Hacker Newsnew | past | comments | ask | show | jobs | submit | sr2's commentslogin

> So they have publishers by the balls "forcing" them to use AMP to get higher in their rankings.

Except that I don't write blogposts to please the Google search engine. A site can be found via many other ways. News sites like Reddit are a great way to be discovered, aswell as HN. There's also link dumps like Pinboard which are another way to discover, aswell as others. Twitter, etc


You presumably also don't write blog posts as your primary source of income. A lot of media companies do, and depend very heavily on search engine traffic in order to make money. Between Google and Facebook, their fate is entirely out of their own control.


Hypponen's law: Whenever an appliance is described as being "smart", it's vulnerable

https://twitter.com/mikko/status/808291670072717312


That's why all phones should have a decoy feature so that when asked to produce a password, you just give them the decoy pass, and it unlocks a clean profile with no way for them to find anything personal, and or incriminating.


My phone has a guest code. I think phones should just have profiles that are complex enough to where nobody could know if it's your main one or not. However, apparently someone somewhere holds a patent to this sort of thing and thus...

One example I found off Google, though I've heard of others:

https://arstechnica.com/gadgets/2012/10/nokia-patent-may-be-...


I would prefer not to have such oppressive laws in place, for more than one reason.


How many times can we effectively cry "The SOPA is coming!" before protest fatigue sets in? When the wolves are attempted into law over and again, something has to give and I'm not sure that corporate-congressional interest will be the first to blink.


There's a useful guide[0] if you're going to use a VPN and you should take it seriously. Personally I think a VPN is only ever useful for routing traffic over hostile networks (like at shady cafe wifi) and spoofing your geolocation to access geo blocked content.

[0] https://gist.github.com/joepie91/5a9909939e6ce7d09e29


What's to stop someone renting an offshore VPS, like say, in somewhere like Hong Kong[0], and that isn't part of the 'fourteen eyes' spying alliance?

[0] https://privacytoolsio.github.io/privacytools.io/#vpn

Also what's to stop someone stacking anonymously-bought VPNs on top of each other (proxy chaining) similar to how onion routing works, and creating their own homebrew Tor? If the VPN provider is peeking at the logs (which it shouldn't be doing), then all they see is another VPN IP. VPNception!

(Something like the SHALON[1] technique is useful for this, for example):

------------

> Abstract—In this paper, we introduce a novel lightweight anonymization technique called Shalon. It is based on onion routing, aims to reduce complexity, and delivers high bandwidth. We have, compared to the widely known approach Tor, slightly reduced the level of security in favor for greatly increased performance.

> The most significant advantage compared to other approaches is that Shalon is fully based on standardized protocols, which makes our approach highly efficient and easy to deploy. It also makes Shalon easier to understand for normal users, eases protocol reviews, and increases the chance of having several implementations of Shalon available. In this work, we provide a description of the design and implementation of Shalon, a performance and anonymity analysis, and a discussion on the scalability properties.

[1] https://pdfs.semanticscholar.org/6f30/f14ff4972ddd787bf7e859...


Too much emphasis on education and college in this article. Hacking requires 'thinking outside the box'; often called lateral thinking[0]. Formal education in the subject of hacking is nice, but doesn't allow for the creative mind to fully explore systems. There's a phrase:

   Don't Learn to Hack - Hack to Learn
In terms of earning money from hacking, there are tradeoffs made in both whitehat and blackhat hacking. One noticeable tradeoff in blackhat hacking is having no boss, and penetrating a system on your own terms. Whitehat hacking might pay more and be more respectful and a nice little haven where you can avoid jail, but it's often riddled with a rigid framework for getting into systems and doesn't encourage the lateral thinking I previously mentioned. Instead it's a corporate cubicle job where hacking is often automated and routine.

On the other hand, there is grey hat hacking which many fall into at some stage to strike a balance, and often balance criminality with a respectful whitehat job that pays well.

[0] https://en.wikipedia.org/wiki/Lateral_thinking


"Why Tipping Should Be Banned", by Adam Ruins Everything is worth watching if you are of the school of thought that tipping is bad: https://www.youtube.com/watch?v=q_vivC7c_1k

The gist of the video is that if you're tipping, then a waiter/waitress for example is not being paid enough, and tips are deliberately designed to bolster their unfair income.


+1 for tinc


For those who don't want to click, here's the abstract:

> Populism may seem like it has come out of nowhere, but it has been on the rise for a while. I argue that economic history and economic theory both provide ample grounds for anticipating that advanced stages of economic globalization would produce a political backlash. While the backlash may have been predictable, the specific form it took was less so. I distinguish between left-wing and right-wing variants of populism, which differ with respect to the societal cleavages that populist politicians highlight. The first has been predominant in Latin America, and the second in Europe. I argue that these different reactions are related to the relative salience of different types of globalization shocks.


Not sure why quote works like this, but it's very difficult to read on a phone.


This being Hacker News, the indented block quote is styled appropriately for code, which you want presented in a monospaced font without extra word wrapping. Quotes of prose are better off set in italics instead.


HN works like this, and it is a terrible misuse of UI


> Populism may seem like it has come out of nowhere...

Only if you haven't been paying attention or are living in a bubble...


Just make sure your catchall is renewed well into the next five years. Heck, you can do a 'rollover renewal' that lasts 10 years if you wanted.

This is to stop somebody eventually gaining control of the domain when it expires, setting up a catchall on it, and then being able to login to every single account you used with that address.

Some registrars protect a domain after expiration so nobody can hijack it and claim it as their own, but you often have to pay extra for this service.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: