Hacker News new | past | comments | ask | show | jobs | submit | badkitty99's comments login

Welcome to the skinner box


Oh boy of course they'll make you open every app's settings page individually to disable them one by one, and then have to go and do it again for each new app install after that like Siri. I don't understand why they can't just have ONE button to turn their garbage off, it's very user hostile


There is also a toggle to turn it off system wide. In fact it’s opt-in at the moment rather than opt-out.


It's a global turn-off and a per-app turn off if you want to isolate specific apps.


Quick let's fire all the weather professionals


This is the only sane answer in the comments so far


This kind of answer is ok but since the purpose of "sending stuff back in time" is technological uplift, you can only predict the first key. Everything else could be accelerated. (maybe that's fine but doesn't fit the spirit of the question)


Null sets in and of themselves have nothing to do with Lebesgue integrals. Null sets are definitely are not defined by Lebesgue integrals, you might be thinking of a set of measure zero which has to do with Lebesgue measure


> has to do with Lebesgue measure

As in, the only thing Lebesgue that my comment mentions.


But don't you need the preimage of the hash to generate it in authentication?


It wouldn't matter if the preimage of the hash were needed for authentication.

Because, if a device has all of the information needed to connect to a network on it, then.. well, it has all of the information needed to connect to a network on it. Could be passwords, hashes, or whatever -- doesn't really matter.


On Linux you can auth using the hash instead of the password. Other OSs probably have something similar.

https://unix.stackexchange.com/questions/40/use-wpa-supplica...


Yes, but I suppose GPs question was "is that enough to authenticate?" – and given that as you say Linux and iOS/macOS (for Wi-Fi "password" sharing with nearby devices) do support that, and my other comment, the answer is "yes".


Not for WPA-PSK. The PSK is used to derive the PMK from (simplified) something like PMK = Hash(PSK, SSID). This key is static and never changes for the lifetime of a particular SSID, and is also shared across all devices in WPA-PSK.

From the PMK, all other per-connection keys are then derived at association time, but everybody that captures that conversation can derive all further keys since that exchange uses only symmetric functions with all secret inputs derived from the PMK, not something like Diffie-Hellman.

It's unfortunately not easy to do anything more resistant against compromised clients without storage on the APs (or at least a stable encryption key available to all access points of an SSID), so WPA-PSK doesn't – for anything more robust than that, you need WPA-EAP. (Some networks support a per-station/MAC address PSK as a proprietary feature, but that's only possible because they do have some management plane that allows the APs to share the required state.)


For all of 15 seconds?


Probably wireshark, then


They could attempt to slow down the ad-ridden stupidity train they have everyone riding on, believing there is no such thing as iphone security tools besides the steaming iOs UpDaTeS


That constant push to always update everything, not going to help here. Hacks are updated in step with ios. $hell on earth...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: