Hacker News new | past | comments | ask | show | jobs | submit | Eli_P's comments login

> editing it on a computer, and then "printing" it back out to a DNA molecule

That's kind of what Novavax claims, search for the interview with David Rubinstein on WEF. NVAX wants to print short fragments of virus's proteins, so the resulting vaccines supposed to be safer than those made by working with live viruses.


I use open source app Nebulo[1] which is a localhost pseudo-VPN which reroutes all DNS to any DoH/DoT you want. It also has a request log, I was (not very) surprised when it came my default file manager connects to facespace when I don't have any account there.

The bad news is, GPS still turns on on its own and camera seem to click sometimes </tinfoil>

[1] https://play.google.com/store/apps/details?id=com.frostnerd....


Accessibility utils like screen readers do OCR and read aloud the content for blind people.


> I wonder why there are so few people

Maybe because people understand that it's security model is flawed: the peers in the mesh treat all the other peers as not trusted, that's okay; but the network design doesn't seem to take into account potential hostility of the physical medium itself.

Say, your ISP can tarpit packets or shape traffic, or shut down the power or cell tower in your block temporarily, and then measure how the mesh congestion changed. At the same time the mesh relies on building hop chains with TTL of 10 minutes iirc, which I think makes a peer a sitting duck. It is (was) all documented/leaked.


AFAIK garlic routing is still harder to crack than Tor: https://geti2p.net/en/comparison/tor. The main advantage of Tor is the number of users.


The network security people I know stopped bothering publishing attacks on I2P's directory service--which was(/is) in fact subject to eclipse attacks--because I2P didn't seem to care to fix the issues. Here's a great paper.

https://sites.cs.ucsb.edu/~chris/research/doc/raid13_i2p.pdf


>The network security people I know stopped bothering publishing attacks on I2P's directory service

Maybe those you know stopped, but others didn't: https://geti2p.net/cs/papers/.


Great... are the issues getting fixed? The point I was making about I2P working so poorly that some people have given up trying to help--in addition to specifically noting that eclipse attacks do, in fact, affect the design of I2P--doesn't seem affected by "there exists people who still spend time demonstrating I2P doesn't work well" ;P.


I doubt the number of nodes is important when you can split a large group of them into a few subgroups and analyze them or alter how they interact with each other, then repeat subdivision; because again, them overlay networks are like smaller sandboxes inside the big one.


Don’t forget that you have to do all this within 10 minutes, because after that time the network configuration will be totally different.


Yes, overlay network's configuration will be somewhat different, but physically it will be the same. It's like you're rearranging apple bits in a pie to save them; the pie will be sliced and eaten anyways.


> the pie will be sliced and eaten anyways.

The difference is how long it takes and how much resources. There is no perfect security. Security is not a "yes/no" thing.


All correct. It's just important to remember who's the attacker:

  Alice -- ISP1 -- 1000 hops -- ISP2 -- Bob
Alice and Bob's identities are protected from each other, but not from the govt because ISPs collect metadata.


> because ISPs collect metadata

Which metadata? ISPs only know your next hop. Check out how garlic routing works.


Huh, your imaginary city reminisces one in The Murderer by Ray Bradbury.


> Abolish copyright

If they did, it'd be still complicated. A real example, a modder makes some content for an old abandoned game. He needs some voice over, so he contacts the original voice actors, but they deny to do that job on the grounds of being a member of org like this[1] which strictly prohibits to take side jobs.

And to make it even more complicated, consider tools like for making deep fakes; if somebody makes a neural network that emulates the original voice, should it be sub-licensed or copyrighted? Can a voice be copyrighted?

[1] https://en.wikipedia.org/wiki/SAG-AFTRA


> I don't fully grasp what privacy is

> people like me find it hard to quantify what that thing is

Privacy is [REDACTED]. Intelligence is not privacy.

Recently I cleaned some olde books I don't need anymore and there were a bunch of them on info security, so I skimmed them good bye, and they all stated the same vague definitions like no one knows what privacy is, there's no agreement, etc.

Actually there're definitions of privacy and intel, they are just sad and unethical, hush shush.


It seems like the context is built with a simple bag of words model. One day I searched "how to make a mousetrap", the following day I got a recommended video about statistics, where the author explains something on a mouse population, and says "mouse" many many times.


> that increased exposure to any porn has effects on attitude

What does your research say about the fixation of that attitude? Is it like, forever and ever? How those effects compare to watching martial arts, war footage from the news, movies etc?

Isn't it just a Pavlovian response training thing? Before the age of 25 people are more susceptible to learn or relearn, and some are just born (and exacerbated by insane upbringing instead of proper diagnosis and meds) with predilections.

> but the effects are more pronounced with violent porn

Sure, and if they had a fist fight behind a school, a kiss, a cigarette, a caffeinated drink and listened to violent music in a short time they'd probably had a heart attack.

Your conclusion reminds of witch-hunt-approving arguments like, violent games make kids violent. Which is moot, Take for example Children's Crusades[1] in 13 century, which was induced by religion and politics. Or, I know some parents who watched a documentary about how a talented musician was raised with beatings, so they took that literally, you know what I mean? Sick ideas find a fertile ground.

Btw did you watch that Black Mirror episode "Arkangel", seems related. Or The Alienist by Caleb Carr, the book and series, about underage male prostitution in 19 century, the plot is based on real life, sort of.

[1] https://en.wikipedia.org/wiki/Children%27s_Crusade


>Your conclusion reminds of witch-hunt-approving arguments like, violent games make kids violent. Which is moot, Take for example Children's Crusades[1] in 13 century, which was induced by religion and politics. Or, I know some parents who watched a documentary about how a talented musician was raised with beatings, so they took that literally, you know what I mean? Sick ideas find a fertile ground.

I can see and understand the concern, and some results can fuel moral panics and witchhunts, but they don't need to lead to there necessarily. Finding that porn has effects on attitude and aggression, and long-term, increased, or more violent use can have greater effects does not provide an ought from the is. It can provide some scientific and empirical basis for such an argument (for example, an argument to ban porn), but we shouldn't reject science because of the normative conclusions it might lead us to.

You may be interested in a book[0] from a little while ago which examines the debate quite closely, with lots of empirical data which supports both sides of the argument. From what I've read, behavioural scientists and policy-makers largely do not consider the evidence "against" porn to be all that decisive in supporting a ban.

In other words... the proper strategy should be to get the data, scrutinise the data, and then decide what action we will take (if any) based on the data. The book mentions a comparison with the effects of alcohol, which is quite apt. Many people who would argue for porn to be banned, I imagine, would not have the same opinion on alcohol, especially given the history of the Prohibition.

[0] https://ndpr.nd.edu/news/debating-pornography/



Thanks! For the moment I published this: https://travelregulations.live/


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: