Hacker News new | past | comments | ask | show | jobs | submit | mauz0r's comments login

People in The Netherlands are used to this sound, hearing it every first Monday of the month at noon for the last 17 years now.

I wonder how effective this will work in case of real trouble.

https://www.rijksoverheid.nl/onderwerpen/terrorismebestrijdi...


Bavaria here, and every first Saturday the siren goes off for testing purposes as well. This was supposed to be bigger scale though.

Haven’t heard anything today.


I'm also in bavaria and did hear it. Probably a problem in your city, not in all of bavaria.


I kinda figure that if people heard the lunchalarm going off at a different time, they'd just assume it was Monday noon and it'd confuse the rest of their week.


If I recall correctly in a non-testing scenario the sirens are twice as loud as during a test. Should provide enough of a hint I'd imagine.


Same here. Colloquially, it's the monthly 'Germans invading again' alarm ;)


In Sweden it is the Fikatuta, ie a signal telling that it is time to get some coffee.

(or that the Russians are invading again)


And in Sweden since forever


Actually the same in the Netherlands, except that for a few years we had "silent" alarm tests. This was of course a bad idea (actually letting everyone hear it is quite reassuring, and it's good to know what it sounds like), so this was reverted, although that took longer than it should have.


> Note that you are trusting this app with your private key. While other apps are sandboxed away from having access, all it takes is one update to the app to sneak away your private key to any remote server. You have to trust the publisher of this app, including their entire chain of source code repository management and app build/release process. It takes a single instance of a malicious person inserting code that steals all users' private keys (disgruntled employee at this company, or social engineering attack to gain access to commit to their GitHub, etc.).

Fair point, not really applicable in this case though. It looks like everything you'll need you can find on their GitHub https://github.com/kryptco yourself.

Which means, you could check/skim the code strange "phoning-home calls" and get rid of them in your own fork. It would be nice to have some security experts doing some code review :)

> Also likely to be less devastating of a loss compared to the compromise of the contents of a password manager.

I often compare this situation like when you've lost your actual keys/keychain. The person who find your key's needs to figure out where to use them (if you don't store the address with your key's you're kind of fine).. If someone find my private keys, github is something I would worry about the most. The good thing is you can add a passphrase to you ssh keys (something you can't do with your "real" / physical keys ;) )


>> everything you'll need you can find on their GitHub

The fact remains that app installs are bundles whose base source could come from anywhere. There's no guarantee that what you install from an app store was built from their GitHub. On a non-jailbroken iOS device, you're installing a closed-source binary with no inspection possible. I believe you could build your own Android apk from their GitHib, but how many users would ever do that (let alone rebuild it on every update)?

As I mentioned, I suspect that the first attack against one of the major password managers will result from a commit to the official repository (ex: GitHub). Users are not looking at every commit to GitHub before updating an iOS app to make sure that the latest version doesn't have a backdoor.

At the end of the day, you must trust the app publisher with your unencrypted data within the app. Anyway, for this ssh product, I wouldn't be all that worried. Password managers though... I'm waiting for the first attack to happen, at which point I can point to my HN history to show I saw it coming. ;)


My guess would be that they figured out how to compile QT statically (hence 14MB file size)... Other then that it seems to be a common RAT


Yeah, me too, however stuff only works for one specific browser and the video works for uhm.. all of them?


If you stick to official software and don't care to scan documents for windows viruses and such, you won't need any antivirus. I do however use CleanMyMac 2 to remove stuff I don't use, this is the only piece of "cleaning" software that I think is actually worth it. I like how it helps me getting rid of logs and language files in a lazy way :)


Coconut Battery is nice. You can let it take snapshots and compare it with other batteries online. You can view my battery health here http://ccbonline.coconut-flavour.com/index.php?bid=d78a6c124.... I try to unplug at 100% and recharge it at 10-20%. Once per month I drain it all the way to 0%.

After reading this thread I try to keep my battery at a 50-80% charge :)

Except when I do some CPU intensive stuff like compiling or rendering, then it is being charged thought the process.


I like this app very much but only used it during the trial. (It was a bit expensive imho.) It is nice to see that is open source now. Really hoped this would be the next iWeb successor. I dint know about framerjs; it looks neat!


You now know the payload and the endpoint, so feel feel to fork


Here in Europe Apple is replacing affected logics for free with consumer law claims. The are only two conditions: 1. you need to have the original receipt 2. it must be a non business purchase (so you must be a consumer)


EU rules provide for a two year guarantee, which is nice:

http://europa.eu/youreurope/citizens/shopping/shopping-abroa...


Lots of pun. The counter is going up quite fast, I wonder how long this wil be up.


the counter was going down when I was flipping through. Folks must be flagging sites?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: