Hacker News new | past | comments | ask | show | jobs | submit | smhg's comments login

Not even one per day as far as I can tell.

The Amtrack website also mentions:

Known as Maryland's “Queen City,” Cumberland was an early gateway to the West. Today, it is a bustling arts center and popular stopover for cyclists using the trail network between Pittsburgh and Washington, D.C.


> If you store any kind of data about a visitor to make their life more convenient, is that tracking? Shopping carts? Notification preferences? etc.

If it is crucial to provide the service or the service is explicitely requested by the user (i'd argue a shopping cart is), I think you don't need consent (see Article 5 of Directive 2002/58/EC).


Making a video about a specific sound, talking through the whole (first?, hopefully) example.


> But then the governments will legislate against citizens usage of the technology.

No, given some exceptions (think dictators trying), that's not going to happen, right? At that point it's not a technological issue. You're talking about the right to be cryptical in everyday speech.

Edit: or, in a different approach, they'd have to forbid (private) use of (some) algorithms. Again, that sounds like you'll have bigger issues then, no?


There is a growing minority of people who think this is the way the world is going. Trends in legislation in this area within Western democracies seems to indicate that privacy is being consistently attacked in the name of protecting the wider public.


I don't have one either but I could read it on Mastodon. If it helps someone:

https://fosstodon.org/@javilopen@bird.makeup/111332485943091...


This sounded to me like the age of 8. But it's about 8th grade, which seems to be 13-14 year olds.


I heard some expert recently saying he backs this idea but thinks it should be 9th. Otherwise it’s in the middle school and that creates pressure for 7th and 6th graders. Makes sense to me to have the transition be middle school graduation.


You can also attempt to do this within IKEA. You can sometimes buy bed/sofa/... legs separately and use ones from other series and furniture.

Sometimes they are quite different, or at least fit your style better than the default ones.


They sell various knobs and handles too, at least in Europe, next to the returns/damaged sales section.


That graph does not have 0 as the starting point, which makes the so called spike look more dramatic. Try to enlarge the view by selecting a much longer period of time.


Logitech's dongles (and possibly others) mimic a USB connection while still being wireless. They also allow you to access your BIOS.

Things being what they are, I don't think Bluetooth is the right setup for input devices.


They are also a major proprietary hassle, whereas with Bluetooth and a Logitech K380 keyboard, which is cheap, readily available everywhere and reliable as heck I can switch between three machines at the press of a button.

I use that and an M720 Bluetooth mouse to switch between two work machines and a personal one on the same desktop, which is something you just can't do with the Logitech Logi Bolt dongle - even if you buy multiple ones.

Also, I've been using this setup with Macs for ages (that's one of the machines above), and never ran into the same problem.


Pros and cons? With the Logitech (and others) dongles you can also just plug them into a KVM and swap that way which isn't an option with Bluetooth, the device specifically has to support multiple devices.


But to use a KVM you have to have some form of commonality between devices (one of mine only has USB-C ports), plus you have to have all the cabling. And most consumer KVMs only take 2 outputs.

I'll take Bluetooth _any day_ over having another mess of cables, another box, and what boils down to less ease of use.


I use a USB C hub with my KVM for my laptop. The hub takes the KVM USB A cable and the DP cable. One cable connects the laptop and I can switch PCs with a touch of a single button. I don't like switching inputs on my monitor manually through the OSD. You can get KVMs that do 3 or 4 computers with multiple monitors, although granted they do cost more. Again, pros and cons! I find it pretty slick though.


I added a small udev rule to send a "change input" dcc command to the monitor when my USB switch connects or disconnects. The monitor has a USB-C input, and I connect the USB ports it provides to my USB switch.

Cheaper than a KVM, though it only works if the computer that has the rules is turned on (that monitor accepts commands from inactive sources).

If somebody knows a ready-made "reverse dock" (USB-C dock connector -> USB-PD out + DP in + USB device), I'm all ears!


I'm always uncomfortable when typing a password on a wireless keyboard.


Entirely reasonable stance. Previous story[0] about keyboard “security”: 8/10 tested were vulnerable to sniffing or injection. A handy summary table someone put together

  Protocol   Sniffing   Injection
  Plexgear   Yes        Yes
  Rapoo      Yes        Yes
  Logitech   No         Yes
  Corsair    Yes        Yes
  iiglo      Yes        Yes
  Exibel     Yes        Yes
  Razer      No         No
[0] https://news.ycombinator.com/item?id=33123406


The comments for that article also point out that Bluetooth is more secure.


Oh, come on. All of it is now end-to-end encrypted. Unless you're using some cheap Chinese setup.


Or Logitech Unifying and did not install a firmware update manually


Well, Bluetooth does the encryption part "properly", at least.


"Properly" or properly? Quotes imply some sort of caveat, like it actually doesn't do it properly.


BT 3.0, 4.0 and 5.0 have slightly different twaks on that. You could spoof connections in older versions, although the details have slipped my mind.


And what about side channels? It should be relatively easy to link timing to each key pressed, for instance, if not outright extracting the encryption key from emitted signal power fluctuations.

These approaches are not just theoretical, they have been shown to work. And that's assuming the protocol itself is not vulnerable and has been implemented correctly. Moreover, I tend to use my keyboards a long time, making it likely that a new attack becomes possible over its lifetime.


Personal question, feel free not to answer: what is your occupation that someone would find so interesting as to drag over a truckload of RF equipment near your location to try to home in on your 2.4Ghz keyboard, which operates in one of the most saturated frequency ranges known to modern man? :)


Oh, I'm mostly worried about "dragnet" approaches and script kiddies.

I still occasionally use a wireless keyboard to type in a password, but by avoiding these, I also lower the probability of interception.

It makes me most uncomfortable when I am typing log-in credentials to my personal home server, that could be used to log in over the internet.

Other than that, I work at a lab, which sounds like a juicy target for leaving a passive Bluetooth sniffer in a closet somewhere.

I've just played enough with BackTrack (now Kali Linux) in my teens to know that other people may be doing the same.


I've used Trainline [0] twice for cross-border train travel because it fits in-between those 2 options (Google Maps vs Nightjet).

[0] https://www.thetrainline.com/


https://rome2rio.com is also helpful when searching for trains


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: