Hacker Newsnew | past | comments | ask | show | jobs | submit | CapacitorSet's commentslogin

This reads a lot like a PR piece for Amazon, with most "answers" promoting Amazon nearly like a press release and very little negative points.

A few sentences that stand out:

> If you have a ton of data in your data center and you want to move it to AWS but you don't want to send it over the internet, we’ll send an eighteen-wheeler to you filled with hard drives, plug it into your data center with a fiber optic cable, and then drive it across the country to us after loading it up with your data.

> Q: I know there have been a number of collective actions among Amazon warehouse workers around the issue of safety during the pandemic. > A: (a series of measures implemented at Amazon)

> Internally, people say, “Oh, we’re probably better than our competitions, or other warehousing and logistics companies.”

> Q: Has Ring brought Amazon into much closer relationships with law enforcement? > A: it would really surprise me if any of those relationships were the result of the Ring acquisition [...] I think Amazon also kind of backed into that situation. We only realized after the fact that we had all this data about who was coming to people’s front doors.


This absolutely has to be a PR piece, or one filtered through a marketing layer of some sort. The only thing that threw me for a loop are the negative points, but this could just be a clever ploy to further the deception. The company we pay to do marketing has all kinds of ridiculous tricks they propose, so I wouldn't be surprised if this is a thing.


Speaking as someone who worked in the PR sector. This reads like an article crafted to influence public opinion by polish the truthful elements while downplaying their flaws.

It's been established that "selective whistleblowing" articles are deemed to be more trustworthy than official marketing statements. Therefore, it would be foolish for corporates to not exploit that to their advantage.


Or moral.


I find it very hard to belive a cyber security engineer knows that much of the wider company and it's history.


This seemed like a fairly normal level of knowledge to me, honestly. There's a lot of public information about the company, and you work there so you want to learn and know more - from both internal/external sources. Anything you found particularly surprising?


It seems that the cruft really boils down to using groups even where there is no ?/*/+ qualifier.


>a very convincing page on śtellar.org

If you rarely use IDNs, toggling `network.IDN_show_punycode` in about:config can help with that - you would have seen `xn--tellar-2ib.org`.


Thanks, I had originally typed up the URL in the comment with https:// and HN did convert to punycode, foiling the attack. I never use IDNs, even though I'm in Greece, so I've set that option, thank you.


>I’ve met several founders who wanted to enable tele-medicine years ago but decided against it because “the lawyers cost more than the engineers”, and walking-on-eggshells destroys morale & iteration speed.

Thankfully so - I wouldn't want my telemedicine to rely on eg. some random unsecured Mongodb instance.


I feel like the article went way too much over aspects like TPDNE and the non-existent lawyer, which - while being useful to know - are somewhat poor indicators of fake profiles especially in a tech circle. I personally know a few people who use TPDNE profile pictures and many who use fake names, although none do both (a wise thing in this day and age). The rest was quite lacking.


>$0.11/hr Spot instance of a g2.2xlarge

I'm not an AWS user, but don't spot instances risk being shut down/paused/etc at any moment? It seems like a bad solution for remote gaming.


Yes they may get terminated within 2 minutes of creation. Thats why they are cheaper. Still this is a demo of what can be done and what's possible now. This can never be used for any reasonable gaming as its volatile.


The world is running at full speed towards a dystopia where private companies are more powerful than entire countries.


Which appears to have been one of the main aims of WTO and most international trade deals over the last 30 or so years.


What if these countries pass laws to require ISPs to rewrite the SOA for the .amazon domain and point it to an alternate root controlled by the ACTO?

Morocco banned Google Maps after they displayed a border with Western Sahara. Now if one requests a Google map of Morocco from within .ma, they get a version without the border.


Like the Dutch East India company?


> Like the Dutch East India company?

No, not like that. The East India Company had independent military power. ICANN does not.


All the fingerprinting tools I've seen so far do not include JA3 signatures, which in my opinion make for an interesting bit of information - they introduce few bits of entropy since they depend on the TLS implementation, but for the same reason they can't be easily spoofed.

Plugging in an article and demo I wrote some time ago: https://jwlss.pw/ja3/


I was going to mention the lack of TCP and TLS fingerprinting too - I wonder if those are actually used by rogue advertisers?

Also, I guess TLS fingerprints would change over time, with browser upgrades, although I'd expect changes to be relatively infrequent.


Interestingly enough the JS source is not obfuscated, merely minified with no name mangling.


Fractions of nanometers close? That's some insane precision.


In aviation “nm” stands for nautical miles.


It’s usually written NM.


Regardless of what’s technically correct, I see “nm” way more often than “NM” in aviation contexts.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: