Hacker Newsnew | past | comments | ask | show | jobs | submit | p2detar's commentslogin

So anyone knows what happened to poor Dave and his team?

I‘m in the process of migrating Kotlin code back to Java in our product. My experiment with Kotlin is over and I‘m sticking 100% with Java. I like writing Kotlin, but I dislike reading Kotlin code.

Strange how people never say this with swift and objc

Probably because almost everyone avoids those languages at all costs

It’s always a pleasure to read Anton’s Go write ups. Excerpt from the summary:

> Go 1.26 is incredibly big — it's the largest release I've ever seen, and for good reason:

> It brings a lot of useful updates, like the improved new builtin, type-safe error checking, and goroutine leak detector.

> There are also many performance upgrades, including the new garbage collector, faster cgo and memory allocation, and optimized fmt.Errorf and io.ReadAll.

> On top of that, it adds quality-of-life features like multiple log handlers, test artifacts, and the updated go fix tool.

> Finally, there are two specialized experimental packages: one with SIMD support and another with protected mode for forward secrecy.

> All in all, a great release!


I've decided to completely skip it. I'm not gonna upgrade to Tahoe, unless it's something very vital. This is a UI abomination to me.

I'm on Hetzner as well; migrated from DigitalOcean. They are stable, but they got a bit of bad reputation, since they were hacked at least 2 times already [0] [1]. Stable != Secure.

0 - https://www.heise.de/news/Hetzner-gehackt-Kundendaten-kopier...

1 - https://www.zdnet.com/article/hackers-breach-web-hosting-pro...

edit: links


So? Those are automated analysis tools and by "slop" he seems to refer to careless reports crafted using AI, solely for collecting bounties:

https://gist.github.com/bagder/07f7581f6e3d78ef37dfbfc81fd1d...


No, it’s not. Friend of mine was doing it on regular basis and only stopped because he got Amazon Prime subscription and didn’t need to anymore.

Wait people are illegal streaming twitch?

I guess that makes sense but I never thought about that.


Prime includes Amazon Video or whatever

There were attempts at legal bullying, but mostly with aim to humiliate the victim as the correspondence contains the full titles of porn videos.

I wouldn't make such a conclusion. I don't think there is any info about whether OP got financial incentives for his work or not. In fact, he posted on Mastodon, he's gonna be doing open source Rust work further on.

I could believe it, the timespan should be 1966-1976, so maybe in late 70s. I know a lot of automation software was being written in my Eastern European socialist country in assembly language around 1974. I think mostly for 6800-based chips like probably MOS 6502.

I went to a retrocomputing exhibition (I think at CHM) and there was a 6502-based Russian all in one computer with the nicest keyboard I've ever used.

I still wonder which model it was…


> Encrypting email

> Don't.

https://www.latacora.com/blog/2019/07/16/the-pgp-problem/#en...

I’m not sure I completely agree here. For private use, this seems fine. However, this isn’t how email encryption is typically implemented in an enterprise environment. It’s usually handled at the mail gateway rather than on a per-user basis. Enterprises also ensure that the receiving side supports email encryption as well.

edit: formatting


Your mail either needs to be encrypted reliably against real adversaries or it doesn't. A private emailing circle doesn't change that. If the idea here is, a private group of friends can just agree never to put anything in their subjects, or to accidentally send unencrypted replies, I'll just say I ran just such a private circle at Matasano, where we used encrypted mail to communicate about security assessment projects, and unencrypted replies happened.


> Your mail either needs to be encrypted reliably against real adversaries or it doesn't.

It is, GPG take care of that.

> If the idea here is, a private group of friends can just agree never to put anything in their subjects, or to accidentally send unencrypted replies

That’s not what I’m talking about. It’s an enterprise - you cannot send non-encrypted emails from your work mail account, the gateway takes care of it. It has many rules, including such based on the sender and recipient.

Surely, someone can print the mail and carry it out of the company’s premises, but at this point it’s intentional and the cat’s already out of the bag.


If you're relying on a trusted gateway, you don't need any of this; just do TLS to the gateway to exchange messages. This is how 95% of corporate "secure email" systems work.

But you don't know how many SMTP relays the recipient has and if they are all secured. E2E encryption, be it via GPG or x.509/SMIME, is still good in that case.

edit: smime


Can you give an example of an email provider or technology that’s doing GPG or SMIME at the gateway? I’ve never seen that configuration and it doesn’t seem like it would make sense.

Either it’s just theatre, encrypting emails internally and then stripping it when they’re delivered, or you still need every recipient to be managing their own keys anyways to be able to decrypt/validate what they’re reading.


I will not name it, but I worked on such product for some time. In fact it is still being sold, maybe 3rd decade already.

> you still need every recipient to be managing their own keys anyways to be able to decrypt/validate what they’re reading.

Nope, that is handled at the gateway on the receiving side.

edit: Again, the major point here is to ensure no plain text email gets relayed. TLS does not guarantee that plain text email doesn't get relayed by a wrongly configured relay on its route.


If the gateways are putting encryption in place and then stripping it, it’s not end-to-end. You’re just doing theatre over mandating TLS.

There's like one or two use cases where encrypting email could work. The best case I've come across--Bugzilla has the ability to let the user upload a public key to encrypt emails for updates to non-public bugs. It's not a big use case--pretty much the intersection of "must use email" and "can establish identity out of band," which does not describe most communication that uses email. (As tptacek notes in a sibling comment, you pretty much have to limit this to one-and-done stuff too, not anything that's going to be in an ongoing discussion, because leaks via unencrypted replies are basically guaranteed).


Even my doctor's office and local government agencies support PGP encrypted emails, and refuse to send personal data via unencrypted email, but tech nerds still claim no one can use it?

In general the userbase here is startuppers, they hate distributed solutions and love centralisation.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: