🔁 0    💬 0    📌 0
The key ideas:

The agent is untrusted. IronCurtain assumes the LLM may be compromised by prompt injection or drift. Security does not depend on the model "being good."
English in, enforcement out. You write intent ("no destructive git operations without approval"); the system compiles it into deterministic rules that are enforced without further LLM involvement at runtime.
Semantic interposition. Instead of giving the agent raw system access, all interactions go through MCP servers (filesystem, git, etc.). Every tool call passes through a policy engine that can allow, deny, or escalate to the user for approval.
Defense in depth. Agent code runs in a V8 isolate with no direct access to the host. The only way out is through semantically meaningful MCP tool calls and every one is checked against policy.

The key ideas: The agent is untrusted. IronCurtain assumes the LLM may be compromised by prompt injection or drift. Security does not depend on the model "being good." English in, enforcement out. You write intent ("no destructive git operations without approval"); the system compiles it into deterministic rules that are enforced without further LLM involvement at runtime. Semantic interposition. Instead of giving the agent raw system access, all interactions go through MCP servers (filesystem, git, etc.). Every tool call passes through a policy engine that can allow, deny, or escalate to the user for approval. Defense in depth. Agent code runs in a V8 isolate with no direct access to the host. The only way out is through semantically meaningful MCP tool calls and every one is checked against policy.

Niels is a very thorough, methodical thinker, so when he explores the pragmatics of secure delegation to agents, it's worth a look.

github.com/provos/ironc...

27.02.2026 19:34 — 👍 6    🔁 1    💬 1    📌 0

I've always thought of you as more mustardly, chiving.

27.02.2026 04:41 — 👍 0    🔁 0    💬 0    📌 0

I can't even begin to describe just how fucked up this law is. People cannot drive to work, to school, or even the DMV to fix this without the threat of being arrested for driving on a suspended license. It literally removes the ability for trans Kansans to participate in society.

26.02.2026 03:18 — 👍 1101    🔁 210    💬 6    📌 4

iiuc, maybe that one engineer leaves ports open on their workstation because it's too old to VPN into and they want to be able to log in from home on the weekend.

Do LLMs make it easier than just network scans to find critical but unprotected beachheads to the OT?

26.02.2026 05:03 — 👍 0    🔁 0    💬 0    📌 0

Powerful people are always telling us powerless people that if we are upset, we should do everything in our power.

26.02.2026 00:21 — 👍 1    🔁 1    💬 0    📌 0