My opinion: Anytime you share code by posting it publicly, you should always be prepared for negative feedback. In some cases that might be the whole point of posting it: you want to learn from your mistakes.
It's funny what Torvalds said about "good taste" because I have had the same sort of idea for years. But I'd never heard any programmer articulate it as such. I also call it "sensibilities". I have no clue if his idea of what is "good taste" is even remotely similar to mine, but it's interesting that he also thinks about this notion of "good taste". I can eliminate programmers and programs very quickly using this sort of qualitative assessment. It might not even be necessary to see any code. Just knowing how they would approach a problem, how they would design a solution (Rube Goldberg machine), and of course what language they would use says something about their "tastes". It's not so much a matter of what they do or don't know how to do, it's their selections from among different choices. Imagine hypothetically a programmer knows every language and can implement any design. The language he chooses and the design he chooses tells us about his "taste".
I don't believe he said he liked VB, he actually said as a language it isn't great. What he did say is that the way it simplified database access gave us something extremely powerful and influential even though it was not (and isn't) seen as particularly disruptive or new. This seems inline with other statements from Linus w.r.t. the value of C++ and OOP in general. A very pragmatic man. I believe it also aligns with many of the answers to what will be the "next big thing.".
Whatever you do, do NOT turn off Javascript, or stop using Microsoft products like Windows, or Adobe products like their "Flash" player or even their seemingly harmless PDF viewer.
Don't be fooled into thinking these "highly sophisticated" hackers need such things in order to succeed in their "exploits".
And even if they did, the costs of NOT using Javascript, Microsoft and Adobe far, far outweight the benefits.
</sarcasm>
Nevermind the word "lethal", I've always wondered by the word "attack" was chosen within the cryptography/computer security world. Maybe someone knows the history behind it? Once you get used to this term it's seems normal. But at first it's a bit strange. Playing around with computers and binary numbers seems like the furthest thing from an "attack" one could imagine. But I guess it goes without saying that computer nerds have very vivid imaginations.
The author says:
"Or it can form the backbone of a rich, full-powered Javascript command-line, inspired by "perl -pe", and doing for structured data what sed, awk, and grep do for text."
But... "structured data", at least in his examples (and nearly all the JSON I see on the web), is... text. Does his perl script handle binary json?
The author says:
"Try doing THAT with any other CLI one-liner!"
Indeed I will, since I do not know perl. Should I learn it?
The folllowing seems to work, but I only tested it on the author's earthporn.json example
1. compile CamelCase filter called yycamel
2. compose throwaway sed oneliner to massage the text
3. pipe through unicode to ascii filter (not included)