Hacker Newsnew | past | comments | ask | show | jobs | submit | oarsinsync's commentslogin

> When Spain blocks CF (it does this regularly), it breaks all CF sites. Of course, the actual problem here is organised crime. Spain and Italy do this because the mafia owns them.

Mafia has a vested interest in broadcast rights of football matches in Spain?

Spain blocks Cloudflare because the football league La Liga has a court order that allows them to point to IP ranges that are hosting/fronting live streams of football matches, and get ISPs to block access to those ranges.


If the sports league is influential enough to have a standing court order to be able to unilaterally block IP ranges for the entire country, I'd imagine that organized crime might take an interest. I have no idea if it's the case but when something already seems to have an outsized influence it wouldn't be crazy to imagine that others interested in that power would also take an interest.

Moreover, I think the point of the parent comment is that they're blocking quite a bit more than just football games. It sounds like the claim is that the blocking is willfully broad because of other influences, not necessarily the the purported more narrow intent is necessarily from those influences.


> > Apple ... is shoving Liquid Glass onto devices that don't really benefit from it.

> Yeah: most experiments fail and even the ones that ultimately succeed have rough edges.

Vista / Aero 2.0 already did Liquid Glass. At least they had the decency to ship a "turn this shit off" toggle that actually worked.


Vista/Aero 2.0 was purely for aesthetics. Liquid Glass is obviously to enable UIs overlaid on top of uncontrolled content (i.e. camera input from the real world, or be used through fully transparent displays).

Apple really has to bite the bullet somehow here if they want to get everyone over to what they see as the next computing paradigm.


Much like transparent glass tablets in sci Fi movies, this looks pretty cool but I think makes text hard to read and gets old immediately. Is it really a compelling new paradigm?

I think if I had a really improved version of Apple vision I would still want non transparent windows that are clean and easy to read, not floating holograms with glass like distortion?


All important questions to answer and problems to solve.

It would be interesting if someone had a way to throw a couple hundreds thousand designers and developers into an environment where they have to find solutions so we could get a head start before the relevant hardware goes fully mass-market...


Your unpatched Wordpress install is someone else’s botnet host, forming part of the “distributed” in DDoS, which harms others.

It’s why Cloudflare exists, which in itself is another form of harm, in centralising a decentralised network.


The argument is self-defeating:

1. "Unpatched servers become botnet hosts" - true, but Tailscale does not prevent this. A compromised machine on your tailnet is still compromised. The botnet argument applies regardless of how you access your server.

2. Following this logic, you would need to license all internet-connected devices: phones, smart TVs, IoT. They get pwned and join botnets constantly. Are we licensing grandma's router?

3. The Cloudflare point undermines the argument: "botnets cause centralization (Cloudflare), which is harm", so the solution is... licensing, which would centralize infrastructure further? That is the same outcome being called harmful.

4. Corporate servers get compromised constantly. Should only "licensed" corporations run services? They already are, and they are not doing better.

Back to the topic: I have no clue what you think Tailscale is, but it does increase security, only convenience.


The comment I was replying to was claiming that using your computer 'poorly' does not harm others. I was simply refuting that. Having spent the last two decades null routing customer servers when they decide to join an attack, this isn't theoretical.

As an aside, I dislike tailscale, and use wireguard directly.

Back to the topic: Your connected device can harm others if used poorly. I am not proposing licensing requirements.


I meant: does not increase security.

I would detest living in a world where regulators assign liability in this way, it sounds completely ridiculous. On a level with "speech is violence".

Amusingly, there a lot more special IPv4 networks that you just don't know about too. e.g. Link local IPv4 is 169.254.0.0/16. It just isn't auto-configured on every IPv4 interface by default, like fe80::/10 is on IPv6 interfaces, and the TCP/IP stacks on most platforms do not enforce the link-local properties of it in IPv4 like they do in IPv6.

It's like the difference between HTML and a strictly typed language. Permissiveness and flexibility is both a blessing and a curse. As with a lot of things, which thing it is in any given situation depends greatly on the situation.


Yes and no. I took my physical media with me along with my player, and all was fine.

I took my digital media with me along with my computer, and all was not fine.


> I can assure you that offline installer you got today from GOG will not work on Windows 20

Given the lengths the Windows development team has gone to, to preserve backward compatibility, to the point that there was individual-game-specific workarounds codified in Windows, makes this claim the same as the GP’s, that Steam will change 30-60 years from now.

The cynic in me thinks you’re both right, mind.


Alternatively, companies hire multiple subject domain experts, and pay them handsomely.

The experts believe they've been hired for the value of their opinions, rather than for being 'yes-people', and have differing opinions to each other.

At a certain pay threshold, there are multiple peoples who's motivation is not "how do I maximise my compensation?" and instead is "how do I do the best work I can?" Sometimes this presents as vocal disagreements between experts.


> Anonymity-by-crowd is the point

Only for IP based trackers. Any webpages embedding facebook/twitter/microsoft/google trackers have already deanonymised you through a variety of fingerprinting techniques. This includes if you use private browsing sessions, and even qubesOS. You get a fuzzy feeling doing the things you do (and I do these things too), but that battle is lost.

> NAT + default-deny inbound is simple, effective security … That's a concrete property I get for free

Depends on your definition of “free”. Is it cheaper to lookup just a connection state table, or is it cheaper to look up both a connection state table and a NAT table?

> IPv6 adds configuration surface I don't want … More features means more things to audit, understand, and misconfigure.

100% agreed. More complexity, more attack surface, more things to go wrong.

> I already solved "reaching my own stuff" without global addressing … It's better than being globally routable.

I do something like this too. It’s more private and more secure. It adds more complexity, and it restricts my ability to access things from terminals I don’t personally own & control unless I create another exposed vector though. “Better” is subjective based on metrics being optimised for.

> IPv6 wasn't designed as "IPv4 with more bits." It was designed as a reimagining of how networks should work: global addressability as a first-class property

Apologies, but global addressability as a first-class property is exactly how the internet was designed. NAT was originally deployed as a hacky add-on to temporarily alleviate the lack of addressing space in IPv4 until a successor could resolve that.

That said, the internet of the 90s was a very different beast to the internet of today. A lot of your concerns and perspective is absolutely valid and extremely reasonable given the internet of today.

> "It serves my goals better than IPv4" is the bar, and IPv6 doesn't meet it. Never has, never will … Want me to adopt a new addressing scheme? Give me a new addressing scheme, don't impose an opinionated routing philosophy on me.

IPv6 can absolutely be configured in ways that just gives you a new addressing scheme and does away with a lot of the other complexity. You’re just very much straying off the happy path, removing complexity by introducing … other complexity.

FWIW, I’m operating my home networks much the same way you do. I’ve also been dual stacking networks since the 2000s. Things have come a long way since the original pure-dogma introduction of ipv6.


Thank you for the thoughtful response.

To be fair about fingerprinting, there's no such thing as "bulletproof", but I do have a pretty robust setup. DNS level ad and tracker blocking, browser extension level ad and tracker blocking, LibreWolf's extensive anti-fingerprinting measures, kernel-level measures like kloak, I block all third party JS by default, etc. My goal isn't to become invisible and untraceable to nation states (which is essentially impossible when 90%+ of all global ISPs can and do sell netflow metadata, enabling timing and packet size correlation even across multiple hops, even with background traffic forgery / traffic pattern obfuscation), but rather to frustrate lower-level tracking efforts, and mostly to reduce attack surface for security reasons, and to reduce the total amount of information I'm sending to adversaries, even if it technically increases uniqueness. For instance, WebGL, JS JIT, WASM, WebRTC, and even SVG rendering are similarly disabled by default on my browsers, and I may very selectively enable them on a case-by-case basis depending on how important I feel the web property I'm trying to access actually is. I'll spoof my UA, my screen dimensions, and use residential SOCKS5 proxies, one by one, to identify which fingerprinting measures are being used to block me with YouTube, for instance, without enabling JIT compilation or SVG rendering. This approach absolutely does make me more distinctly identifiable (less anonymous), but doesn't necessarily make me less private, nor less secure, if e.g. ad network JS never even runs on my box in the first place. Security is the base of the pyramid, it is the prerequisite for privacy, but doesn't guarantee it. Privacy is the middle layer, it is the prerequisite for anonymity, but doesn't guarantee it. I'm aggressively climbing that pyramid where I can while accepting some tradeoffs where the net benefit is positive to me. I don't think of any of these - security, privacy, or anonymity - as binary properties, but rather a unified journey I am on to enhance gradually and iteratively over time. Switching to IPv6 would greatly complicate and regress my path through much of the journey I've already completed.

If I could leave you with a couple questions: What tangible benefits have you reaped from IPv6 that simply weren't possible on IPv4? Has the ROI for you on going dual stack outweighed the costs on your time, attention, and configuration work required for securely handling edge cases, dealing with weird or unexpected routing issues, for straying from the happy path?


> What tangible benefits have you reaped from IPv6 that simply weren't possible on IPv4?

Personal networks: Globally unique addressing. That then lends itself to not needing any kind of split DNS for services, or worrying about addressing clashes with whatever LAN I happen to be on with my own network.

Work networks: Increased revenues.

> Has the ROI for you on going dual stack outweighed the costs on your time, attention, and configuration work required for securely handling edge cases, dealing with weird or unexpected routing issues, for straying from the happy path?

Personal networks: Absolutely not. I removed the dual stacks and went back to IPv4 only everywhere.

Work networks: That's a question for the bean counters.


> Any webpages embedding facebook/twitter/microsoft/google trackers have already deanonymised you

I bet OP has already blocked at least 3 of them. Private browsing is only a partial solution, blocking/unblocking domains, scripts, etc. on a case-by-case basis is a more reliable way to defend your right to privacy against abusive practices (I'm talking about fine grained adblockers such as uMatrix/uBlockOrigin) daily.

I admit it can be a hassle sometimes, in particular if one explores the net every day, but staying away from bad actors (such as some of those 4) is one way to maybe eventually stop them - even if "vote with your clicks" feels as pointless as "vote with your feet" when you're just one in many millions.


How well do those 4 trackers track you if you don't have accounts with any of them?


Extremely well. You don’t need an account to have a unique fingerprint that will eventually tie to an identity somewhere, and data brokers exist specifically for this purpose.


Curious what you’re doing that requires more than 16 SLAAC-enabled subnets (or a lot more non-SLAAC enabled subnets)


The user experience differs for proxies.

System wide proxy configuration doesn’t actually always work system wide.

A VPN tends to have more success in encapsulating all application traffic (or all desired application traffic, if you’re so inclined to configure your system)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: