Hacker News new | past | comments | ask | show | jobs | submit | luch's comments login

Yep I use it quite a bit as well as Buffer's AI assistant to help me rewrite texts, or at least give me interesting synonyms. It's probably the only venue where I can say "maybe AI will help people instead of ruining their jobs"


there is a shit-ton of hacker cons outside of the US, the most famous one being the CCC (Chaos Computer Club Convention) in Leizpieg/Hamburg, Germany just before new year's eve.

You mention Dmitry Sklyarov but more recently Marcus Hutchins (MalwareTech) has been also arrested by the FBI following its appearance at Blackhat or Defcon


I don't think so, the adoption rate has done nothing accelerating since WWII. Once EV will be mainstream enough the switch will probably be quite brutal.

I don't think it is economically viable to maintain two sets of power distribution (electricity and petrol) at the same time so countries will probably "push out" traditionnal petrol stations once they think EV distribution is okay enough


Honestly what's the difference whether it's POTUS or Congress blocking the bill ? The writing on the wall is here: if Russia invades Poland, NATO article 5 or not the US will not go into full blown war with Russia.

And honestly it was the European's fault to believe in this pipe dream.


"And honestly it was the European's fault to believe in this pipe dream."

Having lived through Reforger exercises, with US tanks everywhere and sonic booms every few minutes, I believe up and including Reagan it was clear the US would not let Soviet Russia invade Western Europe b/c of the resulting shift in world power.

After the EU got more powerful and expanded, dynamics changed.

It's unclear with the Bushes and clear that Clinton/Obama/Trump would not aid Europe.


a videoconfering system that is reliable and easy to use is essential to remote management. You need to have as little friction as possible to propose a 1-1 or a 15 min roundtable to quickly brainstorm something orally.

Then you need remote "telemetry", meaning access either to chat messages, email, tickets, etc. and a way to process it at scale (without reading everything) in order to defuse sticky situations based on partial infos or misunderstandings. Such tools can be panopticon-y so you need to explicitly specify which convos "spaces" are private and which are subject to management interference.


You just described Teams, Slack, Skype, and Zoom. all ubiquitous and industry standard.


All trash. A meeting in person is always shorter cos you don’t deal with audio issues a talking over each other and the mountain of other issues from remote calls. No amount of money in good hardware fixes this no matter what anyone claims.


Do you live in a region with poor internet, or do your coworkers? I've been fully immersed in Meet and Zoom calls for 6-7 years now, and all the issues that used to come up are now mostly gone as they were rooted in people not having the correct habits and setups.


lol. No amount of good internet fixes remote calls.


Most people working for organizations with multiple offices have to videoconferencing all the time anyways. If video calls were really that big of an issue, having offices around the country/world would’ve stopped being a thing by now.


So what you’re saying is that if video conferencing works, regardless of it works well or poorly, it works therefore it’s not an issue. Even if a team worked faster, more efficiently, in person. It’s ok to be remote because it worked even tho they are less efficient and it doesn’t work as well.


Erm, also Meet and the rest of the Google Suite (Chat).


Are you proposing that my management should be able to see my chat messages and email ad hoc and without approval or assistance from IT, legal, or their management? That seems bonkers to me.


That's not what I wanted to say. With remote teams, you need to establish a way to organize the work using written communications which are either mail/slack/sharepoint/whatever and within this framework management needs to have a "view" into what the team is doing.

It means for example being systematically in cc for mail exchanged and being in every teams discord channel. The new social contract when working remotely is "you (the manager) can't look over my shoulder to see if I'm working correctly so I (the employee) need to show proofs of communication instead".

I've seen too many juniors working remotely that just don't communicate on their day-to-day work, and completely blindside their manager/coworkers which understandably freaks out.


I can't reply to the reply to this comment, but you raise a key point. While employers control the data, they don't use it like people seem to assume. Managers are not managing if they attempt to resolve conflicts by attempting to decipher private conversations.

There are many ways to resolve these problems without resorting to spying on messages. In an in-person situation with a conflict, there may be no record. We know methods to resolve these conflicts, so I don't understand why people go immediately to "employers control the data so they can just use it."


I think in all team and project rooms/channels/email d-lists, yes, those should be easily readable by managers because they're not contemplated as private. I think DMs and individual emails should not be accessible to managers (absent a very specific legal/compliance/HR concern).


Oh, I certainly agree with that, and was hoping this was considered the norm (as it has been in my experience).


Bonkers or no, that is a current legal reality if you're talking about chat or email messages which are sent and received using employer-provided means. If an email address ends in your employer's domain, it's not your email account unless you're self-employed.


> Then you need remote "telemetry", meaning access either to chat messages, email, tickets, etc. and a way to process it at scale (without reading everything) in

So tools to spy on your employees?


Obviously no what I mean that is ok if your superior and his boss are invited in your team's slack channel even if they only lurks, and you don't create a "shadow channel" with your teammates to talk on the project without being read by your hierarchy.

Same thing with corporate internet, you accept to use the corp proxy DNS and firewall (which all logs infos) to browse the internet instead of using a separate GSM endpoint to circumvent the company's surveillance.


>> Then you need remote "telemetry", meaning access either to chat messages, email, tickets, etc. and a way to process it at scale (without reading everything) in order to defuse sticky situations based on partial infos or misunderstandings.

How is that specific to remote work? People in the same building have the same misunderstandings with the same tools. The way to fix it doesn't involve management spying on the communications and attempting to decipher them.


So, teams??

Basically industry standard


Teams is not reliable. It's a steaming pile of dog shit.


As are the rest of them in my experience. Zoom has been hands down the worst for me, seconded by Teams and then Meet.


Zoom has been far and away the best of the meeting tech I use. Excellent audio processing and generally reliable. (Also a nice convenient slack interface, so /zoom <RET> <RET> starts a Zoom meeting and pastes the connection info into the channel.)

Teams was okay. Meet was okay once I figured out how to grant it the MacOS access it needs. Chime started in early pandemic as a terrible, terrible joke of a product and then evolved to being a close 4th place.


most pentesters worth their salt would never do mass exploitation of vulnerable systems, there is little upside doing that and you never know what side effects you will trigger.

This project is fine for the author's self-improvement on how SSH is implemented, but personally I advise against using it in a production environment.


If you don't use it, someone running some random bit of "curl|bash" will


If you just connect to the hosts, I think it's unlikely to hit any serious side effect. And this can be discussed beforehand with the client anyway.


no way in hell the NSA forcibly tries to reinfect targets over and over, that's not their modus operandi. Instead they would have spend money to find a persistence on the infected device.

The fact that the attacker has almost a full-chain but no persistence screams to me "second fiddle", probably a nation state that have access to 0-days brokers but no in-house engineering.


Persistence on iOS is really, really hard.


I agree with you on that, but the USA (and probably China) is the nation state least likely to skimp on iOS persistence when targeting Russian AV analysts :D


I can only guess at motivations but I would think that when targeting security researchers you’d aim to not have persistence since that would make require leaving evidence of infection on the device.


This is not the first time the NSA infiltrated Kaspersky. Avoiding persistence was one of the desired requirements of the attack.


It wasn't clear to me from reading the blogpost that persistence _wasn't_ achieved?


They mentioned that the suspicious traffic stopped after a restart.


I'm not seeing that mentioned in this blogpost, was it mentioned in one of the other ones?


https://securelist.com/operation-triangulation/109842/

They talk about it here, under "what we know so far"


FTA: "Once the device rebooted, all the suspicious activity stopped."


Enabling lawful interceptions would only dry half the swamp, the other half being clandestine intelligence operations on foreign targets.

No way any reputable OS vendor would agree to enable, for example, Dutch intelligence services spying on Russian citizens living in the UK.


You jest but an eco-militant French association was dissolved last month for various reasons but among them :

- "le fait de ne pas communiquer les codes de déverrouillage de l'appareil ou de ne pas répondre aux forces de l'ordre en cas d'interpellation ; " // to not unlock your phone when police ask for it during an arrest

- "le fait de laisser son téléphone mobile allumé à son domicile ou de le mettre en « mode avion » en arrivant sur les lieux de la manifestation pour éviter le bornage, " // leaving your phone at home and go protesting in order to prevent from being geotagged


Mind you share that association name ?



> The chronological feed is coming soon

Not it won't. Facebook removed the chronological feed 10 years ago, they won't reintroduce it in Threads.

"Curated" feeds is how they get announcers to pay for visibility since the user has no control over what it is displayed at a given time


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: