Hacker News new | past | comments | ask | show | jobs | submit | ct520's comments login

Dumb question but my assumption is fiber optic cables could be “tapped”? But the disruption would be noticeable when monitoring the cable. Could you just tap it when you cut it and when it hooked back up that’s the new baseline with the tap in place? That would seem more of a logical reason then a country just randomly cutting lines to me?

https://www.theatlantic.com/international/archive/2013/07/th...

NSA's OAKSTAR, STORMBREW, BLARNEY and FAIRVIEW


It’s a message and hybrid warfare.

Hybrid warfare - the infrastructure is offline, and the repair resources are consumed. And you gather intel what the resource impact and offline time is.

Message - we can do this. Now think what else we can do.

Of course the message is also pushing EU closer to war footing. But China and Russia don’t see it that way - they think the lack of popular outcry means weakness.


Most/all of the traffic would be encrypted.

That wasn't the case in the past. Events over the past 15 years have resulted in most companies encrypting all traffic between datacenters (due to the perceived risk). TLS between consumers and companies is probably at an all time high though due to a push for end-to-end encryption.

TLS doesn't help here, because state actors (including China, Russia) own trusted root certificates, which allow them to TLS-terminate for _any_ website they choose and silently decrypt/MITM the traffic.

TLS offers quite good protection actually: Anytime they create fraudulent certificates they risk burning their CA. Attacks need to be very targeted to keep risk of detection low. Due to Certificate Transparency, hiding attacks got even harder. And for sites that use cert pinning, the attack doesn't even work in the first place.

And eavesdrop is one thing but I'm not clear how you could MITM an undersea cable without the operators noticing.


>and silently decrypt/MITM the traffic.

Except it's not silent because you need to expose your misissued certificate every time. Sure, the average joe won't spot it, but all it takes is one security researcher to expose the whole thing. AFAIK there are also projects by google and the EFF to monitor certificates, so the chances of you getting caught are really high. Combined with the fact that no such attacks has been discovered, makes me think that it probably doesn't occur in practice, or at least is only used against high value targets rather than for dragnet surveillance.


These things get encrypted at a lower layer, macsec. At the transport layer it's all transparent. No need for TLS between your servers, that's just wasted overhead.

You typically encrypt anyway because you just lease the line and buy the b/w. It's operated by a different company and you share the wire with other customers.


Yes. Having used both I can say indeed it is. Not only does GLP-1 slow digestion which limits what you can eat and when it also is being study for its effects on alcoholism etc reducing cravings. I and many people I know noticed the difference in cravings were not limited to food.


Does it affect libido?


Oddly enough, no. It seems to affect a different desire pathway than dopamine and such. It’s not anhedonic, good stuff is still good and you still want it. Even food! It doesn’t make food not-pleasurable, just reduces hunger. It only seems to affect very particular kinds of cravings associated with food and addiction/compulsion, not sex drive (though maybe for “sex addicts”? IDK)


I agree with statement. Nothing really to add in to your response, just seconding it.


Interesting, thank you.


Yeah... They use to pay 10% of the "bounty" seized. Not sure what the going rate is with the heat now and days. The war on drugs lol.. war on peoples rights. Warrantless GPS trackers, then it was stingrays.. quite an intersting organization. They use some .. unique software. Penlink use to publish their software updates publicly was a good read. (you can probably find it on wayback machine) Interesting software to say the least.. https://www.penlink.com/digital-intelligence-original-work-2...


Ah I see someone is capitalizing on the whole iPhone 15 pro max touchscreen not responsive issue. Kudos to click


Works well. Been using it since beta. I got a memory like a gold fish and this comes in handy.


I appreciate your thinking, unfortunately if it sells well I feel the industry will just do the same thing. Instead of shoe shaped things, we will just have cyber truck knock offs. Which ugh I can’t say I would prefer over what we have now.


Low transaction limits? I regularly send $xx,xxx through zelle. Guess I got to up my game..


At which bank?

The highest available limit I can find is $5,000 per day, and that's limited to private clients and businesses:

https://www.gobankingrates.com/banking/mobile/zelle-limits/

Common limits vary between $500 and $2,500 as you can see.

I've never heard of anyone being able to use it to send $10K in a single transaction, so it would be very helpful to know where you can do that.


BofA/ML appears to have default limits of $15k/day for wealth management clients, and $25k/day for private bank clients, though there is a footnote stating that limits may actually be higher depending on the client. So at least for BofA/ML, they seem to essentially make higher transfer limits dependent on how much you're paying them in management fees.


My business account says: "Daily limit: instant delivery $7,000"


Do you have a business account? I have a $1500/day limit. Looking it up it seems like for popular banks it tops out at $2500/day, and some go as low as $500/day.


How privileged is it to say that a $1500 loss is "hardly worth noting"? Median take home pay is under $45k, so that's more than half of the median paycheck gone in a single mistake.


Obviously for an individual person it can be bad, bad enough to cause problems that take months to solve, but not lose your life savings and retirement bad. The report identifies a few hundred million dollars in losses but my point is more that for instance there are single "pig butchering" case losses in the millions (and totals in the billions, which is likely an underestimate because some people feel too ashamed to report to ic3.gov) and not much is being done in the way of educating people on how to avoid being swindled.


As someone that consults in this space I more or less agree with you. Requirements are derived from interpretation of UETA and ESIGN Act. Itext has a good write up and great library to leverage when taking on project like this. Docusign has a good writeup on esign/UETA. ESRA is the goto body on the subject, and if you need legal opinion DLA Piper is the goto in the industry. This stuff is fairly simple once you know it.


rewind.ai has entered chat.


Kali was great, I also remember using ten.net on duke nukem 3D release was a blast. Especially with the “K” trick to see other people screens remotely!


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: