Hacker News new | past | comments | ask | show | jobs | submit | growse's comments login

furious clapping

They're only "entirely useless" if you're willing to give up at the first hurdle.

Meanwhile, in the real world, the rest of us use nat64 proxies, take advantage of git's decentralised model etc. etc.


> Meanwhile, in the real world, the rest of us ...

Wow. Sounds like someone got out of bed on the wrong side today. ;)


> A lot of sites out there are still not supporting IPv6 because ... you'll never guess, but dealing with DDoS on IPv6 where your attackers can rotate through addresses quickly is not easy.

Sure it is. You block the /64.


So now everyone should acquire as many IPv6 addresses as possible so they can spread their services over many /64s so if their server gets compromised and put on a blacklist somewhere they can just burn that /64 and move on to another?

No, everyone should secure their servers... IPv4 hoarding isn't happening for the reason you propose so why would it for IPv6?

Nobody blocks entire /24s because of one bad address

The only way to guarantee your server is secure is to never connect it to a network.


Making this argument whilst ignoring the trade-offs of federation (that Signal has historically addressed) is somewhat disingenuous and a little fundamentalist.


do you have any breakdown on the trade-offs? Most HN commentary focuses on FUD around the signal founder rather than technical reasons why it shouldn’t be federated and would love to understand them better


Moxie wrote an extensive blog post outlining the reasons they were not going to make use of a decentralised system.

I believe its this post here, but someone correct me if this is the incorrect link: https://signal.org/blog/the-ecosystem-is-moving/


You realise that this idea of "embedding a smaller, old address space inside a newer bigger one" has existed in IPv6 for a pretty long time now?


A car and a motorcycle both travel on roads, but they are still not the same. - Henry Perkins


You can sort of convolute a reason why 401 Unauthorized is valid, based on the fact that most systems which control access to resources have a (often implicit) policy that users for whom the identity is not known are not allowed to access anything.

Therefore the request is unauthorized because the server wasn't able to authenticate the user. But that's still not consistent with 403 though, so it's not very satisfying.

But this also speaks to one of the nubs of the terminology issue. "Actors" are authenticated, "Actions" are authorized.


Yeah, I think if they were renaming these response codes today, they’d name them something more like “401 Not Authenticated” and “403 Not Authorized”, but it’s too late for that. And I personally think you can say that either an actor or an action is “not authenticated.”


> Good luck getting the personal phone number of an EU Commissioner. You can't vote for who decides things in the EU. You can vote for MEPs but they don't decide things.

Replace "EU commissioner" with "government minister" and you've just described the UK, where we also don't elect the people who decide things (the cabinet).


Where does the EU require websites to show cookie banners?


Didn't they buy one of these (Solaris)?


That was after the launch of Oracle Linux.


Maintaining an entire separate OS (like Solaris) is hard. Maintaining a fork of a Linux distro is easy.


> That's irrelevant - the phone number is known to Signal and can be request by law enforcement.

So how does this work? Law enforcement asks signal if they have an account for a phone number, signal saying "yes, here's when they created it".

Then what?


> Law enforcement asks signal if they have an account for a phone number, signal saying "yes, here's when they created it".

Law enforcement says that the suspect chatted with some username/told people to contact him by his Signal username, then they go to Signal and request the linked phone number, which is then linked to the ID shown when the card was bought.


This only works as long as the username is active/unchanged. It would probably be better if usernames were never linkable to phone numbers, but if your threat model requires a persistent, non-ephemeral username to remain anonymous when targeted by law enforcement that has access to your telecom records and warrants... that's going to require a pretty high level of opsec.

The UX on usernames in Signal might be non-ideal. It might be helpful to have a toggle that regularly cycles your username if that's important for your threat model.


"Get me all the numbers which talked to X, including all the numbers".

You won't get the actual plaintext messages, but the contact graph + metadata (timestamps) are pretty sensitive.


Signal doesn't store the graph, nor does it log message timestamps.


How can you know without access to their servers?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: