• Late kudos to Ekaitz for this great PEG contribution, especially RISCV,
which will IMO play a key part in the future of human secure control over
machines :)
• Is there a trustable git repo I could clone to follow future developments
of this work?
• IWBN to have an example do
I have 3 tiny little cleanups to contribute
Morgan Smith (3):
Remove all remaining references to GDS
* HACKING: Update mailing list URL
* doc/README: Remove reference to a tutorial that no longer exists
.gitignore | 2 -
HACKING | 2 +-
doc/README | 3 -
This finished what this previous commit was meant to do:
767dbb1af30500cc0ad44d6bd0e0e179a1191ec6
* .gitignore: Remove "gds-test.debug" and "gds-test.transcript".
* doc/ref/Makefile.am (PICTURES): Remove "gds.eps", "gds.pdf", and "gds.txt".
* doc/ref/gds.dia:
* doc/ref/gds.eps:
* doc/ref/gds.pdf:
The tutorial was killed in commit f75c5849cdc6c863616facbb22b28d08da3fc09f
---
doc/README | 3 ---
1 file changed, 3 deletions(-)
diff --git a/doc/README b/doc/README
index 75c1f7fd6..be21197c2 100644
--- a/doc/README
+++ b/doc/README
@@ -2,9 +2,6 @@ This directory contains documentation on the G
---
HACKING | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/HACKING b/HACKING
index bb10de0c1..375e55d9e 100644
--- a/HACKING
+++ b/HACKING
@@ -21,7 +21,7 @@ What to Hack
=
You can hack whatever you want, thank GNU.
I
Hi,
On 2024-12-23 23:04, b...@bokr.com wrote:
• Late kudos to Ekaitz for this great PEG contribution, especially RISCV,
which will IMO play a key part in the future of human secure control
over machines 🙂
I think I didn't understand your message very well, but just as a
clarific