Preferences

eykanal
Joined 3,024 karma
Google tech mgr, cybersecurity engineer, healthcare infomatics engr, quantitative financial analyst, biomedical engineer, data scientist, web developer, tech enthusiast, poi spinner.

LinkedIn: http://www.linkedin.com/in/eykanal

Blog: http://shadyacres.tumblr.com/

Twitter: https://twitter.com/#!/eykanal


  1. This is some real antimemetics stuff here :) (https://scp-wiki.wikidot.com/antimemetics-division-hub if you're not familiar)
  2. Now seems like a good time to remind folks of the Stanford dead fish fMRI study: https://law.stanford.edu/2009/09/18/what-a-dead-salmon-remin...

    fMRI has always had folks highlighting how shaky the science is. It's not the strongest of experimental techniques.

  3. :facepalm: thank you
  4. Now seems like a good time to remind folks of the Stanford dead fish fMRI study: https://law.stanford.edu/2009/09/18/what-a-dead-salmon-remin...

    fMRI has always had folks highlighting how shaky the science is. It's not the strongest of experimental techniques.

  5. This exactly. Worth mentioning that "censoring" can occur in any of a number of ways; blocking select traffic, slowing select traffic, "forgetting" specific nodes, redirecting other nodes at will, performing MITM attacks (if the protocol isn't secure), etc etc.

    Also, beyond just no positive incentives, there are nontrivial negatives... they're hubs for an entire network, which can be a lot of traffic and bandwidth if peers are sharing anything other than text. That's a potentially significant cost for literally just being a dumb router. The idea of charging for this doesn't make sense... you don't choose a router, it's automatic based on location, so there's no incentive for quality. That ends up being a race to the bottom, which there's no room for arbitrage; prices are driven down to near-zero profit.

    Abuse-wise, the model is fundamentally flawed. Economically, the idea kinda works so long as hub traffic is low enough to be swallowed in background noise for whoever manages the hub. Beyond that the model breaks pretty quickly.

  6. I read this as "Disney approached OpenAI and threatened to sue them into oblivion --> OpenAI negotiated that Disney will use OpenAI internally for free, and will buy $1B of equity to have an ownership stake in the company".

    Disney comes out pretty good from this one; they're going to have a ton of people using the service to create all sorts of stuff that will—on the whole—increase brand awareness and engagement with Disney.

    OpenAI comes out pretty good from this, with a customer who's probably not paying much (if anything), $1B additional runway, but reduced ownership of the company.

    I think Disney is the winner here.

  7. > ...who non-ironically believes that Tor is used for things besides drug deals and kidnapping plots.

    That was the quote I was referring to. Also, of course I didn't say that no one should have any privacy; I simply implied a high moral cost for this particular form of privacy.

  8. > ...Assange and Snowden...

    I'd argue that for every Assange and Snowden, there are 100 (1k? 100k?) people using Tor for illegal, immoral, and otherwise terrible things. If you're OK with that, then sure, fine point.

    > SSH keys

    Heartbleed and Terrapin were both pretty brutal attacks on common PKI infra. It's definitely serviceable and very good, but vulnerabilities can go for forever without being noticed, and when they are found they're devastating.

  9. Any reason why this is on the front page today? Is there some context for why this is interesting now?
  10. The problem with this paper is that, while technically true, there are many website owners who have found that CAPTCHAs have effectively reduced the spam on their site to zero. The fact that a CAPTCHA _can_ be bypassed doesn't mean that it _will_, and most spam bots are not using cutting-edge tech because that's expensive.

    To say "it's worthless from a security perspective" is a pretty harsh and largely inaccurate representation. It's been tremendously useful to those who have used it. If it wasn't valuable, it wouldn't be so widely used.

    Definitely agree with the whole "tons of free $$$ for Google", but that's kind of their business model, so yeah, Google is being Google. In other breaking news, water is still wet.

  11. Link: https://www.thrillist.com/news/nation/how-does-the-duck-hunt... Super low-tech and amazing ingenuity in making something work within the limitations of the tech they had then.
  12. Just piling on here because upvotes are not visible. The one thing you can guarantee is that your good faith is not reciprocated by the university. Get a lawyer.

    To make it easier: it sounds like you're still registered. University of Washington offers Student Legal Services ( https://depts.washington.edu/slsuw/ ). Set up a referral with one of them and talk to them. Even if they're employees of the university and don't want to work with you to sue the university itself they may be able to give you good advice about how to proceed.

  13. It's worth mentioning that this really isn't programming-specific, or even engineering-specific, at all. The exact same story applies to the guy doing finance, or marketing, or project management, or legal work, or whatever. This is basically a reminder that your role as a cog in the wheel is to make the wheel move, and you shouldn't forget what the wheel is doing.

    That said, working for a US military contractor while not being supportive of the US military mission is kind of a silly thing to do.

  14. Can we just link directly to the story rather than through longreads? https://www.technologyreview.com/2024/10/10/1105034/weeds-cl...
  15. This article could use an awful lot more links to the cited research. Reading this as a skeptic, I don't know whether the claims are accurate or not, but the fact that (nearly) none of his claims are supported by citations to authoritative sources is not promising.
  16. > [...]the movements in the cluster began to show an atypical pattern with diverging paths

    What the heck does this mean?

    > Insurtech utilises technologies such as artificial intelligence, big data analytics, blockchain, and machine learning, to support the insurance industry.

    Holy buzzword soup, batman.

    Why is this being upvoted? This is a meaningless article.

  17. Was thinking that when I wrote the comment. Unfortunately, spammers have gotten very good at gaming web of trust techniques (see amazon product reviews). This is a Hard Problem™.
  18. This seems like a great idea designed for well-intentioned people. Unfortunately, the internet is running a bit short on well-intentioned people.

    The potential for abuse here is enormous. I have a difficult time seeing this becoming anything other than a cesspool of ads, 4chan-style joke links, and general inanity.

  19. Same for Pittsburgh: Completely wrong information about nearly all neighborhoods with a healthy dose of racism.

    Basically, the internet.

  20. I stayed past that for a bit but eventually cancelled as well, even though work offered to pay for membership. Same as above, once the conference discount wasn't necessary I gained absolutely nothing from the membership.
  21. So, IIUC, passkeys are a form of public key authentication. You register a public key with a service and then prove you have the private key. It sounds like this article is blaming "big tech" for not creating a universal, seamless, transparent private key sharing mechanism. That seems... silly?

    As a user, sure, I'd like to share my private keys around, and maybe one day we'll get there. However, exporting keys manually—which is what it sounds like proton is doing—sounds pretty sucky as well from a user experience standpoint. Now instead of having a password, I have a bunch of private keys that I have to manage and do... something... with on different services.

    This article would do well to acknowledge that this is a very hard problem rather than just ring the "big tech suxxorz" bell again.

  22. This seems to be ~4 years old. Have any cryptographers reviewed / audited this protocol in the interim? A quick google search comes up empty [1], and google scholar doesn't show anything [2].

    [1]: https://www.google.com/search?&q=Theseus+dht+protocol+%22aud...

    [2]: https://scholar.google.com/scholar?q=theseus+dht+protocol

  23. From that page: "To advertise on DuckDuckGo, visit Microsoft Advertising." Is DDG the #2 position or Microsoft? Kind of a notable difference there... if DDG is just an arm of Microsoft it rings a different tune.
  24. Saying "I don't want censorship" is equivalent to saying "I'm fine with people using my tool for coffee meetups, genocide planning, bridge club, and drug deals." It's an attempted handwashing of moral responsibility under the cover of software purity.

    At this point, it's pretty well documented that social media _as a tool_ has increased young female mental illness; the question is only "how much" [1]. To try to wave away responsibility for this by saying "but I'm just making a tool!" is beyond irresponsible at this point; it's morally reprehensible.

    [1]: https://jonathanhaidt.substack.com/p/social-media-mental-ill...

  25. Its pretty well known that fingerprints _by themselves_ are a pretty poor replacement for passwords. (a) They're public, in that it's pretty easy to get someone's fingerprint... just find something they touched recently. (b) If they're compromised its impossible to change them.

    I don't think this gets around either of those points, but I am curious if this somehow makes it much more difficult to either compromise the fingerprint hash (fingerprint fingerprint?) or makes the resultant hash less useful once compromised.

  26. Can we change the title here to something less marketing-ish? Possibly just "Apple releases new iPad mini"?
  27. From the comments here, it sounds like the main issue is payment processors needing to accommodate "vice laws" or something. Can someone explain why OnlyFans can't simply use non-US payment processors to get around this? My understanding is that many European countries are much less concerned with vice than the US.
  28. Just want to mention that, as a hiring manager for over ten years now, I haven't looked at a cover letter once in that entire time.
  29. > This is virtually indistinguishable from a protection racket: It is a fee that developers must pay if they want to stay in business. And it is a fee which ultimately harms consumers because these fees are indirectly passed on to users, either through higher prices, or through fewer competing products in the marketplace.

    I guess this would be great, if it were true. There are over two million competing apps in the market [1], and the vast majority are priced ridiculously competitively at less than a dollar each [2]. That's the average cost, not the median, which would be significantly lower.

    I'm sure proton isn't happy about this, but considering the ridiculously high salaries app developers are able to command [3] but the market doesn't seem to agree with their assessment.

    Now, this may be more true about app companies, but the numbers there tell a different story. Based on this analysis [4], the thing killing them isn't the developer fees, its that its ridiculously hard to make any sort of living if your only product is a phone app. The majority of apps simply make no money at all. Adding 30% to 0 doesn't do much for anyone.

    [1]: https://www.statista.com/statistics/263795/number-of-availab...

    [2]: https://www.statista.com/statistics/267346/average-apple-app...

    [3]: https://www.businessofapps.com/app-developers/research/ios-a...

    [4]: https://medium.com/@sm_app_intel/a-bunch-of-average-app-reve...

This user hasn’t submitted anything.

Keyboard Shortcuts

Story Lists

j
Next story
k
Previous story
Shift+j
Last story
Shift+k
First story
o Enter
Go to story URL
c
Go to comments
u
Go to author

Navigation

Shift+t
Go to top stories
Shift+n
Go to new stories
Shift+b
Go to best stories
Shift+a
Go to Ask HN
Shift+s
Go to Show HN

Miscellaneous

?
Show this modal