Hacker Newsnew | past | comments | ask | show | jobs | submit | andyjohnson0's commentslogin

> For some reason, Reko was not able to decompile this code into a C representation, but it still produced a disassembly, which will work just fine for our purposes.

Perhaps an indication that the code in that segment was hand-written in assembly language rather than C?


> In the late 90s/early 00s, I worked at a company that bought a single license of Visual Studio + MSDN and shared it with every single employee.

During roughly the same time period I worked for a company with similar practices. When a director realised what was going on, and the implications for personal liability, I was given the job of physically securing the MSDN CD binder, and tracking installations.

This resulted in everyone hating me, to the extent of my having stand-up, public arguments with people who felt they absolutely needed Visual J++, or whatever. Eventually I told the business that I wasn't prepared to be their gatekeeper anymore. I suspect practices lapsed back to what they'd been before, but its been a while.



Please don't do this. Ask HN isn't your blogging platform. Per the guidelines its for asking questions of the community.

Please don't do this. Ask HN isn't your blogging platform. Per the guidelines its for asking questions of the community.

Please don't do this. Ask HN isn't your blogging platform. Per the guidelines its for asking questions of the community.

Appreciate the feedback. To be transparent: I originally submitted this as a standard text post, but after it hit a spam filter, the HN moderators kindly restored it and moved it to /ask themselves to help with visibility.

I'm definitely here for the dialogue, specifically looking to compare notes on graph algorithms with other IaC engineers.


I have an informal "about me" page on my blog, and a more formal, professional profile on linkedin. Each links to the other. That covers it for me.

I've been noticing a lot of posts tp Ask that are essentially people uaing it as a blogging platform. Sometimes its vapid "thought leader" -type pieces, others are low-value posts or rants, and others are fairly obvious attempts at SEO.

With the decline in blogs, Twitter circling the toilet bowl, and facebook etc becoming a wasteland - I did wonder if some people have nowhere to post things. I don't support them using Ask, though, and I flag such posts - something I rarely do otherwise.


> Apple’s Unwanted Tracking (UT) alerts show a notification when a suspicious device is detected moving with the user for at least 840 meters and 10 mins. [...] This suspicious lost device must be an AirTag or AirPod that is separated from its owner and broadcasting rolling public keys.

So if I turn my phone off and get onto a bus or train with a tracking tag, other passengers will get an alert?

Also, the wording indicates that the tag needs to be marked as lost. But could that be used as plausible deniability -- that someone had stolen it -- by a person engaged in illicit tracking?


If you get on the bus with it, wouldn’t it not count as “separated from its owner”? Your phone, after all, sends out these pings as well even when off. So, the tag may know it’s with the phone even then. Also I don’t think it has to be “marked as” lost. This stuff doesn’t depend on anything that the owner of the tag gets to configure, since the point is to make it harder to abuse this way. I do think it’s dumb though. A real GPS tracker is not expensive - this stuff is only deterring the least-dedicated stalkers.


It probably wouldn't trigger, because of the 2nd criteria:

> The alert is not triggered immediately: it takes 8 hours during the day, 30 mins at night, and ...

But the warning system is by no means perfect. My family is split 50-50 between iOS and Androd ecosystems, and that's already enough to throw things off and get false positives semi-regularly.

Also, don't even ask the curriers how many alerts they get. Including airtags in valuable shipments is the de-facto standard nowdays.


No. Those alerts depend on the device type, so it must be an airtag or airpod. The following line makes that more clear.

> In the BLE advertisement, any beacon marked as either an Apple Device or Find My Device using the status byte will not generate stalking alerts.


Soundcore Liberty 5 noise-cancelling wireless earbuds. £75, so $100ish.

Saved my sanity when the infrastructure team decided to set-up a rack mount server in my office "just for a few days, honestly" and I spent two weeks listening to the system fan spooling up every (count them) seventy five seconds. The sound quality is pretty good too.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: