hacker news with inline top comments    .. more ..    13 Jun 2017 Best
home   ask   best   5 months ago   
1
Please Make Google AMP Optional alexkras.com
1126 points by tambourine_man  2 days ago   428 comments top 60
1
epistasis 2 days ago 5 replies      
I'm trying to imagine the uproar if Apple had done AMP instead of Google. Somehow AMP has some staunch defenders, but everything, and I mean everything about how it's been approached has felt very anti-web and pro-Google. The overall concept may be sound, but the implementation, and the inability to escape it, has significantly hurt my opinion of Google. In fact, I no longer use Google's search because of it.
2
niftich 2 days ago 4 replies      
Google Search on Mobile is no longer a web search engine that hyperlinks to the resulting page, but rather an search-integrated newsreader that loads itself when you click on a result that's marked with AMP. This is understandably a big change from how things used to be, but it isn't going to get better anytime soon.

After all, most people on mobile spend their time inside apps, probably from some Google competitor like Facebook. Within these apps, they click on links, which increasingly load inside webviews; the framing app collects info on where people go, and uses this to sell targeted advertising. Facebook is a king in this space, and is now the second largest server of internet display ads, after Google.

Google's assault on Facebook's encroachment is twofold: drive people to Google's apps like the Google Now Launcher (now the default launcher on Android) or the Google app present in older versions of Android and available for iOS, and deploy the same content-framing techniques from their own search engine webpage on mobile user-agents, where the competition is most fierce, and they can also position it as legitimate UX improvement -- which, to their credit, is largely true, as bigpub content sites on mobile were usually usability nightmares and cesspits of ads.

I understand that the author and quite a few others are peeved at this behavior and that there's no way of turning it off. But it's really not in Google's best interest to even offer the option, because then many people will just turn it off, encouraged by articles like the author's own last year where he was caught off-guard and before he gained a more nuanced appreciation for what's really going on.

The bottom line is this: Google is inseparable from its ad-serving and adtech business -- it is after all how they make most of their money -- so if you are bothered by their attempts to safeguard their income stream from competitors who have a much easier time curating their own walled garden, you should cease using Google Search on Mobile. There are other alternatives, who may not be as thorough at search, but that's the cost of the tradeoff.

3
godot 2 days ago 4 replies      
There's a lot of complaint about Google AMP and Facebook Instant Articles, e.g. walled garden, anti-open-web and whatnot.

Here's something simpler from a non-developer, average-consumer point of view. I recently began taking BART to work daily (new job). For those who don't know, BART is Bay Area's subway system, and (at least on the east bay side) cell reception is notoriously spotty.

When I'm on the train, which includes 2 hours of my day everyday (unfortunately), I'd be browsing on say Facebook, and look at links that my friends post. Instant articles almost always load successfully (and quickly) and external links to actual sites almost always fails to load or loads insanely slowly.

Yes, when you're at home or in the city with good mobile reception, these things make no sense and you'd rather hit the original site directly. Give them their ad revenue, etc. to support them, right. But for the average consumers who actually have problems like slow internet (like the average joe who rides public transportation and wants to read on their phone), things like AMP and Instant Articles actually help. I can only imagine outside of silicon valley (where I live), how much more significant of a problem slow internet/slow mobile data actually is.

P.S. I don't work at Google or Facebook, and I know this sounds like propaganda, not to mention this is exactly what they would like to tell you as the "selling points" of these features, in order to continue building their walled garden empires. Fully aware of it, but I did want to bring up why they exist and why I even actually like them.

4
gub09 2 days ago 5 replies      
Please, web developers, as a minimum, set up your websites so that they do not depend on Google, Facebook, Microsoft, Amazon or Apple for their functionality. That means, for example, use DoubleClick or AdSense or GoogleAnalytics if you like, but please do not use jquery from Google's CDNs. If you do that, and the site is dependent on that functionality to work (i.e. for text to be displayed), those of us who don't allow Google CDNs will not be able to use the site. The same for WebAssembly: use it if you like, but please don't make your actual content unnecessarily dependent on the use of services from these multinationals. It makes the Web less free.
5
daveheq 2 days ago 4 replies      
Google AMP:

1. Obscures the web page's URL.

2. Makes manual zoom in/out impossible.

3. Sometimes hides content mentioned in the article, with no ability to scroll horizontally to see it.

4. Confuses Chrome on Amdroid into over-hiding its top address/menu bar (forcing two swipes down all the way to the top to show) or forces it to show (won't hide on scroll down).

This is just coming from a user's perspective, fortunately it doesn't impact my work, but may in future websites I build due to it being almost 100% of the news articles I read.

6
matthberg 2 days ago 0 replies      
"What I realized today, however, is that while I dont so much mind AMP as a publisher, I really hate it as a user. I realized that EVERY TIME I would land on AMP page on my phone, I would click on the button to view the original URL, and would click again on the URL to be taken to the real website.

I dont know why I do it, but for some reason it just doesnt feel right to me to consume the content through the AMP. It feels slightly off, and I want the real deal even if it takes a few seconds extra to load."

I have subconsciously been doing the exact same thing for a while now, and I think this quote covers a good deal of public sentiment. It's weird to use AMP, yet slower without it.

Another main issue I have with AMP is that there is no speedy way to check the url, something I do quite frequently. Instead it's just Google's hosting for the site, with the source being only available by clicking on the link icon.

7
sintaxi 2 days ago 8 replies      
I suggest stop using google search altogether. https://duckduckgo.com/ is an excellent search engine and its trivial to make a google search via `!g` prefix when you are not finding what you are looking for.
8
ciconia 2 days ago 7 replies      
At 43yo I probably belong to the older folks on HN, but those modern devices all of us carry in our pockets to me seem just absolutely incredible and magical. They probably can run around machines that took up whole rooms just a few decades ago.

At the risk of sounding like an old fart (I probably do), I fail to understand this frustration of normal mobile users with the so-called slowness of their mobile experience. To quote CK Lewis: "Give it a second! Its going to space! Can you give it a second to get back from space!??"

9
andy_ppp 2 days ago 2 replies      
What really gets me about the AMP Cache (AMP itself is fine by me) is that it doesn't actually make anything faster. If you time the difference in download speed between the real website AMPd page and AMP Cache URL the difference is almost nothing in 99% of cases. And neither page load gives you that magical instant hit you get on Google's SERPs.

The speed difference on SERPs is the background downloading and (possibly) pre rendering of AMP pages. This functionality could easily be added to browsers, keeping people on their own websites and Google not having control over the content.

We already have <link rel="preload/prefetch"> but how about adding <link rel="prerender" href="http://amp.newswebsite.com/article/etc." />.

This would absolutely give all of the benefits of AMP Cache without Google embracing and extending the web. It's also much simpler to integrate, every single site can choose to benefit from this (not just SERPs) and I don't end up accidentally sending AMP Cache urls to my friends on mobile.

10
wmf 2 days ago 2 replies      
The author's argument against AMP comes down to "I dont know why I do it, but for some reason it just doesnt feel right to me to consume the content through the AMP. It feels slightly off". This is... not a strong argument.

The AMP saga has pretty clearly shown that users care about content while Web developers only care about URLs and what goes over the wire. This is a huge disconnect. It doesn't help that many Web developers show no empathy for the users' viewpoint.

Ultimately it probably is easier for Google to add an opt-out to appease a very small, very vocal minority than to educate them that the URL doesn't matter.

11
sorenstoutner 2 days ago 3 replies      
My experience is that all the advantages of AMP can be had by disabling JavaScript while browsing. And this comes with none of the disadvantages of ceding even more control to companies like Google and Facebook.

In my opinion, JavaScript should be disabled by default and only enabled for specific tasks or websites. Not finding exactly what I was looking for in any other browser, I eventually created Privacy Browser on Android. https://www.stoutner.com/privacy-browser/

There are extensions like No Script that can give similar results for other browsers. https://noscript.net/

12
tangue 2 days ago 2 replies      
AMP has been created for product managers. Everybody in a project knows that slow and bloated pages hurt users, but business requirements are making it impossible to do otherwise. Google AMP solves this problem, in an authoritarian way (hence the outrage), by defining what's good and bad for the Internet.

Marketing has taken the lead in corporate websites projects to the detriment of the end-users, AMP puts the user in the center.

13
j1vms 2 days ago 0 replies      
What some may fail to see is that the Web's success in the smartphone/mobile era is not yet secure. Both Facebook and Apple, among others, have vested interest in treating the Web as competitive threat. I believe AMP was Google's response to Facebook's Instant Articles.

Although there is much to be concerned about Google's ever-expanding reach into the daily life of a good portion of the planet, I think web proponents have more to fear from the likes of FB, Apple, and others appearing on the horizon. These companies are mostly succeeding at meeting current UX expectations (performance, standardization, ease-of-use), and in doing so they are capturing eyeballs away from the web. It's possible some of those who have left for these walled gardens may not return.

14
b0rsuk 2 days ago 2 replies      
The article displays his autocomplete hints:

 google amp pages google amp annoying google amp sucks google amp conference
My equivalents in google.com are:

 test cache disable maps
Both bing.com and duckduckgo.com (which doesn't track) don't recognize "amp", even when I put both first words in quotes, and assume I made a typo in "maps".

This simple test is therefore inconclusive, but my hypothesis is that his search autocomplete hints are, ironically, colored by his search history. The only negative word I got (disabled) is much more neutral.

Now that I think about it, duckduckgo's "no tracking" isn't just valuable for privacy. It's also valuable for consistent search results across computers without yielding even more information (logging in etc). A few times I made a query and found something useful and surprising, and then I wasn't able to replicate the query on another computer to show someone else. In any case I'd hate to miss a rare interesting page because Google thought that extra 10 pages about Linux might interest me more.

15
naasking 2 days ago 1 reply      
I'm starting to hate AMP for one simple reason: it breaks the back button on my Android phone. Like, what the hell? Didn't we do this dance over 10 years ago? Do we really have to keep circling the same drain over and over and over again?
16
omot 2 days ago 12 replies      
I never really understood why google amp is bad. Can anyone explain the reason why people think its ethically bad?
17
drawkbox 2 days ago 0 replies      
Towards the end of AOL (early 2000s), they used to take all content that you visited through their browsers and re-compress and sometimes remove things from the sites. This sometimes really ruined image color, layouts, style etc.

The agency I worked at it was a huge problem because back then clients and business people still used AOL and would see the jacked up versions of their site. There was literally nothing you could do, they did it to small and large sites without abandon.

AMP reminds me a bit of that type of setup with AOL re-compressing and crunching down sites through their network. I agree with Google on doing this for email for security but not necessarily websites. AMP to me is quite annoying and in general a bad move.

18
801699 2 days ago 0 replies      
"... Google's AMP team even invited me to have lunch with them."

Reminds me of this:http://blackhat.com/media/bh-usa-97/blackhat-eetimes.html

As far as I can tell, in order to be "forced" on a user, AMP must rely on javascript, the browser used or maybe the OS (I trust they are not rewriting search results to point to AMP but that could be another one).

A no javascript command line tcp client will retrieve the page without automatically following the amphtml link. Users thus have a choice. And if choosing the amphtml link it is easy to filter out everything but the text of the page (the content). In that sense AMP is quite nice.

The "forced" nature of AMP should make users think about these points of control for advertisers and Google: javascript, browser, OS. Maybe website owners will think about them too the next time they "recommend" or "require" certain browsers. Web should be javascript, browser and OS neutral.

19
johneke 18 hours ago 0 replies      
Even if people are for/against AMP, I think it does make sense to have AMP optional. For instance Google searches will often show the "Ad"-ified link at the top, but with the regular link somewhere below in the search results. Google could just as easily have the AMP and non AMP links in the search results if they aren't really the evil corp everyone thinks they are :)
20
BinaryIdiot 2 days ago 0 replies      
Honestly AMP should have been a set of tools / a framework. Think about it.

Currently with AMP Google gets not only your traffic but they get your content on their own domains (which makes all content look like the same trustworthiness) and, at the same time, they mark sites that have AMP available in their search results thusly weighting those results differently because it can train users to click on those more.

Ultimately this is bad for everyone but Google.

However, if it was a framework / set of tools we could create our own AMP pages and simply put them on our own DNS. Google's cache is really the only unique thing going on here and we wouldn't have to worry about sharing trust.

21
cmac2992 2 days ago 1 reply      
I love AMP as a user. So many sites have brutal load time and jumpy pages, popups and sometimes crashes.

As a developer I'm not a fan. It's another thing to manage and maintain. And the last time I checked once you can't leave without some serious consequences.

As a marketer I like the increased CTR but dislike the higher bounce rate and limited features.

22
limeblack 2 days ago 0 replies      
So another article was posted a couple weeks ago about AMP. One advantage I have seen is that you can get around intranet blocking sites if they support AMP. Besides obviously speed this is the only advantage I have found.
23
whyagaindavid 2 days ago 0 replies      
Here in 3rd world with flaky 2/3G and just 100-300mb data, AMP is welcome. We still use 1G ram phones!
24
ender7 2 days ago 8 replies      
Users: I like AMP pages, they're fast!

HN: But the open Internet!

Users: What's that?

HN: Normal websites!

Users: Like...the really slow ones? With all the annoying popovers? And pages that take forever to load? And for some reason cause my fancy new phone to slow to a crawl?

HN: Well, those websites should rewrite their entire codebase to be faster.

Users: That doesn't help me, though.

HN: Trust in the free market! The problem is you, the user, who just needs to exert more pressure on website purveyors so they'll make performant web sites.

Users: You mean, like, preferring websites that offer faster experiences? Okay. Continues to use AMP.

25
abrowne 2 days ago 2 replies      
I've never actually seen AMP "in the wild". Is it because my only mobile browsing is with Firefox on Android?
26
frankydp 2 days ago 2 replies      
Isn't AMP just an RSS reader for the entire internet?

If they solved the URL issue somehow(even if faking the address bar), and had original and AMP links in search; it would probably reduce the antiAMP argument quite a bit. Which both seem to be just UI issues.

27
jbg_ 2 days ago 0 replies      
I started using a self-hosted searx[1] instance recently, and I highly recommend it if you'd prefer to not have to care about this nonsense.

It's the first time I've found an alternative to google.com that is actually usable (i.e. I find what I'm looking for near the top of the first results page every time I make a search).

You can use Google as one of the results providers, but you won't see any AMP results, and since searx can mix in results from Stack Overflow etc, you might find that a different search engine than Google still gets you good results.

I think Google would pull fewer of these monopolistic tricks if people would realise they have genuine alternatives.

[1] https://github.com/asciimoo/searx

28
bsaul 2 days ago 0 replies      
This is crazy, i never noticed those amp links until i read this article. I never clicked on it because my brain somehow classified them as "weird google stuff looking like a new kind of ads". It looks so much like the "external content" ads you find on some website, plus it provides less room for the first sentences of the article, so it made it look even more like clickbait.

What did happen though, is that i found google results a lot worse on mobile, and ended up not searching for stuff on my mobile. Google results really look like a mess on mobile now...

They really went from minimalist zen to baroque indian arabesque over the year...

29
makecheck 2 days ago 2 replies      
Be sure to structure your Google searches as "g!" searches to DuckDuckGo and AMP effectively disappears with the same set of search results.
30
tempodox 2 days ago 0 replies      
If we need Google to tell us to do something that could just as well be achieved by applying reason and sane engineering, without capitulation to a monopoly, then something is deeply wrong with our industry.
31
quadrangle 2 days ago 2 replies      
> this jeannie is firmly out of the bottle

It's "genie"

32
codazoda 2 days ago 0 replies      
So, funny thing. I have been ignoring amp results by accident. I didn't realize what they were and they look like sponsored ads, so I had complete "banner blindness" to them. Odd, now I'll try a few.
33
alenros 1 day ago 1 reply      
Wrote down this Tampermonkey\Greasemonkey script that would do the job of automatically redirecting you to the original content. can also be obtained from [0]

// ==UserScript==// @name Un-AMP// @namespace http://tampermonkey.net/// @version 0.1// @description avoids google AMP links and navigates to the original content// @author Alenros// @match https://www.google.co.il/amp/*// @match https://www.google.com/amp/*// @grant none// ==/UserScript==

window.location.href=document.getElementsByClassName("amp-canurl")[0].textContent;

---------------

[0]https://github.com/alenros/Un-AMP

34
vultour 2 days ago 2 replies      
> AMP took off. Over two billion pages are using AMP

I don't think I've ever seen an AMP-enabled website, I certainly never noticed any buttons suggesting I visit the original website.

35
andy_ppp 2 days ago 1 reply      
I mean, if you take AMP to it's logical conclusion why should Google allow anyone to host their own webpages when Google can host them all better and faster.
36
cubano 2 days ago 0 replies      
> To be honest, I dont even know what Facebook Instant Articles are.

Amen, brother.

37
jeshwanth 2 days ago 0 replies      
AMP should be optional, I was getting irritated yesterday as many pages are not getting loaded.
38
burgerdev 1 day ago 0 replies      
> My issue with AMP being used inside Google the Search engine

I'd suggest trying an alternative, maybe https://duckduckgo.com.

39
Artlav 2 days ago 1 reply      
As someone who just heard of AMP today, i still can't find any site where it's used, nor have i ever encountered it in the wild.

Is it an american thing, not enabled for other countries? Just what am i supposed to look for?

40
ccommsxx 2 days ago 2 replies      
I've been waiting for a comment on why re-hosting verbatim copies of the original content by google is not considered copyright infringement? How come there seems to be no discussion on this at all?
41
reaperducer 2 days ago 0 replies      
As someone who used to make WAP web sites for mobile phones, I find AMP's limitations comforting and its goal laudable. Much better than the throw-another-javascript-framework-on-the-pile ethos that they teach kids coming out of school these days.
42
lokedhs 2 days ago 0 replies      
Honest question. How do I see an AMP page? Perhaps my use of a browser is different that most others (I don't use Facebook, for example) but I can only recall seeing an AMP link once or twice.

Do you only see them when doing a Google search?

43
JeremyBanks 2 days ago 1 reply      
Google search doesn't really have many options like this, and I'd be shocked if they added this one.

But given the URL format, it should be trivial for a browser extensions to rewrite links or requests from AMP pages to the original. I bet it already exists.

44
falcodream 2 days ago 1 reply      
If my regular page loads as fast as the AMP page, to within some margin, could Google drop the AMP version and link directly to me? It would make AMP a tool for improving the web rather than replacing it.
45
homero 2 days ago 0 replies      
At least they give you the link now, before was horrific
46
plasma 2 days ago 0 replies      
Like the article, I often dismiss AMP and visit the original, because I want the latest content - AMP is cached and so for sites like reddit the content is out of date.
47
geekme 2 days ago 0 replies      
The publishers should stop supporting AMP collectively. I own a couple of websites and I have not enabled AMP in either of them.
48
grizzles 2 days ago 0 replies      
I posted an alternative solution. https://github.com/electron/electron/issues/8534

The ticket was closed a few days ago. People dislike stuff like AMP, but we are probably stuck with it, there just isn't much interest in alternatives.

49
skmanish 2 days ago 0 replies      
Not able to view AMP pages in my Google chrome right now, neither on my friends' phones
50
learntofly 2 days ago 1 reply      
I use an older iPhone as my primary internet device when at home.

From google news, the top hits are served through amp and I lose about 1/10 of my screen area to a pointless blue "bar" underneath safari's address bar. This loss of screen space is the only reason I object to amp.

51
dabber 2 days ago 0 replies      
I haven't read through the comments here yet but my initial impression of the article is 'ha, I was literally thinking this today'; because I was. AMP is a little heavy handed for my tasteS. Another instance of HN being on the same wave length I guess.
52
tomphoolery 2 days ago 2 replies      
Why doesn't AMP change the URL bar itself? I don't see a reason why it can't utilize the browser history API and attribute the correct URL page view, considering Google is probably doing your analytics too.
53
radicaldreamer 2 days ago 0 replies      
I cant help but think that Google considers more and more posts like this a success metric for taking over this part of the web (like Facebook does with its walled garden).
54
tobyhinloopen 2 days ago 0 replies      
I must be stupid but I never seen an AMP page anywhere. Link?
55
0x0 2 days ago 8 replies      
AMP is bad and anyone who's invested in it should feel shameful for making the internet a worse place.
56
Shorel 2 days ago 0 replies      
Just make your blog in Jekyll instead of WordPress.

Much faster everywhere, in all browsers and platforms.

57
dreamcompiler 2 days ago 0 replies      
Maybe if we all start adding

Pragma: no-AMP

to our HTTP requests Google and publishers will start noticing we care.

58
wbc 2 days ago 1 reply      
anyone from the project? wanted to test out but it looks like the create link is dead: https://www.ampproject.org/docs/create/
59
zhuzhu 2 days ago 1 reply      
This guy earning with Google adsense
60
PaulHoule 2 days ago 1 reply      
Use bing?
2
Chess.com stopped working on 32bit iPads because 2^31 games have been played chess.com
731 points by NewGier  20 hours ago   304 comments top 27
1
eponeponepon 20 hours ago 11 replies      
It's fascinating... the Y2K problem never came to fruition because - arguably - of the immense effort put in behind the scenes by people who understood what might have happened if they hadn't. The end result has been that the entire class of problems is overlooked, because people see it as having been a fuss over nothing.

I sometimes think it would've been better if a few things had visibly failed in January 2000.

2
cm2187 20 hours ago 8 replies      
Self-confidence as a programmer is when starting a new project, storing the transaction ID as a long rather than an int...
3
SomeHacker44 20 hours ago 3 replies      
"This was obviously an unforeseen bug that was nearly impossible to anticipate..."

Snarky... Except that there were probably years of games to notice that you were approaching a "magic number" like 2^31.

4
chesserik 19 hours ago 5 replies      
Hey all. Thanks for noticing :P Obviously this is embarrassing and I'm sorry about it. As a non-developer I can't really explain how or why this happened, but I can say that we do our best and are sorry when that falls short.

- Erik, CEO, Chess.com

5
vitomd 51 minutes ago 0 replies      
A lot of comments but no one said the great time that we are living for chess. So many games online, ready to be analysed and learn from them. After deep blue people thought that it was the end of chess, but its only getting better. Computers helping players to improve.

Chess.com is a great site, also lichess.org and chessable.com if you like chess you should check them.

6
pram 19 hours ago 3 replies      
I recently experienced a nasty bug with BLOB in MySQL. The software vendor was storing a giant json which contained the entire config in a single cell. It ran fine for months, and then when it was restarted it totally broke. Reason was: the json had been truncated the entire time in the database, so it was gone forever. It was only working because it used the config stored in memory on the local system. Nasty!
7
russellbeattie 17 hours ago 1 reply      
This problem is more related to a programming underestimation than the actual limitations of a 32bit CPU (which can happily process numbers or IDs that arbitrarily big if you have the memory for it and program it correctly).

That said, this is definitely indicative of what's going to happen in just 20 years, 6 months and 20 days from now. I mean, we're still cranking out 32bit CPUs in the billions, running more and more devices, and devs still aren't thinking beyond a few years out. I know of code that I wrote 12 years ago still happily cranking away in production, and there may be some I wrote even longer than that out there... and I guarantee I hadn't given two thoughts about the year 2038 problem back then, and I doubt many devs are giving it much thought today.

It's truly going to be chaos.

8
jakub_g 19 hours ago 1 reply      
Long long time ago, I created a poll on a small website I was maintaining. I didn't expect much traffic and, so, not thinking too much about it, I put the ID column to be a TINYINT (i.e. max value = 255)...

That was a valuable lesson.

(I actually generated most entries myself while testing stuff - live in prod of course - and while there were probably fewer than 255 votes, the AUTO_INCREMENT did its job and produced an overflow).

9
throwaway2016a 20 hours ago 1 reply      
Reminds me of the havoc that was caused when Twitter tweet IDs rolled over. Resulting in every third party developer to update their apps (and at the time there were a lot of those).

Twitter saw it coming and forced the issue. By saying that at a certain date and time they would manually jump the ID numbers rather than wait for it to happen at some unpredictable time.

10
ericfriday 20 hours ago 1 reply      
This reminds me YouTube changed its view counter from 32-bit integers to 64-bit integers due to the popularity of 'Gangnam style' https://www.wired.com/2014/12/gangnam-style-youtube-math/
11
shurcooL 20 hours ago 1 reply      
Do we know when chess.com launched? If so, we can calculate the average number of games being played per second.
12
rasz 20 hours ago 6 replies      
were they ever expecting negative number of games? why signed integer?
13
vxxzy 20 hours ago 10 replies      
How many other examples like this have occurred throughout computing history?
14
abalone 19 hours ago 1 reply      
So they probably just need to use longs instead of ints. But I'm curious, if you were really stuck with a 32-bit limit on data types, what's your preferred workaround? I'm thinking I'd add another field that represents a partition. Are there other "tricks"?
15
key8700 18 hours ago 0 replies      
eBay (almost) had this problem and I cannot find any articles about it online. They were rapidly approaching 2^31-1 auctions. So they switched to a larger integer, the switchover went badly, and they were mostly down for 4 days, if my memory serves. This would be like 10+ years ago I think.
16
chesserik 15 hours ago 0 replies      
Fun to read some of other stories where this bit them too (PacMan, WoW, and eBay)! Anyway, new app has been approved by Apple and should be rolling out soooooooooon....

Thanks for all the comments! Always lots to learn from.

17
inieves 12 hours ago 1 reply      
The title is probably wrong, off by one.

You probably mean 2^31 -1.

18
spullara 14 hours ago 1 reply      
The other one to watch out for is the 53-bit javascript integer limit. That caused the twitpocalypse when Twitter tweet IDs hit it. They had to switch to strings in the JSON representation.
19
mtkd 18 hours ago 0 replies      
These are always the best problems to have
20
yoz-y 7 hours ago 1 reply      
What would be the best way to test for this kind of issues in advance. Testing at theoretical limits at all endpoints?
21
phonon 19 hours ago 0 replies      
And I was just reading Heroku/Django discussing the same issue this morning!

https://groups.google.com/forum/m/#!topic/django-developers/...

22
nicky0 8 hours ago 0 replies      
> an unforeseen bug that was nearly impossible to anticipate

Hmmm... :)

23
_pmf_ 18 hours ago 0 replies      
That's the most successful reason for failure.
24
fsiefken 16 hours ago 1 reply      
Will the Lichess app and platform have this issue? And if not, why not?
25
callumjones 19 hours ago 1 reply      
> For f sake how are we supposed to Anderstand that. I suppose your French fry maker is broken ?

Didn't expect Chess.com and YouTube to have a crossover of users? Surprised there isn't active moderation on a site this size.

26
prh8 20 hours ago 3 replies      
Real world example of why Apple is killing 32 bit apps on iOS.
27
mattkenefick 19 hours ago 1 reply      
"Obviously unforeseen.. impossible to predict." Really? You don't know how to properly store ID numbers?

IMPOSSIBLE to predict.

3
Reverse engineering guide for beginners: Methodology and tools 0x00sec.org
733 points by ingve  1 day ago   60 comments top 15
1
badosu 14 hours ago 1 reply      
I highly recommend this guide on how Samba was written, describing the techniques involved on RE [0].

[0] - https://www.samba.org/ftp/tridge/misc/french_cafe.txt

2
strictnein 23 hours ago 3 replies      
After brushing up on this, if you're looking for something "fun" to work through, the NSA's 2016 Codebreaker challenge is good, granted you have a .edu email address (only US .edu too, unfortunately).

https://codebreaker.ltsnet.net/challenge

I think they're going to be keeping the 2016 version up for a while longer. They generally start a new one in September each year.

3
tripzilch 3 hours ago 1 reply      
Maybe fix the title to make it clear that this is about reversing binaries? Because RE is quite a broad term, even within the field of computing and/or generally "topics of HN interest". You can reverse engineer so many other things than just executable binaries. And not just other kinds of software (web), but hardware, communication protocols, even organisations and bureaucracies, or processes in the widest sense of the word.

It's not like this article teaches much about the general "reversing mindset" (similar to the "hacker mindset", but not quite exactly the same), or the "methodology" as promised in the title. Because yes there is some very interesting overlap in skill within the broad field of RE. Ask any pentester who also picks locks.

Not to discredit the article itself, btw, which is fine given what it actually covers. Which is about Linux binaries, and in particular with the object of solving a crackme puzzle.

Maybe "Reverse engineering a crackme for beginners" would be a bit more descriptive.

4
nekitamo 21 hours ago 2 replies      
An excellent introduction to Windows reverse engineering are lena151's video tutorials:https://tuts4you.com/download.php?list.17
5
atemerev 22 hours ago 1 reply      
Binary Ninja is a fine piece of software, but it is more ethical to advertise this article as "nice reversing tutorial included with said software", because not-so-hidden shameless advertisement for it is worse.
6
aidos 23 hours ago 4 replies      
I'd love to know more about disassembly. I've recently had more and more reason to go deeper into applications I'm running as dependencies. A few issues I've found and fixed just by using strace to get an idea of the system calls.

There was one thing in particular where I knew there was a jump somewhere (if some_length < some_width) that caused bad outputs. I was playing around looking at registers etc in gdb while following along with a disassembled version of the code, but it was impossible to get any idea where to start.

I wanted something that could give me a few seconds worth of samples of where the instruction register was spending its time as a starting point, but couldn't find any such tool (linux).

Within my control:

 - giving input files to explicitly set unique numbers to watch out for - giving inputs that would generate bad output numbers only in the bad code path - giving inputs to force a load of jumps down the bad or good code paths
Does anyone have any advice on how you might approach such a situation?

7
doktrin 19 hours ago 4 replies      
orthogonal :

I honestly wish CMU would release the lectures and full class materials for 15-213 (the course most typically associated with the bomb lab mentioned here). The lectures combined with the accompanying text and labs form a masterpiece, and it's a shame the community at large can't take better advantage of it. It's like SICP for systems : that effing good.

The tests, however, are just awful. Those can safely be dumpstered.

8
bor0 8 hours ago 0 replies      
In around 2001 I started reverse-engineering games on the PC before having any programming skills (later moved to programming).

I remember MadWizard's assembly tutorial[0] being very helpful at the time.

[0] http://www.madwizard.org/programming/tutorials/

9
hackermailman 21 hours ago 0 replies      
The bomblab is from CS:APP student labs section if anybody is interested https://news.ycombinator.com/item?id=14522391 specifically here http://csapp.cs.cmu.edu/3e/labs.html
10
ngneer 16 hours ago 1 reply      
Upvote if you grew up on Fravia and tKC
11
sakawa 21 hours ago 0 replies      
OpenSecurityTraining[1] videos are also a golden resource for beginning reverse engineers

[1] http://opensecuritytraining.info/Training.html

12
ngneer 1 day ago 1 reply      
Evan's debugger is nice for Olly fans
13
kclay 21 hours ago 0 replies      
wow times have changed from using softice and ollydbg. When I used to RE for fun it was sad seeing how expensive programs could just be rigged by a simple NOP or JNZ/JMP change.

My best challenge was Brazil (3ds render engine). It had all types of checks that would only show up when rendering.. But that was no match.. Good times

14
tyingq 1 day ago 3 replies      
Where RE is reverse engineering, as opposed to say, regular expressions.
15
bwidlar 23 hours ago 2 replies      
Blank page without javascript. Bye.
4
#c0ffee is the color surge.sh
755 points by pavel_lishin  1 day ago   118 comments top 37
1
vmarquet 22 hours ago 1 reply      
I'm surprised no one yet has mentionned the famous stack overflow question: https://stackoverflow.com/questions/8318911/why-does-html-th....

TLDR; For legacy reasons, some words produce valid colors even if they don't respect the standard color formats. For example, "chucknorris" produces red.

2
lol768 23 hours ago 7 replies      
Got to admit I was hoping it'd be a coffee-ish colour before I sorta parsed the colour in my head and realised it was mostly green.

With that said there are some pretty cool ones (e.g. 5afe57 = safest = a green) that do match up. Can't say I can think of many hugely practical uses for this, but it's kinda neat!

3
nailer 23 hours ago 2 replies      
Oh neat:

#F0E71D

is the colour of asafoetida: https://www.google.co.uk/search?q=asafoetida&source=lnms&tbm...

And #C0C0A5 is cocoa.

For fitness studio folks who are into hex (of which there are obviously billions) #F17 (bright pink) would be popular too.

4
atemerev 23 hours ago 2 replies      
#c0fefe, you wanted to say.
5
thebouv 23 hours ago 3 replies      
Since #BADA55 keeps coming up:

http://bada55.io/

6
oxguy3 18 hours ago 1 reply      
SAFEST is a decent green and ACIDIC is a decent red -- probably going to use these instead of #f00 and #0f0 next time I need success/failure color codes for some hastily-made web thing.
7
turkeywelder 23 hours ago 1 reply      
It's missing Badass: #b4da55. Lovely green colour :)
8
narrowtux 1 hour ago 0 replies      
I found it easier to view after I added `border: 10px solid #111;` to the `.flexer` class
9
mrspeaker 23 hours ago 1 reply      
This is great, but I'm not a fan of the "7 looks like a T"... my brain can't make that work. I request an "Ice T" mode that does this:

 Array.from(document.querySelectorAll(".wrap > div")) .filter(n => n.getAttribute("name").includes("t")) .forEach(n => n.parentNode.removeChild(n));

10
madcaptenor 23 hours ago 0 replies      
#B00B00 is the color of blood.
11
pavement 23 hours ago 1 reply      
HN feature request: three character hex code support for topcolor.

Bonus points: named color support for valid CSS colors, such as dodgerblue.

12
forgot-my-pw 16 hours ago 0 replies      
Isn't it just easier to memorize HTML color names? https://en.wikipedia.org/wiki/Web_colors#HTML_color_names
13
jaclaz 20 hours ago 0 replies      
The idea is nice, but (as a suggestion) I would add a drop down to "strict" where you can tick whether to include 0 (zero) and 1 (one) as respectively O and I, which is what everyone would likely read as well as - maybe - 5=S while the 1 as L (as in 1337) and the 7=T are far less intuitive.To give anyone freedom of choice maybe adding a "selectively strict" button with ticks for each leet letter would be ideal (as an example I cannot read the 2 as R as it is used on http://bada55.io/ ).
14
adolph 21 hours ago 0 replies      
The yellow fiesta is similar to the yellow tone of the dishes

https://en.m.wikipedia.org/wiki/Fiesta_(dinnerware)

15
Etheryte 22 hours ago 1 reply      
It makes me both happy and uncomfortable that #dab and #dabbed are valid colors.
16
boozelclark 19 hours ago 0 replies      
I wonder if they intentionally left out FAECE5? A brownish color
17
waynecochran 15 hours ago 0 replies      
You should allow for an alpha-channel then you have two more letters and can do the Java Class file magic number #CAFEBABE.
18
mxfh 23 hours ago 1 reply      
I always paint my computer chassis' front panel in drab #facade.
19
JoshTriplett 23 hours ago 1 reply      
Nice.

One oddity: for some reason, the site's CSS makes text selection highlights invisible. If you select text, the selection looks identical to unselected text, though copy/paste still works.

Also, the color boxes appear to be editable text areas: if you click on one, you can backspace or Ctrl-U and the text of the color vanishes, until you hover/unhover it again and the text gets reset (because of the 1337/LEET translation going on with hover/unhover).

20
piyush_soni 10 hours ago 0 replies      
Now that I know it, I'm going to be forever sad that #c0ffee color is not the same as the color of coffee :(
21
ajacksified 22 hours ago 0 replies      
Nice - I built something similar a few years ago, mostly to mess around with CSS columns (http://thejacklawson.com/csswords/). I only used a regex over the system dictionary, so it doesn't include a lot of what it probably could.
22
merraksh 23 hours ago 1 reply      
There's "tic", "toe", but not "tac". I guess we need a "even less strict" option.
23
oever 21 hours ago 0 replies      

 aspell -d en dump master | aspell -l en expand|grep -e 
'^[abcdefABCDEFlLoOsStT]\{6\}$'

24
19eightyfour 23 hours ago 0 replies      
This is brilliant. I am going to be using these colors exclusively from now on in all my designs.
25
jellyd0ts 23 hours ago 0 replies      
Very cool! I found #c0ffee myself a while ago and it made me quite happy to immediately know which color the title meant.

I didn't think of the other possibilities(like #bada55), but instead opted to shorten it to 3 letter codes. The one I like most is #b00, a nice red.

26
zem 16 hours ago 0 replies      
needs a medium-strict mode with a-f, 1 as I and 0 as O only. those two digits seem a lot less of a stretch than the rest of the leet spectrum
27
brianzelip 23 hours ago 1 reply      
Love the Roy Ayers!
28
vegbrasil 22 hours ago 1 reply      
Maybe this could be open source? I wish to generate HEX colors using my non-english language.
29
Scirra_Tom 18 hours ago 0 replies      
The only time purple testes are not a cause for concern perhaps
30
ubertaco 21 hours ago 0 replies      
Seems appropriate that #D15C05 (DISCOS) is an ugly, 70s orange-brown.
31
asmosoinio 23 hours ago 0 replies      
5AFE57 = safest is cool.
32
ynniv 22 hours ago 1 reply      
My topbar color is #badfoo, which is a somewhat sickly green.
33
mikeycgto 22 hours ago 0 replies      
My fav is #baebae
34
pklausler 22 hours ago 0 replies      
#efface makes a nice background color.
35
_eric 23 hours ago 1 reply      
> ctrl + f

> BADA55

> not found

> closes tab

36
kyledrake 23 hours ago 1 reply      
This isn't related to the post content (which was great), but I noticed that HN lists the domain as "surge.sh", which doesn't make a lot of sense because surge.sh is just the web hosting service this site is on.

With the web, the convention right now is to treat the subdomain as a different security origin (with the exception of www). So the link should show c0ffee.surge.sh, not surge.sh.

If this is a manual setting, it probably also needs to be set for neocities.org. I noticed that wordpress.com domains were being subdomained properly.

It really shouldn't be manual, it should just always show the correct origin domain.

37
zyxzevn 22 hours ago 0 replies      
What is your favorite color, IDIOTS?
5
Hackers Are Hijacking Phone Numbers and Breaking into Email, Bank Accounts forbes.com
630 points by CarolineW  1 day ago   344 comments top 65
1
TaylorSwift 1 day ago 5 replies      
This happened to me.

1. I believe it began with the hacker getting DOB/SSN.2. Called wireless provider, and hacker forward all calls and texts to a burn phone. Eventually, the hacker ported my wireless phone to another provider/number (not sure which), and the phone registered to my provider did not work anymore. The landline phone was also forwarding calls to another number.*3. Hacker gained access to email (as that email was also within the telco's site). At the beginning, the hacker did not reset the password. After I changed the email's password, hacker was still gaining access to our emails and he/she eventually reset the email blocking my access. (reason was all the text and calls was forwarding to his/her burn phone so he/she can reset the pass anytime)5. Requested 2FA from bank.6. Gained access to bank account.

This was over a course of 3 months. It was a nightmare to resolve and paranoia still remained. The hacker later on went opening several bank accounts. Fortunately, this was discovered early. The entire situation was communicated to the FBI, local police, and bank institutions, but I do not think anyone cared.

*I saw two numbers that were being used within my wireless account site to forward the calls.

2
49531 1 day ago 5 replies      
A few months ago I took 3 of my 4 kids to a birthday party at a minigolf course. I played some holes with my youngest I had taken with me, and then left the two older ones at the birthday party with the understanding that their mother would pick them up (as we had discussed earlier)

After leaving the party with my youngest, I went to the grocery store, and then on home. When I got home my wife was gone, which I expected since she was picking up the older kids from the party.

Throughout this afternoon I had not been checking my phone in an attempt to be a bit less connected on the weekends.

About half an hour later my wife comes home totally freaked out and frazzled.

Apparently after I had left, someone went into a T-Mobile store and somehow convinced the associate that my number was theirs. I had received a couple of texts from T-Mobile with a pin number where the store associate had attempted to do something, but I was not aware of them until later.

Once this person had my number, they called my bank, reset my online password, and transferred all of our money from various accounts into one of my checking accounts. The bank then put a hold on everything (thank god).

My wife happened to have been paying bills online while this was happening, and saw it all go down. Her first thought was to call me, then when I didn't answer to call the mom throwing the birthday party.

Birthday party mom told my wife I had left, so my wife assumed that myself and our 3 year old were being mugged or something. The police were involved and she spent a good amount of time freaking out trying to find me.

All in all I had a pretty good afternoon :P

For real tho, it was a freaking mess. Took weeks to get our accounts safe, and we try to avoid using phone numbers for 2fa now.

3
pascalxus 1 day ago 4 replies      
So, I've read the article a couple of times, It's pretty long. For those of you looking to get the most bang for your buck, I think the following advice is Golden:

1. Do NOT secure your sensitive accounts (facebook, primary email, bank accounts, twitter, etc) with your telco phone #. Telco Phone number is NOT secure!

"Create a brand new Gmail email account. Do not connect it to any of your existing email accounts. (When signing up for a new Gmail, you dont need to enter a phone number or current email, although there are fields for you to do so. Leave them blank.) Once youve created the new island-unto-itself email address, create a new Google Voice number." Use this Google Voice # to secure your primary accounts, and don't have your telco # listed in any of those accounts.

But, make sure your New Gmail account is super secure, with a security key, as mentioned in the article.

2. Check the password recovery methods for all your sensitive accounts and make sure the answers aren't duplicated from any other site. Actually, it's best to remove them, if you can.

If any security experts want to chime in, please do.

4
ghouse 1 day ago 0 replies      
While SMS for 2fa is _a_ problem, it's not _this_ problem. Using SMS for _account recovery_ circumvents 2fa and circumvents strong passwords.
5
yladiz 1 day ago 5 replies      
Can anyone recommend a US based bank (or a bank that accepts US customers) that 1) has either a 2FA token for phone e.g. with Google Authenticator, a hardware token, or some kind of other token based factor; and 2) has strong security when calling? I generally don't need a physical presence.

My current two banks don't have direct 2FA enabled. As far as I remember, the questions available to one of my banks (credit union) are simple enough that you could probably find out by doing a public info search somewhere, and the other bank (Chase) has SMS 2fa, but outside of that it's just public database questions (I know this because I had my card number stolen recently, I currently don't have access to my phone as I'm out of the country, and they asked me a few different questions from a public database, like if I had ever lived at ABC Dr., do you know this person, and what is the full name, etc.). I'd much rather be able to give the banks some kind of information that they are required to verify before they can access my account, like a verbal passphrase, but I don't think that's possible (as in, I wouldn't be able to access my account over the phone without the passphrase).

6
devuo 1 day ago 3 replies      
Last year when I upgraded my phone I was amused but mostly horrified by how easily one could get a SIM card for my own phone number with less than a modicum of information on me.

As I required to upgrade my Micro SIM to a Nano SIM, I went to one of my provider's shops and asked for a Nano SIM for phone number X. I was then asked to verbally confirm my name and address and that's it. No ID card confirmation, no nothing. "Here you go sir, your new SIM card will be active within a few minutes. Can I help you with anything else?". What. the.

7
noobermin 1 day ago 6 replies      
NIST has already been discouraging the use of SMS for 2fa[0], but that apparently won't stop the subset of incompetent IPSec consultants who still recomment SMS based 2fa.

[0] www.slate.com/blogs/future_tense/2016/07/26/nist_proposes_moving_away_from_sms_based_two_factor_authentication.html

8
Keverw 1 day ago 2 replies      
It's insane how much easier it is to transfer a phone number than a domain name.

I also find it odd Facebook, and other sites will let you signup solely with a phone number. There's prepaid cell phone providers that recycle phone numbers, etc. Just seems so stupid to rely on a phone number for authentication alone, but two factor I'm okay with since you still need to know the password. Twitter has a developer product where you can be texted a code to login using only a phone number, which to me just seems wrong to do.

It'd be nice if trying to port a number, change important info, etc if they had to actually call you or text you first to confirm. But one of the problems is people will lose their phones, and need a new sim or phone... That I think I'd have a requirement to actually visit the store - but that doesn't work to well with prepaid phone providers without physical stores selling via other stores like Walmart, Target, etc. Maybe in that case without nearby stores, partner with your retailers to verify ID or fax a ID in.

9
dheera 1 day ago 2 replies      
I wish we could kill phone numbers once and for all. It's insecure, device-dependent, carrier-dependent, country-dependent, subject to snooping and censorship, and all of these are recipes for disaster as an authentication scheme, especially in the event that a device gets stolen. Phone calls and text messages should emphatically NEVER be used to verify anything.

Conversation with one of my banks the other day:

Them: Can we please verify a code sent to your phone number?

Me: Umm, sure, although that won't verify anything. Use something else to verify that it's me.

Them: Can you please verify your phone number?

Me: Umm, I don't know what phone number I used with you? Try XXX-XXX-XXXX, XXX-XXX-XXXX, XXX-XXX-XXXX, XXX-XXX-XXXX, XXX-XXX-XXXX, XXX-XXX-XXXX, and XXX-XXX-XXXX? They all belong to me depending on where I am.

Them: Can we use XXX-XXX-XXXX? Do you have this phone with you right now so we can we send a text message with a verification code?

Me: Send your insecure SMS to any of my numbers. They all go to my e-mail inbox. [I don't need to have my "phone" with me -- my "phones" are virtual.]

10
flurdy 1 day ago 4 replies      
So 2FA reset via SMS is bad, which I agree but what are the alternatives to prevent a meltdown when your 2FA device dies?

I have had two phones die on me that was my 2FA device, plus OS upgrades, so I have gone through resetting 10-20 2FA accounts a few times. Though with upgrades usually I foresaw that and downgraded my 2FA before hand.

All I wish for was that resetting 2FA would be a very very slow step by step process and spammingly broadcasted to all emails, sms, postal etc associated with the account. But I know for cost cutting customer services departments that wont happen.

11
godzillabrennus 1 day ago 3 replies      
I owned a hosted PBX company from 2007-2011 and was amazed with how antiquated the port request system truly is.

The problem is that the phone company owns your phone number and you just get access as part of a service. Unlike a domain name where you own it.

If we change the law we'd bring more accountability.

12
awinter-py 1 day ago 6 replies      
Not answering security questions truthfully is tricky.

Yes, it's a problem that security questions turn hacking into a simple public records search.

BUT most terms of service have a line like 'you warrant that you've been entirely truthful with us' or something. If you give the wrong security question to your bank, they potentially have grounds to freeze your money or screw you later.

Why isn't the answer 'consumers have the power -- punish services that don't support FIDO by not using them'.

At best this article is saying 'don't connect anything to anything'.

13
willow9886 1 day ago 1 reply      
This recently happened to a friend of mine. It was devastating. As mentioned, U2F is very scarcely supported today.

The best way he came up with to secure services that insist on using SMS for 2FA (or credential reset) was to register the number of a pre-paid phone for those services.

Inconvenient? YES. But a pre-paid phone number can not be ported by a negligent (or willfully criminal!) operator.

14
fabian2k 1 day ago 8 replies      
What settings exactly do I have to change to get GMail to never unlock my account by SMS alone?

I have enabled proper 2FA on my Google account with U2F, but I haven't disabled everything else yet because I only have one token, and I still need something like TOTP for stuff that uses Google accounts, but doesn't support U2F.

As a closely related remark, I wish U2F would just get popular enough, it's pretty convenient, isn't vulnerable against the kind of attack SMS-based 2FA is, and protects against phishing. But almost nobody outside Google supports it, and OS/Application support is rather incomplete or requires additional setup.

15
maherbeg 22 hours ago 0 replies      
Someone should write a comprehensive guide on how to protect your accounts while preventing yourself from being locked out of said accounts.

Seems like some combination of the following:

* using Google Voice for all account recovery situations that require a phone number

* Calling your cell phone provider to have a note that states do not allow for number porting

* Use hardware 2fa tokens. Have two setup, one as a backup in case you lose one.

* Keep a copy of your recovery codes somewhere accessible

* Probably have a safety deposit box with your backup 2fa token and recovery codes stored.

* Primary email provider should use a hardware token and not have sms recovery

* Use unique passwords everywhere and use a password manager

16
occamrazor 1 day ago 2 replies      
Would this attack be neutralized by a mandatory waiting period of a few weeks for number porting?I recently ported my number to another operator (in a European country), I had to wait for a month and received at least two warning SMS.
17
ww520 1 day ago 1 reply      
5 or 6 years ago, my phone number got ported by someone else without my knowing. My phone suddenly didn't work anymore. I called into AT&T right the way to ask what's going on and they said someone has "took over billing" from my account and AT&T transferred the number over. WTF? I was adamant to get the number back since that's the number I give it out to people. They won't bungle saying it's out of their hand. Finally they said they could place the number into the free pool for re-allocation which would freeze it for 3 months before it could be used again. I was concerned it could be used as a vector against my bank accounts. It was a nightmare.
18
tbrock 1 day ago 3 replies      
Great. Now that we've succeeded in compiling a list of personal sad stories to one up one another, why not not discuss how we could encourage the banks / phone companies to make this situation impossible.

1) Ban SMS as a second factor for high risk targets like banks.

2) Telecom companies should require social security number or uniquely identifying information to provide account access.

3) ???

19
mathrawka 1 day ago 1 reply      
I highly suggest having at least 2 phone numbers, one that is your main number that you use and give out. The others are kept private and never for calls or texts, but only for 2FA.
20
CWuestefeld 1 day ago 1 reply      
A few weeks ago I was vacationing in Big Bend National Park, which is in a remote corner of Texas. When trying to pay for our breakfast, my credit card was declined.

On the phone with them, they said the card had been flagged as being used in fraud because we were off in the middle of nowhere, away from our normal spending patterns. The ONLY way to reactivate the card is for the CC company to SMS text us with a code, which we have to read back to them. The thing is, the very reason they flagged us - that we were way off in the middle of nowhere - also meant that we had no cell phone service, and couldn't receive the SMS. And given the vast size of Big Bend (getting out of the park from the hotel is a 45 minute drive), it was questionable if I'd be able to drive to a location with cell service if I couldn't fill my gas tank first.

The hotel manager overheard me arguing on the payphone with the credit card company, and he drew me a map of some pockets of cell service within the park, so in the end I was able to get it taken care of.

One ironic part of this was that the card is in my wife's name. When they wouldn't listen to her, she gave them verbal authorization to talk to me in her stead. They were willing to believe her identity for this, but not for the re-activation of the card, which doesn't make sense.

I also asked their CSR why they flagged the card. They said that I should always notify them if I'm going away. I asked them what the criteria is for that, since this was an in-state trip (I live in Austin, and Big Bend is also in Texas). The CSR said that's odd, and he doesn't know why that would happen.

So good for them that they watch for fraud, but the failure mode for their heuristic is the most catastrophic possible. If the very reason they flag me also prevents me from fixing the problem, then it's a rather badly-designed system.

21
drdaeman 1 day ago 2 replies      
2FA (including U2F and whatever else) has one big problem that this article fails to mention. And when 2FA is suggested, this really should be said explicitly.

Users aren't warned enough about the fact that everything fails, and they will have to go through 2FA deactivation/account recovery process sooner or later. They must be really reminded to DO BACK UP the recovery code(s). With "back up" as in "keep not just somewhere, but where you can actually find it, when you'll need it". (But not in your password manager)

This is true for SMS 2FA as well, but completely losing the number (as long as one's a paying customer) must be significantly less common than losing a device.

22
kraig911 1 day ago 1 reply      
Security while we all say is super important will never be important until people doing the customer service actually care. When my identity was stolen 20 years ago it was a nightmare involving writing letters to a postbox and getting form letters in return... doing to the police, the banks, and the utilities and being treated like an idiot because I filled out a rental application that someone used to get credit cards is a nightmare that still follows me to this day. It's as if all forms of customer service needs to go through a third party.
23
santzeshn 1 day ago 0 replies      
A few months back I lost my phone, so I went to my operator with passport to get new sim with my old number (in Thailand) . She said the sim isn't actually in my name but my ex-girlfriend's, and I told I remember I took the sim with her id as I didn't carry my passport with me, so I guess there's nothing I can do.

She just replied well we could change the sim to your name, didn't even check with the original owner and 5 minutes later I was on my way with new sim.

24
dhruvrrp 1 day ago 0 replies      
A couple of years ago i got a new phone which used mini sim instead of the micro sim that my older phone used. So i went to an AT&T store to get it and the rep asks for my name and my phone number and 5 minutes later comes back with a new sim saying it'll activate my noon the next day.

There was no authentication at all. Literally anyone could have walked in gave my name and phone no and would have gained access to my phone. I stopped using my phone for 2FA since then.

25
exabrial 1 day ago 0 replies      
Companies are calling it "two factor authentication", which it is not. Please, hn, don't promote sms 'authentication' at your jobs. TOTP is easy to implement and not never difficult for users to understand.
26
EZ-E 1 day ago 2 replies      
This kind of attacks could lead to total disasters in China where the standard is to login and register solely on a phone number using a confirmation text.

In China your phone number is pretty much as valuable as all your password combined, all services are solely linked to it.

Even though phone companies ask for id before issuing a SIM card, I'm pretty sure a tiny bribe is enough to get past most store clerks

27
ziikutv 1 day ago 0 replies      
What's funny is... my Bank does not allow me to use any special characters and for the investor accounts numerical only. They do not have 2FA either.

CIBC Canada

Addendum also several of my purchases were flagged as hacked purchases by them and I had to call them three times so far this year. All purchases from same Amazon account, same IP too. So I do not think they have a good services team.

28
cloudkj 1 day ago 0 replies      
Does this hack work on Google accounts? I just tried the "forgot password" feature there and as far as I can tell there's no way to actually complete a password reset with only a compromised phone number.
29
sr2 21 hours ago 0 replies      
Seems pretty silly putting any form of security apparatus into a technology which could possibly have been engineered from the ground up to be SIGINT-enabled. It's as if GSM was deliberately designed by the intelligence community to be available for eavesdropping. They build the protocol with just enough good security that Johhny can't intercept his wife's calls to check for cheating, but with enough bad security that intelligence services (and sophisticated criminals) can play Mallory[0]

[0]: https://en.wikipedia.org/wiki/Alice_and_Bob#Cast_of_characte...

30
konceptz 1 day ago 0 replies      
Take a modified attackers point of view.

Could you convince a cell phone store rep that you are who you say you are without your drivers license?

Or, for a million bucks, could you make a cell phone store rep think you were someone else?

The answer is why SMS 2fa isn't such a great idea. Because your security checkpoint is owned by a (underpaid) store representative.

31
chrisper 1 day ago 2 replies      
The issue I have with 2FA without sms is that I need to also take care of recovery codes. Basically, it's like erasing all the benefits of going digital, since now I have to store (and take care of) paper copies of recovery codes.

If I use a 2FA app like the Google one and lose my phone, I need to have the codes ready. If I were to use my phone number, I kind of don't need that since I just get a new sim and a new phone. But at the same time that is not safe now.

So what is the solution here? I liked the idea of something like DUO but not enough places use it.

32
zkms 1 day ago 0 replies      
Years ago, when SMS 2FA first became a thing, I remember people familiar with telecom stuff pointing out SS7 vulnerabilities and porting/SIM takeover issues. People shouted them down and claimed that they were being too paranoid and exaggerating the risk, or that most people aren't attractive-enough targets for someone to dedicate so much effort for hacking their accounts (and that SMS 2FA was thus good enough for most people).
33
Osiris 18 hours ago 1 reply      
For 2FA I like how Microsoft does it. You have an app on your phone. When they need to authorize you, they push to the all and it automatically pops up with approve and decline buttons. You verify the code is the same on the phone and screen and hit approve. It's an easier workflow than having to open Google authenticator, find the code, and enter it.
34
e79 1 day ago 1 reply      
You should also make sure providers like Google don't fall back to less secure account recovery methods. I blogged about this here, after I realized that I was still vulnerable even while using real 2FA:

https://ericrafaloff.com/google-account-security-and-number-...

35
theoracle101 1 day ago 0 replies      
"If you follow several of the steps I outline in this story (unless you go with Google Voice), youll end up with at least three email addresses: your current primary one, one just for your mobile carrier, and one that you use for other sensitive accounts such as online banking or Facebook or Dropbox."

Why not just have all sites that require SMS 2FA (there are a lot, including tele co.s) be directed to a personal google voice number? And also remove the any SMS 2FA from this google and your personal? Wouldn't that solve the issue they are suggesting? Why do you need a third account?

36
SkyMarshal 17 hours ago 0 replies      
Worth reposting Kraken's mobile phone security advisory:

http://blog.kraken.com/post/153209105847/security-advisory-m...

37
z29LiTp5qUC30n 1 day ago 1 reply      
I am surprised no one here mentioned mooltipasshttps://www.themooltipass.com/
38
seanieb 1 day ago 0 replies      
Has anyone tried suing a Telco that's given away access to their phone account?
39
bit_logic 22 hours ago 1 reply      
It seems a simple solution would be for the phone company to send a confirmation SMS or automated voice call to confirm number porting or any other major action. Is there a reason they don't do this? It seems like a good balance between convenience and security.
40
leke 1 day ago 0 replies      
Articles like this ramp up my paranoia, especially since I got a phone call from the UK three days ago. Nobody on the other end. Hung up after saying hello three times. Never heard back since. It has me worried, especially since I just came back from my holidays (not in the UK).
41
legohead 1 day ago 2 replies      
I read a blog where someone got hacked through a simcard clone, and they went into the details of how easy it was to do. This prompted me to enable 2fa on everything I could, but the funny thing is, a lot of the backup options for 2fa is -- you guessed it -- your cell phone number. Some of them don't even allow you not to use your cell phone as a backup. I think Github and Slack are like this, but I may be wrong, it has been a while since I turned them on.
42
leighmon 21 hours ago 0 replies      
Take a look at the article by Cody Brown regarding his coinbase account being drained of ETH and BTC due to the same fundamental problem: way too easy to steal someone's phone number.
43
ganwar 1 day ago 0 replies      
This sort of attacks have been happening for over 5 months in crypto.

Kraken published a highly useful blog post on it. Do give it a read.http://blog.kraken.com/post/153209105847/security-advisory-m...

44
buyx 1 day ago 0 replies      
These attacks have been going on for at least a decade in South Africa. The fact that it's still going on, and if the coverage is to be believed, spreading globally, is a pretty shocking indictment of the industry.

I wonder what other scams are being incubated in lesser-known parts of the world, that are waiting to be unleashed.

45
itslennysfault 1 day ago 1 reply      
I'm SHOCKED this wasn't a thing earlier. Spoofing a phone number is insanely easy. When I was in High School we figured out how to do it and used to prank call people from other peoples numbers. Eventually, we realized that if you call someone's cell from their own number it takes you directly into the voicemail admin menu. Fun times.
46
pseud0r 1 day ago 1 reply      
Where I live you need a copy of your passport to port a number, in addition the new sim can only be sent to your government registered address, I think that would be quite hard to game.

Even so, hackers can still use SS7 to hijack phone numbers.

47
ossguy 20 hours ago 0 replies      
I've noticed a number of people using https://jmp.chat/ to get a second number for 2FA. It supports most of the short codes companies use for 2FA, but it doesn't require you have a Google account (or even an existing phone number).
48
TimMurnaghan 1 day ago 0 replies      
Too many Forbes articles. They're months behind on this story and have an aggressive anti-adblock so I'd rather not see stories from them.
49
addcn 1 day ago 1 reply      
Wouldn't the easiest solution be to use a landline and use the call options for 2f? Physical access to my home is root access
50
galfarragem 1 day ago 0 replies      
Resuming: what's the simplest solution to at least reduce risk? Is it to get a second phone number just for banking?
51
avenoir 1 day ago 0 replies      
What is a good way to make these attacks more difficult? Would something like Yubikey work if it had more adoption?
52
exratione 1 day ago 0 replies      
Many phone companies will allow you to (a) add an annotation to your account to declare the number you are using should never be ported to another company, and (b) add a password to the account that you will have to provide to customer service representatives when making changes. This helps to minimize the chance that an attacker can use social engineering to redirect your number to a system under his or her control. If these are not options for your phone company, find a better phone company.

Even given that, since it relies upon human choice and behavior, and does nothing versus attackers with assets within the phone company, it seems a bad idea to have 2FA via SMS.

53
theprop 1 day ago 0 replies      
Wow! What's the easiest way to stop this kind of attack? Stop all two-factor authentication?
54
tracked24x7 1 day ago 0 replies      
"Locksmiths Are Breaking into Bank Safes"
55
sna1l 1 day ago 1 reply      
Does anyone know if Project Fi provides any extra layers of security? I haven't seen anything
56
microwavecamera 1 day ago 0 replies      
With helpful picture of a "hacker" so you can recognize one.
57
simooooo 1 day ago 2 replies      
This has been the vector for Twitter hacks for many years.

Get the 2nd factor

58
adventured 1 day ago 0 replies      
Anyone here happen to know how hard it is to steal a Twilio number as compared to a number issued by eg T-Mobile or Verizon? Is the only way to do so, by accessing the Twilio account that controls the number (whether directly or by API)?
59
rxdemon 1 day ago 0 replies      
Old article ?
60
rxdemon 1 day ago 0 replies      
isn't it old article ?
61
mtgx 1 day ago 1 reply      
Remember this the next time you may tend to agree with governments' push for backdoors. If they get their way even Google Authenticator won't be safe, just as SMS isn't anymore for 2FA, all because the surveillance agencies preferred to keep the SS7 vulnerability and others like it so they can exploit it (outside of the "rule of law", as otherwise they wouldn't need it).
62
KGIII 1 day ago 0 replies      
Test
63
dustinmoris 1 day ago 1 reply      
64
lerie 1 day ago 4 replies      
65
droithomme 1 day ago 4 replies      
Two factor authentication is nothing more than a massive vulnerability. We've seen people somehow change our listed contact numbers through unknown exploits, then hijack ownership of properties using the new number to prove they are us. This wouldn't be possible if not for 2nd factor authorization schemes.
6
Be Careful with UUID or GUID as Primary Keys tomharrisonjr.com
580 points by bkudria  3 days ago   290 comments top 54
1
bdarnell 3 days ago 9 replies      
One of the post's points is that UUIDs will scatter your writes across the database, and that for this reason you want a (more or less) sequential key as your primary key. This crucially depends on both your database technology and your query patterns.

In a single-node database or even a manually-sharded one, this post's advice is good (For Friendfeed, we used a variation of the "Integers Internal, UUIDs External" strategy on sharded mysql: https://backchannel.org/blog/friendfeed-schemaless-mysql).

But in a distributed database like CockroachDB (Disclosure: I'm the co-founder and CTO of Cockroach Labs) or Google Cloud Spanner, it's usually better to get the random scattering of a UUID primary key, because that spreads the workload across all the nodes in the cluster. Sometimes query patterns benefit enough from an ordered PK to overcome this advantage, but usually it's better to use randomly-distributed PKs by default.

For CockroachDB, my general recommendation for schema design would be to use UUIDs as the primary keys of tables that make up the top level of an interleaved table hierarchy, and SERIAL keys for tables that are interleaved into another. (Google's recommendations for Spanner are similar: https://cloud.google.com/spanner/docs/schema-design#choosing...)

2
platz 3 days ago 3 replies      
> secondary primary key

This is called a "candidate key" in existing literature. much has been written about such things.

Both UUID's and auto ID's are "surrogate keys" because they are arbitrary with respect to the data.

lastly, "natural keys" are combinations of columns that consist of the business data.

3
problems 3 days ago 2 replies      
> Botnets will just keep guessing until they find one.

Why does your security rely on primary key obscurity? This seems like you're doing something horribly wrong, put some authentication on that or something.

And no, no they won't. Hitting a collision is very hard if you're using cryptographic strength random UUIDs, you wouldn't even be able to bruteforce 64 bits over the internet in a reasonable timeframe.

Go ahead, try the math on that, the only reason small keys are vulnerable to local attack is because you can perform an enormous number of attempts per second, often in thousands of millions of attempts per second and they can keep at it for as long as they want. The database server won't let you query anywhere near that fast. You will never get anything like that for network based attacks as you're limited by bandwidth, latency and of course, the other side who will notice if you even try to do this for any significant period of time and likely block your attempts or limit them greatly.

4
Pxtl 3 days ago 2 replies      
This is why I'm starting to loathe SQL. The theory is great, but when the theory meets the practice and everything falls apart, the perfect kernel of relational beauty turns into a trash fire and I just want to get my freaking graph of objects out of the database. If I use numbers for keys, I deal with disaster when I try to merge from disparate sources. If I use guids as keys, I get terrible performance. Or I can just use a goddamned document store of Json or XML and have related objects get stored right next to their parents and tell the beautiful mathematics of relational algebra to shove it.

I'm tired of hearing "you don't have to say how to get the data, you have to tell the database what you want and it will get that in the most efficient manner" and then deal with an encyclopedia of byzantine rules to get it to do the aforementioned "efficient manner" with anything approaching decent performance. I can see the art, but the practicality mars it beyond recognition. It's like Venus de Milo sculpted out of duct-tape and bubble gum.

Sorry for the rant, I'm just getting frustrated with performance problems in small data sets. I've taken the courses, I've read Date and Darwen, and I'm just starting to get terribly disillusioned.

5
evadne 3 days ago 1 reply      
I recall reading something about this in the PostgreSQL mailing list, message written in 2016 but may still be relevant

https://www.postgresql.org/message-id/20151222124018.bee10b6...

There's no substance to these claims. Chasing the links around we finallyfind this article:http://www.sqlskills.com/blogs/kimberly/guids-as-primary-key...which makes the reasonable argument that random primary keys can causeperformance robbing fragmentation on clustered indexes.

But Postgres doesn't _have_ clustered indexes, so that article doesn'tapply at all. The other authors appear to have missed this importantpoint.

One could make the argument that the index itself becomming fragmentedcould cause some performance degredation, but I've yet to see anyconvincing evidence that index fragmentation produces any measurableperformance issues (my own experiments have been inconclusive).

6
sp332 3 days ago 2 replies      
"Things got really bad in one company where they had decided to use Latin-1 character set. When we converted to UTF-8 several of the compound-key indexes were not big enough to contain the larger strings."

This shouldn't be right. UTF-8 encoding uses the same 8 bits for each valid UUID character that Latin-1 would. Unless someone put invalid characters in the UUID field, I would guess that the new encoding was actually UTF-16 or something.

7
foolfoolz 3 days ago 7 replies      
sounds like the author thinks "uuids are a pain" and wants the benefits of them but with a smaller representation. but doesn't provide any reasonings why uuids are a pain other than not being able to remember them or say them out loud. these are not things anyone does with primary keys!

you'll never say this out loud : 7383929. you may be able to remember it, maybe. in a uuid you'll match the last few and first few letters just as fast in your head

uuids are fine. sorting is an issue but at scale (the entire point of this article) how often do you need to sort your entire space of objects by primary key? you'll have another column to sort on

hiding primary keys and having 2 keys seems like a great way to make all queries and debugging 2x as complicated

8
drawkbox 3 days ago 1 reply      
Maintaining UUIDs is much easier than maintaining id/int lookups that may be autonumbered (mssql, mysql, pg) or sequenced (oracle), even if using them internally and UUIDs externally. This especially comes into play when syncing across dev, staging and production environments and when clustering and servicing out parts of your app.

The moment any db starts to grow to these areas, UUIDs lead to far less issues than incrementing ids everytime.

Most RDBMS now have optimizations and native types (uniqueid) for UUIDs/GUIDs and this is really a moot point at this point, most UUIDs are no longer strings in DBs unless legacy from the time before native UUID types.

UUIDs are right for most projects but not all and as typical in any system, the environment and needs of your project will dictate whether it makes sense to use them.

UUIDs eliminating the round trip and negating dealing with autonumbering/sequencing is a massive benefit, the only real con of UUIDs is the extra 8 bytes but make up for it in less need to lookup during runtime when creating new or associating data with them.

9
MithrilTuxedo 3 days ago 0 replies      
Can confirm: using MySQL and for reasons... everything in the DB gets a primary key set by taking a random UUID, stripping the dashes, and then doing an `UNHEX(id)` in the stored procedures. Those IDs are both the primary keys and the keys used in the service's APIs.

One of our Ops guys did an experiment where they put a uniqueness constraint on the ID column and added an auto-incrementing primary key column that's never exposed to the code driving the thing. It apparently sped up our DB performance by orders of magnitude.

It also turns out that MySQL would perform faster just by leaving those values as strings instead of converting them to binary values. We've got some outside pressure to use Oracle instead of MySQL, and apparently it performs much better than MySQL with our current schema so we apparently aren't going to do anything to improve the MySQL performance or change any of this behaviour.

10
sudhirj 3 days ago 0 replies      
Shameless plug: Anyone bothered about the wasted space in UUID string representation (and using Ruby) can check out https://github.com/sudhirj/shortuuid - it re-encodes your UUID into any alphabet you choose, with a Base62 default (I find that to be a sweet spot that gives both URL safety and efficiency).

Let me know if you want ports in any other languages - the the algorithm is to really just treat the UUID as a hexadecimal number (that's actually what it is) and re-encode it into any other alphabet of choice.

That said, always use native UUID types in datastores - they'll convert to bytes / numbers internally and will always be the most efficient. For other situations, remember that they're just numbers, so you can write them in binary, ternary, octal, decimal, hexadecimal, vowels, baseXX or really any other alphabet you want. The bigger your alphabet (as long encoding remains efficient, like ASCII under UTF-8), the better your gains will be.

11
makmanalp 3 days ago 2 replies      
Yep, glad to see this posted. In the python world, this is why we have UUID.int (https://docs.python.org/3/library/uuid.html#uuid.UUID.int), though the native postgres UUID type with uuid-ossp works well too if you need them auto-generated in the DB rather than in application code.
12
zimbatm 3 days ago 0 replies      
Little rant on UUIDs:

Notice how the author assumes UUID v4[1] in the conversation. There are very few reasons to use the other versions but we are still paying for their price in code complexity all the time.

Look at this UUID parsing code: https://github.com/sporkmonger/uuidtools/blob/master/lib/uui...

What it really should be is `[uuid_string.gsub('-', '')].pack('H*')` (for non-rubyists: remove the dashes, decode the hex back to binary).

Their representation is also not that good since hex encoding is not very compact.

I guess what I'm trying to say is that UUIDs are often used as a default unique identifiers but they are actually not that good.

[1]: https://en.wikipedia.org/wiki/Universally_unique_identifier#...

13
rikkus 3 days ago 0 replies      
Lots of talk about performance, but no numbers cited. I did my own benchmarks before using sequential ("COMB") GUIDs as 'PRIMARY KEY' (yes, they're surrogate keys) and found no material performance difference. I didn't keep the results, but someone else has made their numbers public here: https://blogs.msdn.microsoft.com/sqlserverfaq/2010/05/27/gui...
14
dimgl 3 days ago 9 replies      
This article is so poorly written it's hard to take it serious. The entire paragraph about the size of a UUID takes reading it three or four times before you can actually understand what the author means...

In what context would a primary key change, even when sharding? In my entire career I have yet to see it. Also any sane person would never sort random values. If you need sorting in your table, provide some kind of indexed timestamp.

15
wvh 3 days ago 0 replies      
Postgresql has a UUID type which should store them as a 16-byte number. If you use time-based UUIDs for instance based on the unix time stamp in hex, like CouchDB then you also get sortable primary keys, which conceptually might or might not be useful to your application, but it probably speeds up indexes. I've done exactly this for two different projects, and it works well.

On top of that you get IDs that are impractical to guess, which while wouldn't replace other security measures, would still give you some collision resistance and probably avoid some bugs because of the unlikeliness of accidentally picking the same key for two different entities.

I'm sure there are pathological cases for UUIDs as primary keys in certain scenarios, like perhaps a very high number of small records, but I've not come across them myself. You obviously have to know your own data and database if you have some very specific requirements.

16
vkrm 3 days ago 0 replies      
Datomic [0] uses SQUUIDs [1] (Semi sequential UUIDs) to work around this:

 Many UUID generators produce data that is particularly difficult to index, which can cause performance issues creating indexes. To address this, Datomic includes a semi-sequential UUID generator, Peer.squuid. Squuids are valid UUIDs, but unlike purely random UUIDs, they include both a random component and a time component.
[0] http://www.datomic.com/

[1] http://docs.datomic.com/identity.html#sec-6

edit: formatting

17
caleblloyd 3 days ago 0 replies      
I work on an Entity Framework Core Implementation for MySQL and we recently added sequential GUID generation for primary keys that are of type Guid. The first 8 bytes of the GUID are the current UTC timestamp in ticks and the last 8 bytes are cryptographically random.

One interesting thing we ran into when implementing is that C#'s binary format and string format must be different to be sequential. So we have to detect whether the GUID is stored as a string or binary and put the timestamp in the correct place to ensure it is actually sequential.

Here's the PR for the feature for anyone interested: https://github.com/PomeloFoundation/Pomelo.EntityFrameworkCo...

18
mark242 3 days ago 2 replies      
The reason I don't like the internal-int-external-UUID strategy is that all of your queries now require an extra join. It's no longer "select microblog.* where userid = ?" now it's "select microblog.*,user.id from microblog,user where microblog.userid = user.id and user.uuid = ?".

This may be practical from a storage standpoint but string-based indexes on an SSD are pretty damned efficient.

19
michaelcampbell 3 days ago 2 replies      
> Aside from the 9x cost in size, strings dont sort as fast as numbers because they rely on collation rules.

Why would you sort these to begin with; what ordering of essentially randomness (part of the point) makes sense?

20
mirekrusin 3 days ago 1 reply      
"UUIDs do not reveal information about your data" - this is false statement; in sensitive environments you need to be aware that some UUID versions can leak MAC addresses, timestamps, hashes of your data etc. - sometimes just enough to abuse this information.
21
emodendroket 3 days ago 1 reply      
Why should it matter if you can guess IDs? Presumably records are locked in such a way that simply knowing a URL doesn't allow you to bypass security.
22
harel 3 days ago 0 replies      
PostgreSql has a dedicated UUID column type. Those are fast and the storage difference is insignificant.
23
ivan_gammel 3 days ago 2 replies      
The strategy "internal int-external uuid" can be simplified if you use encryption and hypermedia API. It's possible to encrypt int and some additional information and format it as uuid v4 (random). For external users that know natural keys of some objects it's possible then to discover the rest of objects by navigation via API, where UUIDs are just some pseudo-random parts of the URIs.
24
d0m 3 days ago 1 reply      
One huge benefit of UUID is how you can safely create them while being offline, and then sync them at a later stage without conflicts.
25
eranation 3 days ago 0 replies      
Excellent post, write ups like this are the reason I keep coming here.

What about the hi/lo algorithm as a middle ground?

https://vladmihalcea.com/2014/06/23/the-hilo-algorithm/

In short, and I hope I don't oversimplify, each "shard" or "cluster" in the database gets a "block" of ids it can then go and assign on their own, the sequential "atomic" increase happens only once per hi "block", lowering the contention.

This gives you nice integers, incremental-ish most of the time.

I like the notion of integers internally and UIID (as integers of course! I would have never saved one as a varchar, I swear! ok, I was a noob... I deserve to be shamed)

Great post all in all!

26
mreftel 3 days ago 2 replies      
"Then add a column populated with a UUID (perhaps as a trigger on insert). Within the scope of the database itself, relationships can be managed using the real PKs and FKs."That would mean doing lookups by UUID, which is /really/ bad for performance. UUIDs are evenly distributed, so index caches are rendered nearly useless.With sequential keys, and access patterns that touch mostly new data, all you need to find the row is likely to already be in RAM, no matter how many rows you have. With UUIDs, you'd end up doing random I/O. Might not sound like that big deal to some, but we got a 3x overall throughput increase in one of our apps by switching from UUIDs to sequential ints.
27
stollercyrus 2 days ago 0 replies      
I found this post super helpful. For anyone doing rails development, I wrote a gem to make this really simple. I'd love feedback.

https://github.com/cyrusstoller/public_primary_key

28
flatline 3 days ago 1 reply      
Another alternative to avoid guessing is to use randomized 64-bit integer keys. You still risk collisions over sharding/replication, but only if you truly have a lot of data. You potentially lose some index performance but it shouldn't be any worse than with guids. If you really need the full size of a guid, just use them for the key. I don't get the rest of his argument for hiding internal surrogate keys.
29
krisdol 3 days ago 0 replies      
In a time-series datastore, you may have to replace a set of invalid/corrupt events within an index. Having IDs that are in some way deterministic from the source data, you are able to replace the invalid documents by ID by simply re-indexing that time period with your patch applied. This is the most simple and least risky solution, with minimal downtime

If the IDs are UUID, then the easiest way to fix the values is to drop the index and re-create it, making all of the other data in the index unavailable as it's being recreated.

The less-easy way with UUIDs is to select just the broken events, create new patched events, delete the old events, and insert the new ones in the right index. But you'd have to branch off of your regular indexing logic to do this, probably writing a separate script. Of course if you make a mistake, you may end up with either duplicate documents or loss of data, compounding the original problem.

So I agree, have IDs that are deterministic (that they can be recreated using some known formula and source data, for example: documenttype_externalid_timestamp).

30
paragarora 3 days ago 0 replies      
This is just opinion and looks like UUID is bad for a particular case author is working on.

We have multiple components over different stacks and id could be generated anywhere in the components. We had to live with either building unique id per table separate infrastructure or UUID. UUID works perfectly and with POSTGreSQL, it's just awesome.

31
njharman 3 days ago 0 replies      
Using UUID for external means you've just forced all the problems with UUIDs on your users.

I'm dealing with that from several vendors atm.

32
dpark 3 days ago 2 replies      
> A naive use of a UUID, which might look like 70E2E8DE-500E-4630-B3CB-166131D35C21, would be to treat as a string, e.g. varchar(36)dont do that!!Oh, pshaw, you say, no one would ever do such a thing.

> Think twicein two cases of very large databases I have inherited at relatively large companies, this was exactly the implementation. Aside from the 9x cost in size, strings dont sort as fast as numbers because they rely on collation rules.

Eh, I've done that before because it made some interaction with Entity Framework easier (don't recall what now). Hasn't really mattered. The space for storing GUIDs has never been a meaningful constraint for anything I've ever worked on (9x is also nuts and assumes that your database uses 4 bytes per character). Sorting UUIDs is also generally uninteresting since they aren't meaningful by themselves. Maybe if you're doing lots of joins you might care about this.

33
manigandham 1 day ago 0 replies      
Use the hi/lo mechanism to generate IDs on the client. You can use a simple transaction to reliable reserve a range of numbers and then easily have incrementing numbers. Use longs and you can reserve a billion IDs per second and never run out.

This solves basically all the problems and we use it in production to number several tables with billions of events per day.

34
masklinn 3 days ago 1 reply      
> Another problem is fragmentationbecause UUIDs are random

UUID-4, UUID-3 and UUID-5 are random (3 and 5 are hashes).

UUID-1 is time-based with the time leading, and you can often control the sequence (14 bits) and nodeid (48 bits) fields to be used as whatever you want to avoid collisions.

35
tsechin 3 days ago 0 replies      
At a previous company, we got burned using UUIDs as MySQL PKs. Turns out MySQL keeps data on disk sorted in PK order, so even a moderate INSERT workload would lead to lots IO and disk thrashing as pages kept needing to be rewritten.

Fun times...

36
einrealist 3 days ago 0 replies      
My advice (and daily practice): If IDs are exposed, expose them as strings. If that ID is a compound key of a database, serialize it into a single string. If the ID is exposed via webservice, use URIs. In a entity provided by a webservice (e.g. a JSON-LD document via HTTP), use URLs or URNs. If possible, provide both and a translation service that translates URNs to URLs. URNs should be used for long term storage, URLs for transient use.

If I follow my advice, the type of an ID is an implementation detail of the persistence layer and/or service endpoint.

37
jondubois 3 days ago 1 reply      
The reason given for not exposing UUIDs publicly (migration) doesn't apply to most NoSQL databases because they let you set the ID yourself so you can just copy each document as-is. Maybe the author was referring to databases which automatically (and forcefully) generate the ID on insertion... Even in this case, isn't there a way to tweak this temporarily just for the migration?
38
iask 2 days ago 1 reply      
I was at a new client the other day and notice that for all their tables in SQL SERVER, they use an IDENTITY column for primary keys, obviously seeded by SQL SERVER. What I found strange is that they allow deletes of records, allowing gaps in the sequence.

Is that normal practice? Their DBA was insisting that its normal.

39
scandox 3 days ago 0 replies      
I use the internal int and external uuid strategy mentioned at the end. It does make for somewhat confusing code for newcomers. I still don't love it.
40
phamilton 3 days ago 0 replies      
I'm surprised the author calls out that knowing the pk before insertion is useful, but doesn't once mention idempotence as a key benefit.

If you are building mobile apps that sync state, UUIDs make your life so much easier. Optimistically perform writes locally, then perform writes remotely and retry on exponential backoff in case of a network error.

41
tehlike 3 days ago 2 replies      
When I was a developer on NHibernate, one of my favorite ID generators was something called HiLo.

Each of the clients reserve a chunk of Lo numbers, and increment the Hi number. Basically, they would pre-allocate a chunk of id ranges, and this allowed good distributed id allocation performance, while somewhat keeping local ordering.

Client generated ids are very useful to do.

42
JTenerife 3 days ago 0 replies      
I don't agree with many points.

1. Store uuids in a uuid field. Why starting the article with such a trivial finding that a text field is not optimal.

2. Use sequential uuids.

3. Several benchmarks have shown that the performace hit is minimal.

4. The only way to communicate with ids is to copy and paste them. Never try to memorize, talk about them or type them.

43
clairity 3 days ago 0 replies      
for ruby on rails, acts_as_having_string_id [0] is a nice gem for not exposing sequential int primary keys:

it's nicer than using UUIDs because the strings are much shorter.

[0]: https://github.com/hult/acts_as_having_string_id

44
wcummings 3 days ago 6 replies      
>The original issue with simple auto-incrementing values is that they are easily guessable as I noted above.

I don't think this is a real problem. If you're relying on your ID's being "unguessable" (and introducing engineering complexity to that end) for security you've already failed.

45
russdpale 2 days ago 0 replies      
This is what hash keys are great for. After getting the hash, convert to a BIGINT. Works great for me. You still get everything you do with UUID, but as a bigint so the numbers are much quicker, and its 8b.
46
sfeng 3 days ago 0 replies      
Using a better encoding than hex for the GUID would fix many of the storage and memory issues he cites: http://eager.io/blog/how-long-does-an-id-need-to-be/
47
scotty79 3 days ago 0 replies      
In my current project, in ms sql server, I have guid PK with unclustered index and clustered index on another field filled with current time stamp on insert.

What do you think about such setup?

48
rickmode 3 days ago 1 reply      
I've yet to see anyone mention storing UUIDs in a BINARY(16) column. Use exactly 128 bits to store 128 bits. We'd still have the random sort problem though.
49
org3432 3 days ago 0 replies      
He missed one of the biggest issues, in most implementations they are slow to generate due to the complexity and requiring a PRNG.
50
brlewis 3 days ago 0 replies      
Shouldn't the title be appended with (2015)?
51
kazinator 3 days ago 0 replies      
> Best of Both: Integers Internal, UUIDs External

Database coder reinvents interned atoms.

52
tuxt 3 days ago 0 replies      
We use unixtime + server number + random as pk.

Works fine.

(10 million new rows everyday)

53
arrty88 3 days ago 1 reply      
How big a deal is this on Postgres?
54
cynoclast 3 days ago 1 reply      
This article sort of assumes you're using a relational database.

Most of the drawbacks discussed don't exist if you're using a key value store.

7
$80k/month App Store Scam medium.com
689 points by amima  3 days ago   190 comments top 26
1
blhack 2 days ago 7 replies      
This is particularly annoying while my beta is "waiting for review" so I can have the privilege of giving it to a few beta testers.

How does apple not expect that annoying developers with their app store process (so much so that things like this exist: https://fastlane.tools/), AND charging them 30% AND apparently not actually reviewing anything about the apps making it into their store isn't going to eventually drive people away from it?

(Why yes, I am cranky over the amount of hoops I had to jump through to get to the point of asking apple for permission to put my beta on my co-founder's iPhone)

2
blunte 2 days ago 5 replies      
#1 - Apple has a quarter of a trillion dollars in cash. You would think they could afford intelligent, reasonable app review teams. Clearly they don't bother, based on the complaints from honest developers and evidence of pure scams like this.

#2 - Average computer/phone users are willfully ignorant. I would say stupid, but that's a judgement call (even though I think it's true). Someone with knowledge can advise them, but they cannot be bothered with all that fuss. They'd rather ignore sound advice and push buttons. After all, look at the who runs the country and the complacence of many of its people.

Have you ever had a friend who was a lawyer? Did you ever get some traffic ticket and think, "Hey, I'll ask Bob if he can help me handle this!"? I'm guilty of this once in a while. But "average users" are guilty of doing this to technical people all the fucking time. And when we advise them of behaviors to change to avoid future incidents, they nod and agree, but then repeat the stupid behavior later.

Sorry for the rant, but perhaps it's time to just start replying to scammed/screwed users with, "Oh wow, that's really unfortunate. I guess you'll have to go buy a new phone/computer." Maybe that will jar them into actually using their brains.

* Edit for wine-related typos.

3
notadoc 2 days ago 9 replies      
How does garbage like this get through the App Store? I thought Apple was notoriously strict on approvals?

Also, do people still use the App Store? I don't think I have casually browsed for apps in 5 years or more.

4
chatmasta 3 days ago 5 replies      
These App Store ads are the Wild West right now. I've seen multiple cases where I search an exact app name, and that app's competitor has the top "spot" due to buying an ad. It's like if you searched for Uber and saw an ad for Lyft above it.

How long will apple allow this? At the very least it should be impossible to bid on trademarked terms, and no ad should ever outrank an exact match result.

5
downandout 2 days ago 4 replies      
There has got to be more to this story. People would refute accidental purchases of $400/mo. Perhaps these guys are using tech support scams etc to drive traffic to this thing, or they're simply using stolen credit card numbers to setup Apple App Store accounts. Perhaps that's why the spelling and layout is so bad...it's possible that they don't intend anybody outside of themselves to actually use it.
6
kennydude 2 days ago 3 replies      
Some keywords need to return help topics instead. If you search "virus scanner", Apple should tell users their device really doesn't need one
7
htormey 2 days ago 0 replies      
wow, I'm pretty pissed off by this. One of my clients is a medical marijuana startup and we have had to jump through so many hoops to stay compliant with Apple's random app store rules. We have been rejected on several occasions and pulled from the app store.

I also had another app that was accepted into the app store then when I pushed an update release I was informed that my logo had to change because it used Apple's camera emoji. I only did this because another popular app did the same thing (down for lunch). In order to stay compliant, I had to change my logo.

I'm fine with said rules existing as in theory they are meant to protect lay customers from junk like this. How on earth did this thing make it through a review process that's so hard on some apps?

I wish Apple would apply it's rules and vetting with more consistency.

8
_pmf_ 2 days ago 3 replies      
One thing of note: the spelling errors are deliberate to let only the most gullible people through to the last step (improving the odds that the person in question will not know how to report this as a scam or initiate a chargeback). The same tactics are used by ads on porn sites[0].

[0] Or so I have heard ... from a friend

9
prodmerc 2 days ago 4 replies      
> Ive also never clicked on a Google Ad.

I've never done it, either. I clearly remember the only few times I clicked on AdSense ads - once by mistake, and was extremely annoyed at the results (it was a sort of list like search results), and 2-3 times to test my own AdSense ads (yeah, against ToS).

Yet AdSense is raking in billions. I've always wondered who actually clicks on the ads :D

10
tyingq 2 days ago 1 reply      
I was under the impression that the approval process for the app store was somewhat rigorous.

How did this app get through that?

11
microcolonel 2 days ago 1 reply      
You know, it's sad that people are eager to pay Apple nearly a thousand dollars for a phone, buy an iCloud subscription to go with it, and maybe buy a MacBook (Pro?); and then content that after all of that money changes hands, Apple still wants to fill 80% of your screen with an advertisement. Then, if it wasn't bad enough, they don't vet the advertised applications for basic legitimacy (meanwhile legitimate apps frequently get caught up in endless nitpicking at submission).

I get why people do it, but it's sad that they do.

12
kuon 2 days ago 3 replies      
This kind of things make me wonder why I am honest and poor (I mean not rich to the millions, I am not actually "poor"). I could do scams like this and be rich by the minute...
13
akcreek 2 days ago 3 replies      
How are chargebacks handled on the App store? I would assume a scam like this will receive a relatively enormous number of chargebacks.
14
tinus_hn 3 days ago 3 replies      
I don't understand why such an obvious scam works; Apple keeps the money for a while so they should be able to cancel the developer account and refund all users.
15
endgame 2 days ago 2 replies      
At what point do you say "no, the app store experiment has failed" and give users control of their own devices?

Never, I guess.

16
lordvon 2 days ago 0 replies      
I get the feeling that companies like Amazon and Apple purposefully try to hide as much as possible/tolerable the fact that you are subscribed to something (specifically, Apple apps and Amazon's Audible). I've spent tens if not hundreds of dollars towards subscriptions I didn't even know I had, and I'm afraid this might account for a shocking amount of revenue, as this article suggests. Microsoft on the other hand seems to let you know when you are going to charged again (I've experienced this with my office license subscription).
17
meric 3 days ago 1 reply      
Looks like many of the keywords you can buy Ads for are underpriced. To advertise for a keyword you need to build can "relevant" to that keyword. It takes time for legitimate app developers to build apps to take advantage of those keywords. Until then, the underpricing of ads is taken advantage of by these "scammers" who build costly non-functional apps and recycle the earnings into buying ads for them.
18
balladeer 2 days ago 0 replies      
And I thought Apple vets the apps (and from what I heard even betas and upgrades/updates too?) before letting it go live on the App Store.

As a long time Android user (and no I wans't happy for most parts; and I wanted to taste the iOS waters both as an user and a mobile dev) who recently moved to an iPhone SE I feel really disappointed.

19
ge96 2 days ago 1 reply      
Haha I thought this was a how to guide initially as a "good entrepreneur" mind you good to me is subjective, or is it personal. Money is money right? I can't ask my clients to pay me so I obvs don't support that.

Nice into the rabbit hole though, should see how bad it gets with VMs.

20
fright 2 days ago 0 replies      
While it's frustrating if taken at face value, Sensor Tower's numbers aren't totally valid. They get the number for a few of my apps really wrong. The download stats are more or less true, but the revenue can be way off.
21
hellofunk 2 days ago 1 reply      
When I read stuff like this I really lose faith in the human race.
22
whyagaindavid 2 days ago 0 replies      
Does nobody from apple read hn? How does one recommend iPhone to NGOs, privacy activists, other vulnerable people?
23
LoSboccacc 2 days ago 1 reply      
yeah app store quality has dropped to google play levels to the point that one of ios last, actual, concrete advantage for non technical users is becoming moot.
24
draw_down 1 day ago 0 replies      
There's no way that a huge portion of the blame for this is not Apple's. Some of the ways they run the App Store were pretty silly starting out, and now just outright ridiculous.

Little distinction between ads and search results? No filtering or approval for ads? Scammy $100/week subscriptions for nothing? Meanwhile you're not allowed to make fun of the presidents elbows or whatever. Come on.

25
kuroguro 2 days ago 0 replies      
Brilliant! Wish I would have thought of that xD
26
timwaagh 2 days ago 0 replies      
finally i can be rich too! too bad i am not an ios dev. these apps are made by people from 'nam. i doubt you could do this in a civilized country without getting sued into the ground though.
8
Inkscape Moves to GitLab inkscape.org
508 points by dabber  1 day ago   200 comments top 11
1
lucideer 1 day ago 12 replies      
I used to use Inkscape constantly on Windows & Linux, and really like it. I found the UI intuitive and it did absolutely everything I asked of it.

Which is why the XQuartz/&c. user experience on macOS really really surprised me. It's absolutely unusable. Inkscape for macOS basically may was well not exist as far as my experience with it goes.

Are there other comparable GTK+ apps that work well under macOS or is this a common story?

2
luord 1 day ago 1 reply      
Every time a project moves to GitLab or GitHub it is great news; I find them much easier to contribute to. It's specially goo news when it's gitlab, it's just an all-around awesome service.
3
benwilber0 1 day ago 4 replies      
> During the decision about which platform would host our git repositories, we discounted staying on Launchpad itself as its git support was very weak compared to other platforms and the project doesn't appear to be actively developed.

How in the heck did Canonical squander such an incredible opportunity to be the de facto standard for Ubuntu/FOSS code hosting by letting Launchpad stale so badly?

They freaking built it into their distribution of apt with PPA shortcuts, etc.

Unbelievable.

4
mintplant 1 day ago 2 replies      
I can't find a link to their GitLab instance/repositories. Where is it?
5
riffic 1 day ago 1 reply      
Self-hosted GitLab, or gitlab.com? Would a link in the article to the repo be too hard?
6
rejschaap 1 day ago 0 replies      
I am very curious how many devs will stop and how many will start contributing because of this move.
7
codebam 1 day ago 0 replies      
I really hope other FOSS projects take the same initiative
8
akerro 1 day ago 0 replies      
Now just please make use of https://hosted.weblate.org/ for translations
9
bburger71 23 hours ago 1 reply      
10
rishidevkota 1 day ago 0 replies      
:)
11
na85 1 day ago 14 replies      
I really want to learn to use inkscape well, but just can't grok the interface. It's a sad symptom shared by many open-source projects.

They seem to want to differentiate themselves as (e.g. "not photoshop" in gimp's case) but seem to equate that with "ignoring good ui/ux design".

9
Automattic is closing its San Francisco office as most employees work remotely qz.com
522 points by nkjoep  1 day ago   291 comments top 24
1
marcuskaz 1 day ago 3 replies      
We didn't switch to allowing remote work but started remote and always been remote. We had an office space at Pier 38 that was closed by the city in 2011[1], so had to scramble to find space. At that time we thought we would expand more in Bay Area and found a good deal that also could support other employees visiting the Bay Area. For example, in 2013 we held our whole company meetup, but have outgrown it. The main US WordCamp used to be held in SF but now as cost goes up we are moving them around last two in Philly, next in Nashville so another use of the space wasn't needed.

We found it easier to grow and expand all over the world and didn't grow as much in the Bay Area as thought. Currently only 20-30 people of our 550+ live in Bay Area

Also as far as space goes, that is just one photo of the downstairs area of the space. You can see more at https://automattic.com/lounge/ and some early shots here https://customspaces.com/photo/uklO4BLxis/

P.S. I'm the guy in the green shirt in the photo, woo hoo!

[1] https://techcrunch.com/2011/09/06/pier-38-shut-down/

2
alaskamiller 1 day ago 9 replies      
Had a party at the WordPress office a few years back and it's a great space. There's a lounge, kitchen, the bathrooms are nice, some room for bikes, and the rest of the space is setup to be multi-use. There's a big stage area and the corners are furnished to be pretty cozy.

Of my past work places--death star cube farms in old silicon valley to tiny rooms in sweltering Berkeley summers to shiny live/work lofts to giant sprawling disneyland like campus to noisy hipster coffee shops--that WordPress office would be up there in terms of a good place to work at.

The real story is the upward trend that if you give an inch, your employees will take a foot. If you offer telecommute, workers will not show up.

I've been freelancing and telecommuting the past five years. I've built my workstyle around chat bubbles, slack channels, video calls, and emails whether 2PM or 2AM.

I've built my lifestyle around that. As in I work around my life. Things just... get done without a direct measure of productivity anymore.

Sitting somewhere from 9 to 5 is like watching TV from the 2000's, ordering Netflix DVDs when we live in the 2010's with streaming Netflix.

And as one disappear, so does another and another. When you look around and realize no one else is there anymore it just becomes a ghost town while the virtual water cooler becomes more and more vibrant.

No ones goes to the office anymore, it's too lonely.

3
Androider 1 day ago 3 replies      
If you ask anyone inside IBM or Yahoo, going from remote to in-office was all about significantly reducing the headcount. The moves also coincided with reducing the number of sites, so many people would have to move far away or resign.

I think the benefits of working remotely are still poorly understood, and long-term the companies that are being built remote-first are going to have a significant engineering advantage over those that bolt remote working on after the fact.

4
ldp01 1 day ago 1 reply      
It sounds like the crux of the issue is connectivity is now fast, reliable, and cheap. Employees don't need to waste time commuting anymore, so they don't.

Now spare a thought for those of us sweating in the digital wasteland that is Australia.

Every so often I have to walk over to my fridge and nudge my 4G modem to improve the signal strength. I have a script running 'round the clock to reset the darn thing if the connection drops completely (this somehow it fixes it). I need the 4G connection because the copper wire to my house is so broken it can no longer support an ADSL signal.

Fibre is apparently coming in like... 2019? It is expected to run at a maximum of 25Mbps.

Needless to say, remote work is not exactly on the cards.

5
mrweasel 1 day ago 5 replies      
If you look at the pictures I can't say I'm surprised. It doesn't look like a nice place to work. Two long desk, concrete floor, it looks very temporary.
6
westoque 1 day ago 4 replies      
As a remote developer myself. I still value having an office.

I think being remote with an office setup is the best you can get. I can go in at any time I want, and still have the nice environment to work from of.

Being remote doesn't necessarily mean no offices.

7
nfriedly 23 hours ago 1 reply      
I feel like I have the best of both worlds. I work remote, at least from my employer's prospective, but I recently leased an office in town.

I now have a quiet, private space to work, and a nice 5-6 minute bicycle commute :D

It costs a little bit (~$300/mo for the space & utilities - yay for small-town-Ohio pricing), but it's totally worth it.

8
syshum 1 day ago 3 replies      
>The goal is to make the companys workforce more nimble

No the goal is to reduce head count with out laying people off. Companies that go from Remote to Non-Remote do it because it is an easy way to reduce head count with out having to Lay people off, it is a methodology to force people to look for work elsewhere.

People that can not relocate or have built their life around working from home can not or will not make the transition back to working in an office easily. As such they will seek out employment that better fits their needs which is ultimately these companies goal because they want to avoid that "XX Company is laying off X,XXX people in the next quarter" headlines

9
CapnCrunchie 20 hours ago 0 replies      
Working remotely has been a great experience for me. My wife and I started traveling around the US since I am fully remote and her company offered to let her work remote for a while so we could do this.

We either work out of the Airbnb we rent or a cafe. In some cities we were close to a reasonably priced co-working space and would work out of there.

The big draw for me has been the flexibility. We try as hard as possible to do asynchronous work, so some days I will take a few hour break in the middle of the day and go do something, and then work later into the evening.

10
Mozai 1 day ago 3 replies      
So they bought an oversized office space, provisioned it like a warehouse, in a location that is horribly expensive to live near or get to. Are they surprised employees would rather not go there?
11
sgt 23 hours ago 4 replies      
I find this quite funny: "And if theyd rather work at Starbucks, Automattic will pay for their coffee"

I can understand occasionally working out of a coffee shop. But who does this all the time and remains productive? And is it really fair to the coffee shop?

12
spikels 23 hours ago 0 replies      
Shame that such awesome space was barely being used right in the middle of SF. There is a pretty severe shortage of office space in the area. Automattic should both make a pretty good profit by subleasing at current much higher market rents and help alleviate the shortage.

Even better would be if this low density land could be incorporated into the huge 667 Folsom office/residential project planned next door. You could build 50,000+ sqft on that large lot and help both the office and housing shoartage. Unfortunately SF's planning process is so slow and uncertain it is probably too late even if the owner and tenants agreed.

13
tuna-piano 1 day ago 5 replies      
Humans desire to be a part of a community. For the last several decades, that community (in the US) has been in large part the workplace.

Is anything replacing the workplace as the form of community for people or is that something that is just being lost?

14
kyriakos 1 day ago 2 replies      
doesn't strike me like a nice office. looks like a co-working space for startups. add more people and it will look like a hackathon than a company workspace.
15
redm 1 day ago 0 replies      
It's gotten far easier to telecommute in recent years and that keeps the productivity much higher than it used to be. My partners and I tried remote work back in 2007, even spending 10k to video conference with Marratech [1] (Google-owned). Today it's trivial to have good fast communication while working remotely.

[1] http://www.marratech.com/

16
raimue 1 day ago 0 replies      
The article claims they had 5 people visiting the office regularly. That does not sound much compared to 550 employees. However, according to their map [1], there are only about 10 employees in SF itself, a few more in the surroundings.

Maintaining a 15,000 square feet office in that area for the amount of employees seems oversized in any case.

[1] https://automattic.com/map/

17
daemonk 22 hours ago 0 replies      
I've just started working remotely. I think one of the major benefit for me is actually that we mostly communicate via e-mail/messaging services.

Of course there are plenty of situations where talking face to face is more informative, but I often find that to be rare.

Communicating via text has the added benefit of documentation and allows you to think about what you are actually writing. I find describing what I plan to do with a client via text helps me organize my thinking.

I work in data analysis though. So maybe this doesn't apply to other fields.

18
TokenDiversity 1 day ago 2 replies      
I'm sick of working in open spaces. If you cannot give me a cubicle, let me work at home.

There are countless researches clearly saying that open spaces are bad for productivity yet for some reason they always win. And it's easy to see why, you only have to throw buzzwords like collaboration, team-work, open ... and done.

19
KIFulgore 23 hours ago 0 replies      
Judging just from the photo, I'd work from home too if my workspace was a warehouse with a bunch of picnic tables.
20
pyb 23 hours ago 0 replies      
Funny how fast the 'remote' tide has turned in the last year or two. These days, most prospective employers/contracts I find would prefer me to work remotely. Although personally, I'd rather work onsite ! This is for London and the South East of England.
21
aresant 23 hours ago 0 replies      
What does a remote team do to enterprise value assuming a long term acquisition?
22
cygned 22 hours ago 0 replies      
I am wondering how a globally distributed team is set up from a law perspective.How can I employ someone from another company? Create a subsidiary in their country?
23
winteriscoming 1 day ago 0 replies      
Looking at that picture, it looks like some kind of backroom place in some store where employees gather to have lunch.
24
carroccio 1 day ago 6 replies      
What type of work can one do without double monitors and a mechanical keyboard?
10
How is GNU `yes` so fast? reddit.com
562 points by ruleabidinguser  10 hours ago   221 comments top 27
2
mooktakim 1 hour ago 3 replies      
If anyone, like me, is wondering what "yes" is used for. You can use to pipe "y" to commands that require interactivity, so if you just want to say "y" to all the inputs, you can use "yes" to do this:

 yes | rm -r large_directory yes | fsck /dev/foo

3
tzs 6 hours ago 4 replies      
The /r/programming discussion of this is interesting [1].

Someone does a Go version and gets the same speed as GNU yes. Someone else tries several languages. This person got the same speed in luajit, and faster in m4 and php. Ruby and perl about 10% slower, python2 about 10% slower still, and python3 about half that. The code is given for all of these, and subsequent comments improved python3 about 50% from his results, but still not up to python2.

[1] https://www.reddit.com/r/programming/comments/6gxf02/how_is_...

4
pixelbeat__ 7 hours ago 0 replies      
The recent commit that sped up GNU yes has a summary of the perf measurements

https://github.com/coreutils/coreutils/commit/3521722

5
tobik 26 minutes ago 1 reply      
FreeBSD's yes has just been updated because of this.

https://github.com/freebsd/freebsd/commit/1d61762ca37c20ab6f...

It's about twice as fast as GNU yes now on my FreeBSD system here.

6
madeofpalk 8 hours ago 1 reply      
Back when I worked at the Genius Bar at Apple Stores I saw a customer come in and talk to a 'Genius' about their MacBook being "slow". After a quick bit of troubleshooting, he just opened up 4 terminal windows an ran yes in all of them, and did some hand wavy explanation about diagnostics.
7
akerro 6 hours ago 0 replies      
Years ago I read a similar experiment about max. CPU data flow. Guy was testing how much data can his CPU pass in a second. He was writing it in C, using some Linux optimization, optimizing code for CPU caches, using some magical C vectors that are optimized for such purpose. He got some help from someone working at Google. I tried to find that post but never succeeded. Does anyone here know it?
8
joosters 6 hours ago 2 replies      
the limit isn't the processor, it's how fast memory is. With DDR3-1600, it should be 11.97 GiB/s (12.8 GB/s)

I don't understand this reasoning. Why is it being limited to main memory speed? Surely the yes program, the fragments of the OS being used, and the program reading the data, all fit within the L2 cache?

9
DonHopkins 25 minutes ago 0 replies      
The proprietary Oracle Solaris 11.2 yes really slowed down when they added DRM and Verified Boot support...
10
mkj 9 hours ago 3 replies      
You could make "yes" faster with the tee() syscall. Keep duplicating data from the same fdin (doesn't actually copy) and it becomes entirely zero-copy.
11
jvolkman 8 hours ago 4 replies      
`yes` (with the backticks) is my favorite "bring the system to its knees right now" shell command.
12
raverbashing 6 hours ago 2 replies      
And the question is, do we need yes to be so optimized?

Not complaining, I like this kind of analysis

But it seems you won't be limited, in a shell script, by the speed you can push y's

13
ww520 8 hours ago 2 replies      
I would just pre-allocate a static array of "y\n" of size BUFSIZ, write it out in a loop, and call it for the day, skipping the whole malloc and filling loop business.

Make the static array BUFSIZ * 1024 to trim the syscalls by a factor of 1000.

14
metaphorm 14 minutes ago 0 replies      
I thought this was a fascinating read but it left a serious question lingering in my mind, which is a little out-of-scope for the article, but I hope someone here can address.

Why did the GNU developers go to such lengths to optimize the yes program? It's a tiny, simple shell utility that is mostly used for allowing developers to lazily "y" there way through confirm prompts thrown out by other shell scripts.

is this a case of optimization "horniness" (for lack of a better word) taken to its most absurd extreme, or is there some use case where making the yes program very fast is actually important?

15
sytringy05 3 hours ago 1 reply      
man, I just spent like 8 minutes today writing a python script to use up all the disk space on some servers (part of ops readiness testing) when I could have just used this trick.

`yes` will help me on the "see what happens when something uses all the CPU and memory" test case. Thanks Reddit/HN!

16
ojn 9 hours ago 1 reply      
Measurements are really noisy, but I seem to get significantly better numbers than that when I use fsplice() on a pre-generated few pages of file data instead.
17
likelynew 8 hours ago 3 replies      
Why is it so slow(compared to the post) in the macbook air. Native yes runs at 26 MiB/s, and GNU yes at 620 MiB/s.
18
crb002 50 minutes ago 0 replies      
yes | write <USERNAME> "Don't you hate dialup connections?"
19
Tepix 1 hour ago 1 reply      
Why is he using backticks to quote "yes" in the title?
20
Someone 8 hours ago 2 replies      
With that malloc overhead, I expect GNU yes to be slower when only a few bytes are read from it.

So, what's the distribution of #bytes read for runs of 'yes'? If we know that, is GNU 'yes' really faster than the simpler BSD versions?

Also, assuming this exercise still is somewhat worhtwhile, could startup time be decreased by creating a static buffer with a few thousand copies of "y\n"? What effect does that have on the size of the binary? I suspect it wouldn't get up much given that you can lose dynamic linking information (that may mean having to make a direct syscall, too).

21
ars 9 hours ago 4 replies      
But doesn't this make the typical use case (just a few "yes"s needed) slower, since first it has to fill a buffer?

I would write() the buffer each time it gets enlarged, in order to improve startup speed.

Also: The reddit program has a bug if the size of the buffer is not a multiple of the input text size.

And it's increasing the buffer by incrementing one at a time, instead of copying the buffer to itself, reducing the number of loops needed (at cost of slightly more complicated math).

22
du_bing 5 hours ago 2 replies      
I run the command `yes | pv > /dev/null` on my MacBook Pro, it's only 37m/s, is this normal? I am not familiar with the command.
23
peter_retief 5 hours ago 0 replies      
Well now I know what `yes` does (And pv)
24
dekhn 1 hour ago 0 replies      
clearly, we just need /dev/yes
25
26
fuckemem 9 hours ago 3 replies      
27
melicerte 4 hours ago 4 replies      
Did you notice PHP outperforms any other scripting languages? Some report that it event beats the GNU yes implementation.

After reading here so many unfair critics and pedantic dislike over PHP[1][2][3][4][5][6], I just want to say: STFU.

[1] https://news.ycombinator.com/item?id=12706136

[2] https://news.ycombinator.com/item?id=3825227

[3] https://news.ycombinator.com/item?id=3824881

[4] https://news.ycombinator.com/item?id=1823022

[5] https://news.ycombinator.com/item?id=1819517

[6] https://news.ycombinator.com/item?id=1819413

... Just to name a few.

11
Apples Guidelines Now Allow Executable Code in Educational Apps and Dev Tools macstories.net
395 points by tempodox  1 day ago   237 comments top 25
1
interpol_p 1 day ago 3 replies      
I've just submitted an update to Codea[1] that allows for the importing of user projects[2]

It has been "In Review" for a suspiciously long time now. So I think it might be testing the application of these updated policies.

I have often submitted updates to App Review which include the ability to download and install executable code (along with review notes detailing my reasoning) with the knowledge that they would be rejected. I have also appealed Apple's rejections in order to effect a change in policy for the App Store. At some point during phone calls with the reviewers they told me they were "advocating for policy change internally on my behalf" even if they couldn't approve my app right now. I'm so glad policy has changed now.

[1] https://codea.io

[2] https://twitter.com/twolivesleft/status/873692454947442688

2
paultopia 1 day ago 7 replies      
Honestly, I try to write code on iOS all the time, and it's not really the absence of tools that can execute that code that really stands in the way. Instead, it's:

- The absence of a really good typing story. The 12.9 iPad Pro with smart keyboard is nice for typing text but terrible for moving the cursor around. It's agonizingly slow to do it with keyboard (highlighting is worse, for some reason) and inaccurate to do it with finger/fiddly to do it with Pencil.

The only text editor with vim keybindings (an absolute must in an environment where it's hard to move the cursor normally...) of which I'm aware is Buffer, while the only text editor with both good syntax highlighting and good github integration (via Working Copy) is Textastic. Honestly, I really wish one of those two would just buy the other so that I could have both.

- The absence of a really good ssh story. Prompt is nice, but for some reason, whenever I try to SSH into anything, there's so much latency that it is really painful to actually do anything. Maybe I just have slow network connections? But anyway, so much for just coding on a linode or something in vim.

3
JesseWright 1 day ago 0 replies      
I actually appreciate that Apple stipulated "apps must make the source code... editable by the user". I personally think this helps with the educational spin to this currently, as it assures users are able to see source code but also tinker with it and learn. This is something I wish I would have had when I was in school - there were some editors at the time, but none of them could run any at that time to my knowledge.

I think this could really help a lot of students for what it is, and I hope it does well in that regard.

4
nolok 1 day ago 6 replies      
Let me give a courtesy remainder that it is "... until Apple change their mind".

Whatever the provider, I really hate those walled gardens where what you can deliver or not is at the whims of a company whose interest is not always aligned with yours. I understand being on them is necessary due to how large their market are, but this is really not where I hoped we would be fifteen years ago.

I guess I'm merely venting, and daydreaming about what could have been, "if only"...

5
ferdterguson 1 day ago 4 replies      
I feel like we are inching closer to being able to write code on iOS. Swift storyboards on the iPad kind of opened the door and I hope we can keep chipping away at this.

The day I can run and write Python natively on iOS is the day I buy an iPad Pro. Right now there are some good ssh clients and I can write code from a terminal, but pros of the device are not worth that tradeoff right now IMO.

6
mark_l_watson 1 day ago 0 replies      
One of my favorite apps is Raskell, basically Haskell 98 ported to iOS. It uses Dropbox for storage so it is possible to move small Haskell applications in and out of iOS. Pythonista is also very cool.

I like the safety of the iOS walled garden but I also see real value in complex IDEs like IntelliJ running on iPad Pros.

7
barrkel 1 day ago 1 reply      
Technically any program which loads a file is executing loaded code - the file is interpreted as a set of instructions about what data structures to create. This is more explicit for things like vector formats, and reaches its logical conclusion with things like postscript files.
8
klinquist 19 hours ago 0 replies      
Dear VSCode team... now is the time for VSCode for the iPad!
9
sudhirj 1 day ago 3 replies      
Anyone know how Swift Playgrounds work? Do they interpret the Swift code or compile it against a set of mock APIs?
10
jacquesm 1 day ago 8 replies      
What I find absolutely incredible is that this is accepted at all. You really have to wonder how we went from a computer with a bunch of slots and open schematics to one that is so closed you need permission from the manufacturer to run whatever code you desire.

The degree of paternalism is astounding.

11
Jyaif 1 day ago 1 reply      
Ah, but now we need to be able to spawn processes (at least one extra), otherwise we app developers can't secure the user's data in our own app...
12
sigjuice 1 day ago 2 replies      
Apple should just do a Darwin/macOS ARM VM on the iPad so developers can have ARM Homebrew and other Unix tools they are used to.
13
adm2life 1 hour ago 0 replies      
Good step in right way !
14
brians 1 day ago 0 replies      
One step closer to Emacs on iPad.
15
Aaron1011 19 hours ago 0 replies      
> Apples Guidelines Now Allow Executable Code in Educational Apps and Dev Tools

This title is somewhat confusing - it makes it sound as though educational apps and dev tools somehow weren't allowed to execute code before, which doesn't make any sense.

16
d08ble 1 day ago 0 replies      
Amazing! I've been waiting for this.

Animation CPU Studio will be published soon.

https://twitter.com/AcpuStudio

17
eecc 1 day ago 0 replies      
18
noblethrasher 1 day ago 0 replies      
Funny coincidence: I just downloaded Scratch Jr. for my nephew this past weekend, only to be disappointed that we couldn't view the other projects from within the app, nor could he share his.

I hope that we can now expect to get this feature, soon.

19
jonknee 1 day ago 1 reply      
Silly question, but how does WeChat get around this? Does custom code for Official Accounts just work on Tencent's server and basically work in a WebView?
20
83457 1 day ago 0 replies      
yay, pico-8 should be allowed now
21
fgandiya 1 day ago 2 replies      
I hope this mean I can easily load scripts onto Pythonista. It's a real pain right now.
22
jlebrech 1 day ago 0 replies      
so something like xcode on ipad is now possible, as they won't build it themselves.
23
laughingman2 21 hours ago 1 reply      
The irony of people defending apple because its "safe" and doesn't let you "shoot yourself in the foot" in a forumn named Hacker news.

What is happening to hacker culture? I think as influx of new programmers increase, awareness on the culture's ethos of freedom, liberty, anti-authoritarianism, anti corporatism has to be increased.

Or we will have people loving to be jailed by their benevolent overlords in "apple/google/facebook/etc"

24
pmarreck 1 day ago 1 reply      
Did they ever consider that any number of web browsers can already execute javascript?
25
dalacv 23 hours ago 0 replies      
Just an FYI, I use a cheap Android device with a Bluetooth keyboard and mouse and use Termux which is a Linux emulator with support for many packages including vim, python, jupyter, task warrior and much more
12
Pirate Joes, Maverick Distributor of Trader Joes Products, Shuts Down nytimes.com
370 points by artsandsci  3 days ago   263 comments top 36
1
captainmuon 3 days ago 15 replies      
I don't understand with what right trader Joe's can prohibit somebody from reselling their products. If he clearly states where he bought them from, and that he is not affiliated, and doesn't misuse their trademarks (impersonate them), it should be absolutely legal.

A side remark, people often say how great the US / north America is for entrepreneurs, compared to (continental) Europe where there is a lot of red tape and regulations. But in my opinion, if I were to do this in Germany there is no way ALDI (whom trader Joe's belongs to iirc) could sue me out of business. Not even with the old frivolous "we are wrong but you can't afford the defense" trick. There is just so much legal uncertainty in NA that it would give me nightmares doing business there.

2
lsiebert 3 days ago 2 replies      
I am not a lawyer, so I don't know that I am qualified to comment on the legal issues.

I can say that this does make me upset at Trader Joe's, and I will be considering where else I can spend my money.

They could have worked with this guy, eventually set up a Trader Joe's in Canada, and then offered to let this guy run it. That would have been better for their brand, in my view.

I care about what companies do. Costco hires employees and treats them well. It pays above average, and it hires and keeps on people with disabilities and injuries, even if they can't do everything someone else can do. It makes me feel good to shop there. And it's employees are loyal, hard working, happy and friendly, and they have less pilferage then other stores.

This idea that a company has a duty to be a dick is silly. Companies should care about their brand, and about being a good corporate citizen.

3
chx 3 days ago 5 replies      
Let's review one of the court documents because it has a very important detail. https://cdn.ca9.uscourts.gov/datastore/opinions/2016/08/26/1...

> Defendant Michael Norman Hallatt purchased TraderJoes-branded goods in Washington State, transported themto Canada, and resold them there in a store he designed tomimic a Trader Joes store. Trader Joes sued under theLanham Act and Washington law.

Repeated later:

> It is uncontestedthat Defendant Michael Norman Hallatt purchases TraderJoes-branded goods in Washington state, transports them toCanada, and resells them there in a store he designed tomimic a Trader Joes store.

Emphasis mine and it's a big deal. Trader Joe's would have had a hell of a time bringing a suit if it would be called Hallat's Little Shack and would look like any random grocery store.

4
Noos 3 days ago 1 reply      
Problem is it sounds like he was trying to rely on association to the Trader Joe's brand to make money, kind of a shadow franchise. That opens up the problem of brand dilution, and even the most ethical companies have to be ruthless about that, or they can lose their own brand and all the benefits they worked to build with it.

He should have realized the need, and done things like match their product mix with his own brands, work on making the store's own feel, and dampened direct association to Trader Joe's. He didn't and it bit him in the ass. No sympathy here.

5
thefalcon 3 days ago 2 replies      
There's protecting your brand, and then there's whatever the heck it is Trader Joe's did here, which seems senseless and malevolent.
6
rfdub 3 days ago 2 replies      
Trader Joes doesn't have a goddamn peg-leg to stand on in this dispute. If Trader Joes had made any indication whatsoever they were seeking to satisfy the clearly substantial demand for their products in Vancouver I might better be able to see their side of the story, but they have done absolutely nothing to expand into what would be ludicrously lucrative market. I know multiple people who have sent bloody hand-written letters to Trader Joes begging them to open a store in Vancouver and yet they would rather spend hundreds of thousands of dollars fighting a local small-business owner than satisfy the demand themselves. Regardless of the legality of this situation Trader Joes has not won the moral high ground.
7
settsu 3 days ago 0 replies      
While this was arguably a legally heavy-handed act on Trader Joe's part, it also seems like Mr. Hallatt became increasingly bold and antagonistic as his revenue increased.

I mean, he did change his store name to Pirate Joes (from the far more ambiguous Transilvania Trading) and his actions seem to betray less charitable motivations than his words would lead you to believe ("This is not a business I should be doing from a personal profitability standpoint - https://www.theguardian.com/world/2014/nov/21/pirate-joes-tr...)

That said, seems like Trader Joe's missed an opportunity for a win-win partnership with someone who had already developed rudimentary logistics to meet a demonstrated demand. But then it doesn't surprise me based on my 30+ years shopping at Trader Joe's: I would never describe them as innovative, instead I'd say they are very focused on what they've been doing well for decades.

8
SeeDave 3 days ago 2 replies      
Pardon my ignorance, but... why would Trader Joe's have a problem with their products being resold in Canada if they don't have a presence there? Does their parent company have a competing brand that sales are being cannibalized from?

From my perspective: every product sold in Canada was purchased in the U.S. so... if anything, this Pirate Joe fellow has provided additional sales for Trader Joes and proved that there is demand for Trader Joe's products in Canada at an incredible 40% markup!

If they're not interested in servicing Canada, would it not be to Trader Joe's advantage to enter a formal franchising or wholesaling agreement with Pirate Joe?

There must be more to this story in terms of Trader Joes objectives as opposed to Pirate Joe's methods or the legal proceedings.

9
tryitnow 3 days ago 2 replies      
As much as I like to side with the little guy, I think it's pretty fair for an establishment to restrict whom they sell to (as long as it's not based on a protected class like race, gender, orientation, etc). Despite being banned from the store this guy still sought out ways to shop there, so I can't defend him too enthusiastically.

Then again it kind of annoys me that TJ's just didn't open a damn store in Canada. And if they don't want to do that then why not just look the other way while someone else took on the risk of importing their products into another country?

10
heynk 3 days ago 3 replies      
I live in Bellingham, WA, which has (I think) the closes TJ's to Vancouver. The parking lot is already about 50% British Columbia plates, and maybe now it'll be even more. I certainly welcome more friendly neighbors shopping in town, but it's a bummer they have to shut down.
11
mazameli 3 days ago 1 reply      
12
kefka 3 days ago 4 replies      
Gotta love capitalism, eh? Just like votes, more money = more protection.

This certainly wasn't a trademark issue. Trader vs Pirate. There was no question this store wasn't run by Trader Joes/Aldi North. They were buying in bulk to stock a store where they couldn't normally get the goods. Reselling should be 100% A-OK. Any trademarks go along with the products. And as far as I would guess, the grocer certainly wasn't tampering with anything - if (s)he was, they'd go out of business quick.

This is just normal SLAPP-style punitive legal actions that a large monied corporation can do to stop the little guy from doing legal behaviors that they don't like.

13
bbarn 3 days ago 0 replies      
Trader Joe's is a masterclass example in branding.

The only reason anyone's surprised or outrage is that the store feels like a small, homey, good natured place full of organic this and that that's lower priced than you'd expect. That might have been true, 40 years ago. For a store that had the same name, but was a different entity entirely.

Trader Joe's now is just a giant marketing and packaging front for 70 billion dollar a year Aldi, a multinational chain. It's a corporation. None of this behavior surprises me at all.

14
joncp 3 days ago 2 replies      
I'm not clear on how US courts were allowed to hear a case about events in Canada. Is that a thing?
15
echlebek 3 days ago 0 replies      
That's really too bad. Pirate Joe's fit nicely into our cultural tradition of thumbing our noses at the Americans.
16
hallalex831 3 days ago 1 reply      
I'm surprised Trader Joe's hasn't gone to Amazon yet to have all of these listings removed yet... https://www.amazon.com/s/ref=nb_sb_noss_2?url=search-alias%3...
17
sailfast 3 days ago 0 replies      
Assuming that taking care of customs duties and other food quality issues legally would not be that expensive, all I'm seeing is missed revenue.

If the person wants to order 10,000 palettes of cookies at retail price, why wouldn't you sell the cookies to the person? He's not stealing from the back of the store, he's paying full price. I'm very confused why Trader Joe's would not have created a direct connection with the guy.

This reminds me of major services cutting off API access because they thought they could do it better in-house. Just HIRE the person doing your own service better in a different way.

18
chaostheory 3 days ago 9 replies      
Is Trader Joe's that much better than anything else Canada has to offer?
19
Simulacra 3 days ago 0 replies      
This story has always baffled me and I've never really understood where Trader Joe's comes from on this. It seems like business opportunity exists, but they're either really full of themselves, or have some other tacit reason for avoiding the Canadian market. I just don't get it, and I don't like how Trader Joe's has behaved here. Right or wrong, as a consumer, I disagree, and I'm putting this down as another reason to never go to a Trader Joe's again.
20
pthreads 3 days ago 0 replies      
"At one point, Mr. Hallatt dropped the P from his store sign so it read Irate Joes a signal of his determination to fight the grocery chain."

Hilarious!!!

21
nfriedly 3 days ago 0 replies      
That's too bad. I loved it when they took the "P" out of their sine after Trader Joe's sued them! ("Irate Joe's")
22
debacle 3 days ago 0 replies      
Makes sense. If it was called Pirate Pete's I would understand. The same thing happened with South Butt, which was a weaker case in my opinion.
23
halfnibble 2 days ago 1 reply      
Trader Joe's doesn't want customers who spend a ton of money buying in bulk at full retail price. Furthermore, they clearly have no intention of expanding into a large market that desperately wants them. What kind of business is this?
24
rdl 3 days ago 0 replies      
I generally load up a few Amazon Fresh disposable coolers with TJ products as gifts for friends in Vancouver whenever I drive up -- Kerrygold butter is really hard to get in Canada, and has much better omega 3 ratio than grain fed butter.
25
dawnerd 3 days ago 0 replies      
So if Trader Joes is so concerned why don't they just open up shop in Canada? I've heard the podcast about it and original articles way back and it's amazing they're shutting out a market that seems to be very welcoming.

Maybe they see Target Canada failure and are scared away by that?

26
valuearb 2 days ago 0 replies      
He spent so much time and effort creating and running the store and fighting this. I mean, paying $20/hour for people to shop Trader Joes to get him goods at retail? That's so incredibly inefficient.

Why didn't he just create his own store with his own brand and mimic the Trader Joes products and aesthetic? He could buy goods in bulk at much lower prices. He doesn't have to worry (much) about legal issues or spend money on them.

Clearly demand was so high he could still get away with charging very high prices.

27
stevewillows 3 days ago 0 replies      
It's sad to see Pirate Joes go away. I don't know anyone who shopped there on a regular basis, but I do think TJ would do well in that neighborhood.

The main draw to Trader Joe's is that its part of the journey across the line. This week I'll be doing this same old routine -- pick up some packages at the mail place ($2 per package), hit up a few grocery stores for different hot sauces and staples (including condensed milk in a squeeze tube), have lunch in Bellingham, go for a walk around Fairhaven, then return home.

Trader Joe's is part of that journey, much like Target (who had a massive, depressing attempt to break into Canada). Strip away that special-trip aspect, and all you really have is another grocery store with a few exceptional items.

28
CodeWriter23 3 days ago 0 replies      
Well, that's one way to deal with a guy who has spent the money proving the market for your product line. I think a better move would have been to take a page from Dave Thomas' (Wendy's) play book and open a Trader Joe's down the street.
29
20150327ASG 3 days ago 0 replies      
I have just lost my appetite for Trader Joe's products.
30
beatpanda 3 days ago 1 reply      
>>For one trip, he hired a couple who he said did not look like conventional Trader Joes shoppers. They had dreadlocks, tattoos and piercings. They looked like they just walked off the set of a Burning Man documentary, he said.

I'm sorry? Trader Joes, in at least 4 locations I've seen in California, does special signs and displays the week before Burning Man to market to Burners. Where is this writer from?

31
grizzles 3 days ago 1 reply      
If I lived in Vancouver I would have an irresistible urge to start a Swashbuckler Joe's right now. If only for the mischief of it.
32
ryanSrich 3 days ago 0 replies      
Does anyone else feel like he didn't raise the money because he didn't use a sensible crowd funding site like GoFundMe?
33
miiiiiike 3 days ago 0 replies      
The StartUp Podcast tagged along with him a few years ago: https://gimletmedia.com/episode/pirate-needs-pirate-season-3...
34
Shorel 3 days ago 0 replies      
He could have started to make his own products in this time, and slowly replacing the Trader Joe's ones with his own.

Right now he would simply stop buying the other products while having his own brand.

35
jliptzin 3 days ago 0 replies      
Lawsuit aside, what was this guy thinking. What an awful business model.
36
massung 3 days ago 2 replies      
I'm looking at this as though Trader Joe's was a different company... say Disney. Disney goes to great lengths to work out how its products are used, packaged and distributed to not only maximize profits, but also to maintain a certain image.

If I go to DisneyWorld, purchase a Mickey Mouse doll, an take it home. I have the right to do with that doll whatever I want: burn it, give it to my daughter, or resell it at whatever price I see fit.

However, I don't believe I have to right to go - as an agent of another (presumed competitor), purchase that same doll, and then resell it in my own store. I have no resell agreement with Disney to do so. In a typical reseller arrangement, wouldn't a store (e.g. Target) have an agreement with Disney to purchase bulk product for resell, presumably at a reduced price, but also under strict guidelines as to how it could do so? For example: cannot be sold above a certain price, cannot be sold next to adult content, etc.

On a side note: I have to believe that (while not a TJ problem or related to the lawsuit) there were other issues with what Pirate Joe's was doing related to imports, possible tariffs not being adhered to, etc.

/IANAL

13
Windows93 SP2 windows93.net
488 points by ivank  2 days ago   115 comments top 52
1
ninjakeyboard 1 day ago 5 replies      
I've been staring at the half life 3 loading screen for the last 6 hours. I don't think it's going to start.
2
vxxzy 1 day ago 4 replies      
Just a suggestion... Open up the calculator and do 0/0.
3
laumars 1 day ago 0 replies      
The part that impressed me the most is you can drag and drop files from your own desktop onto this. It even opens those files in it's own editors when you double click the icon.
4
vocatus_gate 1 day ago 1 reply      
This site is my favorite page to put full-screen on coworkers' computers when they forget to lock their screens.
5
graeham 1 day ago 1 reply      
I was going to protest the full Lena image without a NSFW warning, but hadn't realised the full story of its history[1]...

The site in general is a beautiful work of art, a great blend of attention to detail with comedy of computing in that era.

[1]https://en.wikipedia.org/wiki/Lenna - tl;dr is this iconic test picture for computer imaging was a cropped Playboy centerfold from 1972. I've just finished a PhD which included a fair bit of image processing, but I was unaware of the story behind this iconic image.

6
marxdeveloper 1 day ago 0 replies      
Woah shameless plug, my game is "Windows93 SP2" compatible it seems - right click on desktop - Create shortcut.Command: iframe https://data.mo.ee/index2.html?inapp=steam&node-webkit=1 --width=1280 --height=720

Title: RPG MO

(Don't leave a space before iframe in the command)

7
krrrh 1 day ago 2 replies      
This is a work of art. The ProgressQuest game loading screen is one of the funniest things I've seen in a while. Like all well-told jokes, it's in the timing.
8
shimon_e 1 day ago 1 reply      
Back button goes back to previous app. If this can get the back button to work correctly why can't Google AMP?
9
abluecloud 16 hours ago 0 replies      
> /c/files/documents/private/SUPER TOP PRIVATE/THIS IS PRIVATE STOP/WHAT ARE YOU DOING/WHAT STOP PLEASE/I DID NOT GIVE YOU PERMISSION/PRIVATE GET THE HELL OUT/YOUR HURTING ME STOP/HOW HAVE I WRONGED YOU/I WILL PUNCH YOU IN THE FACE/PLEASE STOP ITS PRIVATE/I HATE YOU/

fair enough.

10
ahacker15 1 day ago 3 replies      
Awesome that this even work well on mobile browsers!

Is this open source? So we could see how it was made?

11
flavio81 1 day ago 0 replies      
Finally, an operating system for my Android phone that will let me do useful stuff, like playing Wolfenstallman 3D!!
12
tambourine_man 1 day ago 3 replies      
"Safari is the new Internet Explorer"

Accidental "works best in browser X" 90s reference right there.

I find Safari superior to every other browser on any platform in every possible metric except for dev tools, which took a nose dive when they ditched the open source WebKit one for this calamity.

13
TeMPOraL 1 day ago 0 replies      
Took a cursory look for now; few things I love:

- Half Life 3

- Defrag <3.

- Running Windows93 inside Windows93 inside Windows93 inside Windows93...

A work of art, indeed. Kudos!

14
elipsey 1 day ago 4 replies      
bug report: i broke it by making a folder on the desktop, opening the folder, and putting the folder in itself.

now it's crashed and won't reload.

is there a work around for my workflow?

15
strin 1 day ago 1 reply      
At first, I thought this is a VNC connecting to a Win93 in a virtual machine.

Then I realized everything is written with web technology.

16
runnr_az 1 day ago 0 replies      
That's clearly a labor of love. Nice job!
17
koyote 1 day ago 2 replies      
This is awesome!

It's also quite buggy (chrome/linux) which adds to the whole Windows 9x feeling. Not sure if intentional but well done anyhow!

18
std_throwaway 1 day ago 1 reply      
You can actually win the game in the solitaire clone; the minesweeper clone not so much.
19
Paul_S 1 day ago 0 replies      
Inspired. Microsoft should learn from this and include the "Reinstall" button in the start menu of windows 11.
20
josteink 1 day ago 0 replies      
This site has a uncanny attention to detail: The C-drive inside "Virtual PC" differs from the C-drive in the "host OS"!

Given that kind of zealotry, it irks me that you can launch an infinite amount of nested "Virtual PCs". Obviously it makes for some fun screenshots and is technically impressive in itself, but Windows early on never allowed you to run Virtual PC inside Virtual PC. So this is clearly wrong!

In short, not considering OCD, where do I file the bug-report? :)

21
chrisb 1 day ago 1 reply      
Making Arena93 full-screen (within Windows93) hard-crashed my Mac!(MacOS 10.12.4, using Chrome 58)
22
sengork 1 day ago 0 replies      
There is one thing missing for a complete experience: https://en.wikipedia.org/wiki/BonziBuddy
23
akira2501 1 day ago 0 replies      
I saw that RSS icon and my first instinct was to check and see if Java needed an update.
24
TheWoodsy 1 day ago 1 reply      
Take a look at A:\system32.dll

I wonder how many hours I could waste looking for more Easter eggs ;]

25
gallerdude 1 day ago 0 replies      
Best ratio of Comedy:Operating System that I could have ever imagined.
26
akoster 1 day ago 1 reply      
Just curious, is anyone else hearing popping sounds when they click on various things? Unsure if its intentional, and if so, trying to emulate an old hard disk seeking or speakers popping from interference.

Otherwise, kudos to the devs for creating this amazing work of art!

27
laurent123456 1 day ago 0 replies      
Pity the Run dialog doesn't work, I wanted to try "c:\nul\nul" [0]

[0] http://windowsitpro.com/security/device-names-crash-win9598

28
mataug 23 hours ago 0 replies      
Virtual PC inceptionhttp://imgur.com/XRWSiHe
29
jancsika 1 day ago 0 replies      
Where is the project hosted?

I'd like to throw some event handlers on "Puke Data" to allow changes to the dsp graph.

30
mabynogy 1 day ago 2 replies      
Take a look at GAFA3D (near Defrag icon). There is an interesting level called "Operation Stallman" ;-)
31
chenster 1 day ago 0 replies      
This is the OS of the future!
32
emidln 1 day ago 0 replies      
Just need an IRC gateway for trollbox
33
Anarch157a 23 hours ago 0 replies      
I loved the "Troll mode" in Mine Sweeper :-D

Serious hard work went into this site.

34
huxflux 1 day ago 0 replies      
I can't get my HL3 to work, anyone has a fix? I took three days of from work, and now this.
35
Filligree 1 day ago 0 replies      
This allowed me to make a folder named CON. Literally unplayable.
36
vocatus_gate 1 day ago 0 replies      
You can actually right-click on the files in the "file explorer" and download them to your desktop IRL.
37
edward_rolf 1 day ago 0 replies      
I came here to use my fav browser, IE 3. You could add bookmarks and it supported CSS I believe.

:(

38
xg15 21 hours ago 0 replies      
Can I type Google into Google somewhere?
39
yellowapple 17 hours ago 0 replies      
So apparently Symantec Endpoint Protection thinks that the Virtual PC app is some kind of "Fake App Attack", and thus cuts off network communication for 600 seconds.

Curious.

40
sajithdilshan 1 day ago 0 replies      
If only Windows 9X had these kind of slick animations...
41
pavement 19 hours ago 0 replies      
Is there a code repo for this?
42
Jemm 1 day ago 0 replies      
I really miss Defrag. It is zen to watch.
43
tcbawo 1 day ago 0 replies      
ByteBeat plays a familiar tune, it's pretty catchy.
44
devniel 1 day ago 0 replies      
bananamp playlist please, I googled it without success.
45
eof 1 day ago 0 replies      
>~/desktop ls

MANIFESTO.lnk42

3d.lnk42

Arena 93.lnk42

...snip...

>~/desktop dir

dir is not defined

interesting

46
sbarre 1 day ago 1 reply      
Half-Life 3 confirmed!
47
seoseokho 1 day ago 0 replies      
In castle gafa, what does the amazon computer do?
48
edgarvm 1 day ago 0 replies      
Solitude does not accept drag and drop on android
49
andrius4669 1 day ago 1 reply      
Would webasm port make this actually real?
50
devuo 1 day ago 0 replies      
Brilliant! Kudos to the authors
51
partycoder 1 day ago 1 reply      
I am impressed they went to the extents of making Wolfenstein 3D levels.
52
nnfy 1 day ago 0 replies      
This was (intentionally?) painful on my Nexus 5. Interesting nonetheless. I suppose it wouldn't be windows93 without some degree of discomfort.
14
Intel fires warning shots at Microsoft, says x86 emulation is a patent minefield arstechnica.com
326 points by Analemma_  3 days ago   226 comments top 33
1
rayiner 2 days ago 3 replies      
This marks a distinct shift for Intel. Historically, Intel's IP approach has focused on trade secrets, because they had a huge advantage in manufacturing and implementation techniques that are not easily reverse-engineered. Patent-protecting x86 didn't make much sense during the long period where nobody could make a general-purpose CPU as fast as Intel running native code, much less while emulating x86. As Moore's law has run its course, Intel's lead on that front has been shrinking. Apple's A10 is shockingly close to matching Kaby Lake on performance within a similar power envelope. And Ryzen is within spitting distance of Broadwell at the high end. All on non-Intel foundry processes. That was unimaginable 10 years ago.
2
amorphid 2 days ago 2 replies      
Attorneys on both sides must be excited on some level about the potential number of billable hours it'd take to litigate a case like this. Reminds me of a something an entrepreneurship professor told me...

If there's one lawyer in town, they drive a Chevrolet. If there are two lawyers in town, they both drive Cadillacs.

3
Deinos 2 days ago 2 replies      
The article mentions Cyrix as a "victim" of Intel patent defense; however, Cyrix not only won their lawsuits, but they also went after Intel for patent violations in the Pentium Pro and Pentium II processors.

https://en.wikipedia.org/wiki/Cyrix

http://law.justia.com/cases/federal/district-courts/FSupp/84...

4
amalcon 2 days ago 5 replies      
Years ago, I spoke with an attorney with a CS background. He had once worked on a case like this. Sharp guy. He didn't tell me the parties involved, and I didn't ask, though I assume he wouldn't speak openly about it while it was ongoing. I therefore don't know how it turned out. It was many years ago, so I might be remembering wrong. I'm not a lawyer, this is not legal advice (neither mine nor his).

Basically, there are two approaches the plaintiff might take here. The simplest is to cite the doctrine of equivalents[1]. This is basically the notion that if you do the same thing in the same way for the same purpose, then it's the same process, even though you are using digital instructions instead of logic gates. The legal theory here is pretty well settled. The problem is that you'd need to justify that digital instructions are obviously equivalent to logic gates, and a skilled professional would have equated them at the time of the patent's filing.

The other approach is to argue that an emulator actually is a processor, and therefore fits the literal claims of the patent. The explanation for this is pretty well-established: it's literally the Church-Turing Thesis[2]. However, the viability of this argument depends on the language of the patent claims. Also, it's hard enough to explain the C-T Thesis to CS students. My undergrad had an entire 1-credit-equivalent course that basically just covered this and the decidability problem. Explaining it to a judge, who (while likely highly intelligent) probably has no CS background, over the course of litigation is likely to be really hard.

Now, Intel certainly has enough resources to do both of these things (and they may also have precedent to cite, that didn't exist back then or that wasn't relevant to that case). Don't take this as an opinion on any possible result, it's just information such as I remember it.

[1]- https://en.wikipedia.org/wiki/Doctrine_of_equivalents[2]- https://en.wikipedia.org/wiki/Church%E2%80%93Turing_thesis

5
natch 2 days ago 3 replies      
Patents expire after 17 years and x86 is 39 years old, so any of the original patents must have expired twice over already.

They no doubt have been filing additional patents over the years. But I'm sure MS and Qualcomm have plenty of their own patents to bargain with.

Also their warning could backfire if it gives Microsoft one more reason to finally walk away from x86 compatibility... not that this is likely to happen anytime soon.

6
wfunction 2 days ago 1 reply      
Can someone explain this:

> AMD made SSE2 a mandatory part of its 64-bit AMD64 extension, which means that virtually every chip that's been sold over the last decade or more will include SSE2 support. [...] That's a problem, because the SSE family is also new enoughthe various SSE extensions were introduced between 1999 and 2007that any patents covering it will still be in force.

AMD64 requires SSE2 which was introduced in 2001, right? So isn't it just 1 year until Microsoft can put in what's required for the AMD64 architecture?

7
faragon 2 days ago 0 replies      
Intel will not threat Microsoft, not even indirectly, in my opinion. Rationale: once Apple starts shipping desktops and laptops with ARM chips, the only safe port for the expensive x86 chips would be Microsoft (desktop and server market) and big iron on Linux/Unix/Hypervisors.
8
AstralStorm 2 days ago 2 replies      
So they will ban all virtual machines which sometimes have to go for emulation, e.g. to handle XSAVE?

Scorched earth policy will likely not be defensible under fair use law. Reverse engineering for compatibility has a few precedents.

9
tyingq 2 days ago 1 reply      
An earlier discussion here had most people guessing it was Apple, not Microsoft, that Intel was lobbing the threat at.https://news.ycombinator.com/item?id=14518189
10
nerpderp83 3 days ago 4 replies      
Well, since x86 is a monopoly ... Intel oughta go easy on this one.
11
ikeboy 2 days ago 1 reply      
> And Intel's business health continues to have a strong dependence on Microsoft's business, which has to make the chip firm a little wary of taking the software company (or its customers) to court.

I mean, Apple and Samsung had a billion dollar lawsuit while Samsung chips were still in iPhones. It's certainly precedented to sue a corporation you're actively doing business with.

12
pmarreck 2 days ago 0 replies      
I would personally be pleased if the millstone of the x86 instruction set sank both Intel AND microsoft's hegemony.
13
payne92 1 day ago 0 replies      
It will be interesting to see how this strategy fares in the US, given the Alice ruling which made it much harder to patent methods that were purely software.

Intel's strategy of going after other hardware companies may not translate neatly to emulators.

14
clouddrover 2 days ago 0 replies      
For anyone interested, here's a Microsoft Channel 9 video in which they talk about some of the x86 emulation layer internals:

https://channel9.msdn.com/Events/Build/2017/P4171

15
jonstokes 2 days ago 3 replies      
Alright, I'll come out of retirement to hit this dead horse another lick.

"if WinARM can run Wintel software but still offer lower prices, better battery life, lower weight, or similar, Intel's dominance of the laptop space is no longer assured."

Peter. My man. I laughed. I cried.

For the millionth time, the ARM ISA does not magically confer any sort of performance or efficiency advantage, at least not that matters in the billion+ transistor SoC regime. (I will include some relevant links to ancient articles of mine about magical ARM performance elves later.) ARM processors are more power efficient because they do less work per unit time. Once they're as performant as x86, they'll be operating in roughly the same power envelope. (Spare the Geekbench scores... I can't even. I have ancient published rants about that, too).

Anyway, given that all of this is the case, it is preposterous to imagine that an ARM processor that's running emulated(!!!) x86 code will be at anything but a serious performance/watt disadvantage over a comparable x86 part.

This brings me to another point: Transmeta didn't die because of patents. Transmeta died because "let's run x86 in emulation" is not a long-term business plan, for anybody. It sucks. I have ancient published rants on this topic, too, but the nutshell is that when you run code in emulation, you have to take up a bunch of cache space and bus bandwidth with the translated code, and those two things are extremely important for performance. You just can't be translating code and then stashing it in valuable close-to-the-decoder memory and/or shuffling it around the memory hierarchy without taking a major hit.

So to recap, x86 emulation on ARM is not a threat to Intel's performance/watt proposition -- not even a little teensy bit in any universe where the present laws of physics apply. To think otherwise is to believe untrue and magical things about ISAs.

HOWEVER, x86-on-ARM via emulation could still be a threat to Intel in a world where, despite its disadvantages, it's still Good Enough to be worth doing for systems integrators who would love to stop propping up Intel's fat fat fat margins and jump over to the much cheaper (i.e. non-monopoly) ARM world. Microsoft, Apple, and pretty much anybody who's sick of paying Intel's markup on CPUs (by which I mean, they'd rather charge the same price and pocket that money themselves) would like to be able to say sayonara to x86.

The ARM smart device world looks mighty good, because there are a bunch of places where you can buy ARM parts, and prices (and ARM vendor margins) are low. It's paradise compared to x86 land, from a unit cost perspective.

Finally, I'll end on a political note. It has been an eternity since there was a real anti-trust action taken against a major industry. Look at the amount of consolidation across various industries that has gone totally uncontested in the past 20 years. In our present political environment, an anti-trust action over x86 lock-in just isn't a realistic possibility, no matter how egregious the situation gets.

So Intel is very much in a position to fight as dirty as they need to in order to prevent systems integrators from moving to ARM and using emulation as a bridge. I read this blog post of theirs in that light -- they're putting everyone on notice that the old days of antitrust fears are long gone (for airlines, pharma, telecom... everybody, really), so they're going to move to protect their business accordingly.

Edit: forgot the links. In previous comments on exactly this issue I've included multiple, but here's a good one and I'll leave it at that: https://arstechnica.com/business/2011/02/nvidia-30-and-the-r...

16
orionblastar 3 days ago 1 reply      
I remember IBM having a contract with Intel to allow other chip companies to make x86 chips in case Intel could not keep up with demand.

QEMU emulates X86 chips as does other emulators. I wonder how those are effected?

17
dboreham 2 days ago 1 reply      
Logically this implies that I can't execute some i386 binary that I possess without infringing Intel patents.

I think this theory of infringement has to run into various thought-experiment problems such as : can I auto-translate that binary into some other instruction set, then execute the translated binary, without infringing Intel patents? (yes, surely) Is the translator now infringing Intel patents because it has to understand their ISA? (no, surely).

Now, can I incorporate that translator into my OS such that it can now execute i386 binaries by translating them to my new instruction set which I can execute either directly or by emulation? If so then I am now not infringing. Or did infringement suddenly manifest because I combined two non-infringing things (translator + emulator for my own translated ISA)?

19
make3 2 days ago 3 replies      
How did I not already know Microsoft had a working x86 emulator.. this is a massive game changer for the laptop space if it's fast and reliable enough, as afaik ARM chips are so much more power efficient for similar perf
20
sliken 2 days ago 1 reply      
Keep in mind the most relevant instruction set is the X86-64 instruction set (32 bit code is not very relevant these days). The x86-64 ISA was created by AMD, not Intel. Intel was busy trying to milk the enterprise market with the Itanium, trying to reserve 64 bit as an enterprise feature.
21
narrator 2 days ago 0 replies      
Another component of Microsoft getting off Intel is that the antitrust settlement only applied to x86 hardware, so MS getting off x86 would let them lock down the platform and do all their dirty tricks all over again.
22
someSven 2 days ago 3 replies      
May someone please elaborate on the difference between what MS does and emulators on Linux like Quemu and ExaGear?
23
kev009 2 days ago 1 reply      
IBM sold an x86 translation for a while https://en.wikipedia.org/wiki/PowerVM_Lx86. Would be interesting to know why it was discontinued.
24
mtgx 2 days ago 1 reply      
So Intel is so scared of little ol' ARM (compare their revenues) that it's willing to use patents to take it out of the PC market, rather than compete on technical grounds?

Okay, got it. I'll make sure to account for that in my next CPU/device purchase.

25
mental_ 2 days ago 3 replies      
If AMD can implement x86 in hardware, why can't Microsoft implement it in software?
26
chris_wot 2 days ago 1 reply      
Windows still has a HAL, makes me wonder why Microsoft don't just cut a new HAL for the ARM.

It's quite possible I'm missing something vital here, of course.

27
julian_1 2 days ago 0 replies      
Anyone know if it is an emulator, or an on-demand isa translator that operates at runtime? I wonder what the implications are for infringement.
28
asveikau 2 days ago 0 replies      
Another reason Microsoft should be telling ISVs to recompile for Win32 on ARM instead of binary emulation.
29
zekevermillion 2 days ago 1 reply      
I'll just sit hear eating my popcorn and waiting for a lowRISC computer I can buy.
30
ksec 2 days ago 0 replies      
Everything Intel have said and put forth are Hardware companies. I can't believe anyone can be sued for software emulation of x86.

And unless Qualcomm and Microsoft are working on a Hardware assisteed X86 emulation, this warning shot may be directed at somebody else.

My guess: Apple.

31
nickpsecurity 2 days ago 0 replies      
I was just watning about fhis on anothet thread. It's not competition if it requires compatibility with patdnt-protected ISA or microarchitectures. It's coercion.
32
dis-sys 2 days ago 1 reply      
best outcome I can think of:

AMD licenses x86 patents to Qualcomm/MS to make x86 emulator better patent troll proof. In return, Qualcomm and AMD team up for better ARM server based processors. MS can sell more Windows/Windows Sever (sad).

33
syshum 2 days ago 0 replies      
Microsoft should Partner with AMD to pressure the big desktop and laptop OEM's to stop using Intel CPU;s

I would love to see Dell, Lenovo and HP to switch exclusivly to Ryzen processors,

And switch to the new Naples CPU in all their Server/Storage systems

15
Exploring LSTMs echen.me
344 points by deafcalculus  3 days ago   43 comments top 11
1
visarga 3 days ago 4 replies      
LSTMs are both amazing and not quite good enough. They seem to be too complicated for what they do well, and not quite complex enough for what they can't do so well. The main limitation is that they mix structure with style, or type with value. For example, if you want an LSTM to learn addition, if you taught it to operate on numbers of 6 digits it won't be able to generalize on numbers of 20 digits.

That's because it doesn't factorize the input into separate meaningful parts. The next step in LSTMs will be to operate over relational graphs so they only have to learn function and not structure at the same time. That way they will be able to generalize more between different situations and be much more useful.

Graphs can be represented as adjacency matrices and data as vectors. By multiplying vector with matrix, you can do graph computation. Recurring graph computations are a lot like LSTMs. That's why I think LSTMs are going to become more invariant to permutation and object composition in the future, by using graph data representation instead of flat euclidean vectors, and typed data instead of untyped data. So they are going to become strongly typed, graph RNNs. With such toys we can do visual and text based reasoning, and physical simulation.

2
mrplank 1 hour ago 0 replies      
Google Brain outperforms LSTMs with Convolutional Networks in speed and accuracy, seeming to confirm LSTMs are not optimal for NLP at least:

https://arxiv.org/pdf/1706.03762.pdf

3
inlineint 3 days ago 1 reply      
I personally find recurrent highway networks (RHNs) as described in [1] to be easier to understand and remember the formulas for than the original LSTM. Because as they are generalizations of LSTM, if one understands RHNs, one can understand LSTMs as just a particular case of RHN.

Instead of handwaving about "forgetting", it is IMO better to understand the problem of vanishing gradients and how can forget gates actually help with them.

And Jrgen Schmidhuber, the inventor of LSTM, is a co-author of the RHN paper.

[1] https://arxiv.org/abs/1607.03474

4
YeGoblynQueenne 3 days ago 2 replies      
In the experiment on teaching an LSTM to count, it's useful to note that the examples it's trained on are derivations [1] from a grammar a^nb^n (with n > 0), a classic example of a Context-Freee Grammar (CFG).

It's well understood that CFGs can not be induced from examples. Which accounts for the fact that LSTMs cannot learn "counting" in this manner, nor indeed can any other learning method that learns from examples.

_______________

[1] "Strings generated from"

[2] The same goes for any formal grammars other than finite ones, as in simpler than regular.

5
mrplank 3 days ago 2 replies      
LSTMs are on their retour in my opinion. They are a hack to make memory in recurrent networks more persistent. In practice they overfit too easy. They are being replaced with convolutional networks. Have a look at the latest paper from Facebook about translation for more details.
6
dirtyaura 3 days ago 5 replies      
Really great work on visualizing neurons!

Is anyone working with LSTMs in a production setting? Any tips on what are the biggest challenges?

Jeremy Howard said in fast.ai course that in the applied setting, simpler GRUs work much better and has replaced LSTMs. Comments about this?

7
minimaxir 3 days ago 1 reply      
Is there code for the coloring of neurons per-character as in the post? I've seen that type of visualization on similar posts and am curious if there is a library for it. (the original char-rnn post [http://karpathy.github.io/2015/05/21/rnn-effectiveness/] indicates that it is custom Code/CSS/HTML)
8
CyberDildonics 2 days ago 0 replies      
> I once though LSTMs were tricky, but LSTMs are actually very easy ...

You would think an article like this would define LSTM somewhere.

9
Seanny123 3 days ago 1 reply      
Is the code for generating the reactions from the LSTM hidden units posted anywhere? That was the best part for me and I'd love to use it in my own projects.
10
natch 3 days ago 1 reply      
LSTM is "Long Short Term Memory," since the tutorial never mentions what it stands for.

https://en.wikipedia.org/wiki/Long_short-term_memory

11
raarts 3 days ago 1 reply      
Can someone provide a tl;dr ?
16
Lessons Ive Learned from Three Million App Downloads jordansmith.io
403 points by jordansmithnz  15 hours ago   92 comments top 16
1
srinathrajaram 1 hour ago 1 reply      
"What Ive learned (aside from sucking it up, and sending a kind, helpful response) is: design your product as if it was going to be used by people that are a software literacy step below the target user."

Completely with you on the 'sucking up and sending a kind helpful response'. Snark does not pay. It makes no sense to snap at a user.

Regarding the other point about first-time users. I have a slightly related theory.

When you design something, design it for someone who has the attention span of a two-year-old. Not because your app is going to be used by a two-year-old. But because that is how much mental bandwidth a user is going to give you. Your user is probably busy or just likes to multi-task.

Working that much harder on the UI pays off, or at least prevents a disaster.

2
firasd 12 hours ago 8 replies      
Love this bit: Sometimes youre stuck on a problem, and there just dont seem to be any great solutions: maybe its related to a piece of code youre writing, or decisions around how youre going to market your app. Then, you start thinking about the problem from a wider perspective. You realize that you wont need to even write the tricky piece of code if you architect it the right way, and that the marketing decision is one your friend (who has a knack for that sort of problem) would know how to tackle. You could sum it up as taking a step back from the problem.

Taking a literal step away tends to help. I've often realized new approaches or epiphanies when mulling a problem while walking or in the subway.

3
jansho 3 hours ago 1 reply      
It's particularly encouraging to read the many hours of work and back-stepping he's done, to get the quality really, really high. Startups are often associated with speed, but less so on flexibility, even if lean philosophy purports it. Ship fast. Get the bare-bones MVP done. Aim for viral growth. This is probably why we have millions of apps, but only a few dozens last and actually taken up by the mass. Different types of products mean different processes after all, give or take amount of resources.

In this app's case, it's about re-imagining an existing function - timetables. The designer knows that user experience is everything, and because of this he's willing to scrap everything if need to. And even when this happens, it isn't exactly waste as you understand the problem deeper and come to the design of an even better solution.

Sure you can argue that an MVP can bring about those design iterations. Keeps your focus on the users too. But arguably the market for this type of product is very active - though not necessarily competitive. So rather than get buried with the hundred others, it needs to shine right from the beginning.

4
sidlls 13 hours ago 3 replies      
"So, dont be stingy: a product with no paying users is (usually) better than a paid product with no users. Its much easier to upsell to an existing customer than it is to find an entirely new paying customer."

This is generally true, but it seems a bit like applying an Enterprise view of sales to a market of minnow sized budgets. It reinforces app consumers' view that apps should only charge for marginal value, not core value or the biggest value. This sort of "freemium" model leads to basically a market of pure crap with extremely rare gems.

Edit: I'm not dumping on the author, here. Were I to "do mobile" I'd probably take a similar approach because it clearly works.

5
ensiferum 6 hours ago 0 replies      
Regarding just trying again and again... "Winners never quit,quitters never win but those who never win and never quit are idiots".

I'm reality most of us don't really have more than a few shots except in those rare cases of the most trivial apps.

6
scarface74 11 hours ago 5 replies      
What's sad is because of App Store economics. He can never depend on his paying customers to ever pay for an upgrade. He will always have to chase new customers.
7
sriram_iyengar 13 hours ago 0 replies      
Very impressive Jordan. Pls do consider releasing TimeTable in India - an Android version if possible. Millions of parents of primary kids (more than the students) will be happy.
8
djsumdog 10 hours ago 1 reply      
A lot of apps are like this. I know dev who were like "They made that all that money off Angry Birds." Didn't Rovio have a bunch of terrible ideas that failed and Angry Birds was one of their last ditch projects?
9
lettersdigits 7 hours ago 0 replies      
"Instead, my moderate success story is closer to one of hard work, and slow, steady progress"
10
ramshanker 12 hours ago 1 reply      
TLDR: App design is equally important as coding. Design everything around first time user and simplicity.
11
minademian 6 hours ago 0 replies      
really great article. It's a breath of fresh air in the sea of churnalism suffering from Mediumitis - "I did this in 3 hours and now I have self-worth".
12
abraae 13 hours ago 1 reply      
I'd be intrigued to know what caused those spikes in your download volumes.
13
guard0g 12 hours ago 0 replies      
Some profound product management wisdom there, Jordan. Wish enterprises understood it as well as you've laid out. Thanks for the post and here's to your continued mojo.
14
therealmarv 10 hours ago 1 reply      
Does somebody know which blog engine and theme was used here?
15
michaelevensen 6 hours ago 0 replies      
Thanks for sharing Jordan!
16
tarr11 11 hours ago 1 reply      
Would love to see revenue data!
17
Area code 710 wikipedia.org
351 points by raldi  2 days ago   77 comments top 20
1
yodon 2 days ago 6 replies      
When I was in college in the '80s, My roommate and I got curious about unused area codes (and/or prefixes? I forget). We started dialing some. Within about 15 minutes we stumbled on some government service with a scary-official sounding operator on the other end (I've no idea if it was this service or a different one).

The really scary part was after dialing the number and encountering the operator, we were unable to hang up (any time we hung up and picked back up, the operator was still there, even after waiting about two minutes). Fortunately this was (a) at MIT which still had a central electromechanical telephone switch for student phone lines in the '80s and (b) I had keys to the switch as a student phone repair tech.

I still remember grabbing my keys, running over to the switch, and physically pulling the relay contacts to release the call and prevent a trace to our location in case that was the motivation for holding the line (nowadays traces are digital and instantaneous, but when looking at old-school electromechanical switches you really did need time to trace the call physically through the relays).

Yes, we were aware the operator was probably just messing with us by showing he could hold our line against our will to discourage us from calling again, but it still scared the crap out of us just in case.

2
kijeda 2 days ago 3 replies      
I have a GETS account that uses this area code. You are given a credit card sized reference card with your PIN number to activate it.

There is also another service called WPS for cell phones where you get priority just by prefixing your number with *272, the only catch there is your specific phone needs to be enrolled.

3
813594 2 days ago 0 replies      
I have a GETS account too (I work in healthcare). T-Mobile provides WPS service free, whereas Verizon charges $5/month per enrolled line. More info here https://www.dhs.gov/publication/getswps-documentsandhttps://www.dhs.gov/sites/default/files/publications/HOW%20I...
4
doctorshady 2 days ago 1 reply      
Little known fact: sometimes the other exchanges in area code 710 will translate to places going to military bases and such, depending on the time of year. The best way to tell is by calling 710-867-5309. If you get a recording saying "You are using <long distance provider>" followed by a not in service recording, well, it worked. If you'd care to look around random exchanges and thousand blocks, you might be in for a fun day. Or a knock at your door.

But yeah - it's all the luck of the draw. Some phone people have had varying levels of luck with other things involving that area code as well: http://www.binrev.com/forums/index.php?/topic/48478-weird-71...

5
wonderous 2 days ago 1 reply      
Here are more docs on the 710 area code via a simple Google:https://www.google.com/search?q=%22710-NCS-GETS%22+card+ext:...

For example, this PDF explains a lot than anything present on HN or Wikipedia:http://chicagofirstdocs.org/resources/060912-GETS.pdf

Here's a doc that covers all US Federal emergency communications:https://www.dhs.gov/sites/default/files/publications/nifog-v...

6
jpeterman 2 days ago 2 replies      
Every time I see posts like this on HN, I feel obligated to post http://www.evan-doorbell.com/production/

I originally discovered this guy from HN and the audio recordings on that site are mesmerizing to me.

7
schoen 2 days ago 1 reply      
I remember something in an old Phrack or another hacker zine where someone was recounting a rumor about this mechanism that he heard from someone who worked in a telco (viz., that there were special government phone numbers that were treated differently by the telephone system). It's interesting to see the progression from underground rumor to Wikipedia article.
8
losteverything 2 days ago 0 replies      
At&t used to create new prospects for long distance by comparing both numbers in a call to its customers database.

If a number was not an active customer it was put in an outbound call list to solicit long distance.

The best story i remember was when the navy wanted to know why we called one of their nuclear submarines. This implied that the right 10 random digits contacted a sub.

9
inspector-g 2 days ago 2 replies      
The article mentions that individuals placing calls though GETS, with a valid access code, receive "alternate carrier routing, high probability of completion, trunk queuing and exemptions from network management controls". I find this fascinating, and it's hard not to wonder if any (rough) equivalent exists for government-related internet traffic. As in, perhaps some special/cryptographic data can be provided in network traffic data that ensures higher-priority treatment in an emergency or crisis, like GETS. Can anyone enlighten me here?
10
axonic 2 days ago 0 replies      
Some numbers forward via DSN to "red phones" and what not. Please don't prank them or waste their time. I had a spouse social engineer the number to an overseas camp. It bloody rang the literal red phone used for CASEVAC operations on my helipad. Then she wanted to get pissed when I told her to hang up and call a civilian phone... "Well, don't you have call waiting?"... We are divorced now, of course.
11
reaperducer 2 days ago 1 reply      
Another odd area code is 500. Back in the 90's, I had a 500 number through AT&T. You could program it to "follow" you. Meaning that if, for example, someone called your number between 9a-5p M-F, it would ring your office. 5p-6p, your car phone. 6p-10p, your home phone, etc...

I suspect it got killed off because so many businesses were switching to cheapo, poorly-made, Winmodem-based PBXes that didn't recognize the area code.

12
nodesocket 2 days ago 2 replies      
I'm guessing don't try calling the number? Don't want to flood some poor government operator with internet trolls.
13
doctorshady 2 days ago 0 replies      
I'll just leave this here:

808-248-0002 - "Your GETS call is being processed. Please hold."

14
michaelgrosner2 2 days ago 3 replies      
Is there anywhere else to read more about these kinds of special phone numbers? Something about the current state of phreaking?
15
nsaslideface 2 days ago 0 replies      
I imagine this was part of what was dialed in last week's Twin Peaks
16
polygot 2 days ago 1 reply      
> "the call is then redirected to a live human operator who then asks for the access code."

I feel bad for that operator

17
saul_goodman 2 days ago 0 replies      
There's lots of good lore about stuff like this in phreaker circles. I remember a story about someone who supposedly found some listings of 710 numbers including things like the presidents bunker and such. The folks answering the phones for some of these numbers were not amused and were also caught off guard by calls from kids asking to talk to the president and such.
18
pavel_lishin 2 days ago 3 replies      
I wonder what it's like being an operator on that line; is it mostly hours or boredom, punctuated by a few phone calls? Or is it actually busy throughout the day?
19
gumby 1 day ago 0 replies      
> GETS is intended to be used in an emergency or crisis situation

Sounds like a major security problem, and during a crisis is especially when I would not like to have a buffer overrun.

20
axellgun 2 days ago 0 replies      
Area code 710 is a special area code, reserved to the federal government of the United States in 1983. As of December 2006, it had only one working number, 710-NCS-GETS (710-627-4387), which requires a special access code to use. See Government Emergency Telecommunications Service for more information on this service.
18
The relationship between mindset and getting old nautil.us
334 points by dnetesn  1 day ago   152 comments top 19
1
robteix 1 day ago 11 replies      
I wonder how much the effects vary between different professions.

I'm in my 40s. Incredibly old for HN standards. And yet, I feel no nostalgia for the "good ol' times." I mean, don't get me wrong I'm sure there's a lot of things that set me apart from newer generations -- I don't get Snapchat at all ;) -- but I don't see me being happier by being put in a house set up to look and feel like the 90s/80s.

Is it maybe because we as programmers tend to be less prone to be stuck to the past? Just wondering

2
michalu 1 day ago 2 replies      
I suspect the reason they felt better and more vital is that the change of mindset and environment altered their biochemistry.

How we feel and what we think of ourselves affects our levels of Testosterone, Cortisol, Serotonin, etc. Even a 5 minute conversation can give you a T boost of 30%+ ... or believing that you're perceived as high status alters your Serotonin. Those hormones in turn make you more vital.

So who knows what was the reason... maybe more social interaction with strangers? Or simply putting their mind into a different, better place?

http://www.ulm.edu/~palmer/TheBiochemistryofStatusandtheFunc...

http://www.cep.ucsb.edu/topics/courtship/roney%20et%20al_200...

3
dheera 1 day ago 3 replies      
It would be interesting to see how much of this is truly biological and how much of it is due to societal and situational conditioning.

There were lots of things I could do in my 20s (e.g. refuse to use gasoline-powered city transportation, refuse to patronize places that used disposable cutlery, refuse to use non-free software, etc.) that I can't do when I'm in my 30s because people around me would think I'm a stubborn idiot, jeopardizing my career at a point where I have not yet established myself. It's very easy to tell a colleague, advisor, anyone at school that you're going to bike to the destination or take electric-powered transit [because you don't believe in a fossil fuel future]. It's very difficult to say the same thing to an investor, co-founder, employee, customer, or whoever is offering you a ride in their car, without feeling like an ass. I'm basically forced to be "normal" during work times and fit into the mould of society. I can only be myself on evenings and weekends.

I can only imagine how much more "being normal" I need to do if I had kids, pets, tenants, or whatever. I don't have any of those at the moment. The other night I was pondering over potential improvements to our music and mathematical notation systems while staring at the Milky Way. (I didn't come to anything conclusive, but I love thinking outside the boxes that society defines for us.)

10 years ago, I could truly be myself 24 hours a day. I was basically learning all kinds of things about the world by doing that. Now, I only get about 5 hours a day to be myself. The rest of the time, I need to conform. The lack of "me" time itself may be contribute to some degree of mental rot/aging, apart from the biological component.

4
sdenton4 1 day ago 0 replies      
It's an effect probably at least as real as ESP:https://slate.com/health-and-science/2017/06/daryl-bem-prove...

Which is to say, I'm dubious as hell of this result: For something this click-baity, at this point in the history of psychology research, I'mma need some serious replication before I give itan ounce of belief.

5
TheOtherHobbes 1 day ago 1 reply      
In my 50s. Not exactly pickled in nostalgia.

I think the computing party is just getting started. Non-trivial domestic AI will be here within a couple of years, personal robotics 5-10 years after that.

The current ad mania sucks, but it's going to have to evolve or die.

I don't miss much of the past. Pocket phone computers, tablets, GPS, video calling, massive data storage, and the potential of renewables and distributed energy grids are all awesome. Like.

Even social has its moments.

The real problems are cultural and political. There's been some movement there, but not nearly enough. The system has nearly enough energy to go through a phase change soon, and that's when things will get really interesting.

6
myth_drannon 1 day ago 0 replies      
I wonder if nostalgia is a human mind's hack to slow down aging.
7
afpx 1 day ago 2 replies      
I look forward to living to 100. But, 80 would be even better if only I could regain a 12-year-old's sense of the passage of time.
8
chiefalchemist 1 day ago 0 replies      
Kinda like a placebo effect, yes. It would be interesting to take a group of slightly younger test subjects and see what happens to them when they live with older people in the present.

Moi? The body and mind are both subject to: Use it or lose it. We also, as humans, tend to assimulate into the norm around us, be it smoking, obesity, and now I guess perhaps youth.

Finally, I have to wonder about the effects of essentially being on holiday. In addition, perhaps the group discussions energized them? That is instead of waiting to die, they had more reason to live? In any case, interesting.

9
theprop 1 day ago 0 replies      
Age may mean certain things about DNA methylation, but it doesn't mean you can't continue inventing, challenging yourself taking chances e.g. 94 year-old co-inventor of lithium batteries co-invents a solid state (solid-glass electrolytes) battery.

http://www.canadianmanufacturing.com/technology/94-year-old-...

10
ilaksh 1 day ago 0 replies      
http://www.sens.org -- after reading the article, still by far the most scientific and fully developed approach that I have seen.
11
kusmi 9 hours ago 0 replies      
It's official, my boss really is feeding off my youth.
12
anentropic 1 day ago 0 replies      
Has anyone reproduced the results from this study of 49 people back in 1979?
13
DrNuke 1 day ago 1 reply      
Whatever your past, it is irrelevant now and future the only way forward, so smile and enjoy your ride together with the people you love (mid 40s here and still pushing, ehehe).
14
Schiphol 1 day ago 0 replies      
The experiment that kicks off the piece looks pretty replication-crisis worthy.
15
coldtea 1 day ago 0 replies      
A man is as old as the woman he feels (G. Marx)
16
robertlagrant 1 day ago 3 replies      
Some of the article was okay (although you can cherry-pick a lot to achieve a conclusion) but Langer's study in particular seemed very dubious. They "looked younger"? Stop - that's just way too objective for me!
17
reasonattlm 1 day ago 1 reply      
Physical activity is the likely mediating mechanism between acting younger and gaining modest benefits by some measures. Since the development of lightweight accelerometers, studies of physical activity have demonstrated strong correlations between even modest activity of the housework/gardening variety and health in old age. There is a mountain of further research demonstrating the benefits of increased moderate exercise and lesser forms of activity in older people.

But ultimately the end is the same. You can't reliably exercise your way to 90, even. The majority of people who are exceptionally fit die before reaching that milepost in the environment of the last 90 years of medical technology. The future of health and longevity in later life will be increasingly determined by medical technology, and nothing else. Aging is damage, and that damage can be repaired given suitable biotechnologies to do so.

DNA methylation patterns correlating strongly with age are a very promising tool when it comes to assessing treatments for the processes of aging. Companies offer various implementations now - see Osiris Green for a cheaper example, to pick one. In the SENS view of aging as accumulated molecular damage, epigenetic changes are a reaction to that damage; a secondary or later process in aging. We'll find out over the next few years how the rejuvenation therapy of senescent cell clearance does against this measure, now that things are moving along there.

But you shouldn't think it impossible to construct useful metrics of biological age more simply. There are a number of excellent papers from the past few years in which researchers assemble weighted algorithms using bloodwork, grip strength, and other simple tests as a basis into something that nears the level of discrimination of the epigenetic clock.

When it comes to a biomarker of aging, there are lots of promising candidates. Researchers will spend a lot of time arguing before they come to any sort of pseudo-standard for that task. Industry (today meaning the companies developing senolytic therapies for the clinic) will overtake them and, I'd wager, adopt one of the epigenetic clocks because it basically works well enough to get along with, and can be cheap in some forms.

18
jldugger 1 day ago 2 replies      
> getting old

'aging' is the word you are searching for

19
ianai 1 day ago 1 reply      
Constant change does harm. That's my takeaway.
19
Kubernetes Production Patterns and Anti-Patterns github.com
338 points by twakefield  3 days ago   40 comments top 14
1
lobster_johnson 3 days ago 3 replies      
Good news about zombies: Kubernetes will soon solve this by having the pause container (which is automatically included in every pod) automatically reap children. [1]

Note that this change depends on the shared PID namespace support, which a larger, still-ongoing endeavour [2].

[1] https://github.com/kubernetes/kubernetes/commit/81d27aa23969...

[2] https://github.com/kubernetes/kubernetes/issues/1615

2
web007 3 days ago 0 replies      
This is an excellent check-list of both kubernetes and docker gotchas to avoid.

Coming into the k8s ecosystem with very little container experience has been a steep learning curve, and simple, concrete suggestions like this go a LONG way to leveling it out.

3
twakefield 3 days ago 1 reply      
We've also published some other workshops for Docker and Kubernetes that we take customers through when onboarding (if needed): https://github.com/gravitational/workshop

Feel free to take them for a spin and feedback welcome and appreciated.

4
outworlder 3 days ago 2 replies      
I would like to have seen more "patterns" regarding configuration.

Right now, we have a bunch of microservices. Most of them talk to our shared infrastructure. We started with single configuration file, which has grown to monstrous proportions, and is mounted on every pod as a config map.

What would be the correct approach? Multiple configmaps with redundant information are just as bad, if not worse.

5
bryanlarsen 3 days ago 1 reply      
Have you tried out istio yet? It's the packaging of Lyft's Envoy that Google and IBM are putting together to handle your last two points, circuit breaking and rate limiting and much more.
6
lclarkmichalek 3 days ago 2 replies      
Might be worth mentioning about Docker's native support for multi stage builds: https://docs.docker.com/engine/userguide/eng-image/multistag... (still quite a new feature, plenty of people won't have it yet I guess)

Edit: oh, you kind of do. Well, it's not upcoming any more, it's in the latest Docker CE :)

7
Langhalsdino 3 days ago 0 replies      
Awesome github repo! I think i need to incorporated some of your patterns into my work ;)

If some of you are interested in Kubernetes GPU cluster for deep learning, this article might be good to read as well.https://news.ycombinator.com/item?id=14526807

8
throwaway34802 3 days ago 0 replies      
Have you tried using Habitat? It pairs nicely with Kubernetes and solves alot of these antipatterns I feel like.

https://habitat.sh

https://www.youtube.com/watch?v=-yTeXCY3iM0

9
old-gregg 3 days ago 1 reply      
Some background on these workshops: we (Gravitational) help SaaS companies package their applications into Kubernetes, this makes them deployable into on-premise environments [1]. This in itself is an unexpected and quite awesome benefit of adopting Kubernetes in your organization: your stack becomes one-click portable.

[1] http://gravitational.com/telekube

10
pooktrain 3 days ago 0 replies      
The presentation of patterns here is quite helpful. Is anyone aware of other resources for container design patterns?

The k8s blog has some as well:http://blog.kubernetes.io/2016/06/container-design-patterns....

11
nunez 3 days ago 1 reply      
what are everyone's thoughts on building containers for running one time binaries? like building a container to run jq or awk or something like that.

i've seen this pattern before and it didnt make me feel very good. it reeks of unnecessary complexity.

12
m0rganic 2 days ago 0 replies      
we use kubernetes, helm and gitlab.. runtime configuration lives in each repo next to code - values.yaml, dev.yaml, test.yaml, prod.yaml to store applications runtime configuration -- each environment is host to 40+ redundant services.. its working quite well but has required a pretty big upfront investment... surprised there was much discussion about monitoring- prometheus and grafana work well for that
13
eldios 3 days ago 0 replies      
Awesome article!
14
humanfromearth 3 days ago 2 replies      
> Anti-Pattern: Direct Use Of Pods> Kubernetes Pod is a building block that itself is not durable.

Kind of.. but you can set `restartPolicy: Always` and will always restart in case of failure.

20
For an Inclusive Culture, Try Working Less hackernoon.com
311 points by itsdrewmiller  23 hours ago   245 comments top 25
1
exelius 22 hours ago 4 replies      
Yes, yes, yes.

This was brought up in a thread last week about "As a female, how do I identify a good employer?"

The best answers basically said "work somewhere that has as boring a corporate culture as possible". Basically, work for a place where you are rated on your production and nothing else. Work elsewhere and things like "how late did you work?" -- a metric that is far easier for people without children to meet -- cease to matter.

Working late isn't the only thing (though it is a big one), but it tends to correlate with "immature HR practices" in general. Inclusivity is about recognizing that people have life configurations that differ from your own, and creating the space for those differences to exist.

2
trustfundbaby 16 hours ago 0 replies      
For all the noise tech startups make about meritocracy, they sure do a poor job of separating the work from personal issues which spells doom for minorities in a lot of instances.

I lost count of how many times, something innocent like not going to lunch with the team regularly (I'm a picky eater), or participating in whatever game the team was nuts about (foosball, or various exotic board games) turned into personnel issues where all of a sudden I was "unavailable to the team", or "distant and aloof" etc, even though my professional contributions were just fine or even stellar.

You can imagine how stressful it is to show up to work everyday wondering what bullshit non-work related nonsense is going to come up that day and require another stupid chat with your manager. And in the midst of that you're expected to keep up a cheerful demeanor and work well with the same assholes that keep bringing up this irrelevant crap because the fault in these interactions couldn't possibly be with them.

The day it becomes about the work, and not personal discomfort with new and differing points of view about communication and interaction, diversity at tech companies will become an after thought ... in a good way.

3
adventist 21 hours ago 2 replies      
> Thats because the culture was mostly about the business of software, how you build it, how you sell it, how you support it. If you were excited about that, you automatically belonged. You didnt need to stay late, or drink alcohol, or play Rock Band, or play board games, or not have kids to pick up, or go to church, or not go to church, or do anything except show up 9-to-5 and care a lot about good software.

Yes! Yes! Yes!

I don't drink, and its kind of sad that I get to miss out sometimes because I don't go to the bar. Because I like to bike instead, why can't I not feel pressure to go to the bar and do my own thing after work?

Handling work stuff at Work I feel is the way to go.

4
creepydata 22 hours ago 5 replies      
>Yesterday, I had a wide-ranging Slack conversation with some very nice people who patiently allowed this privileged white male to repeatedly touch the third rail of diversity and inclusion.

Read this three times and I can't understand what it means. Can anyone "translate?"

On the overall topic, it seems really obvious in retrospect that removing formalities in the workplace turns the office into a social club and those who don't want to socialize are excluded. Its certainly an unintended consequence though.

I can certainly see the benefits of formality in the office now that I'm older.

5
temp-dude-87844 21 hours ago 1 reply      
This approach finds its parallels in other collaborative spaces where meritocracy is valued; open source software development comes to mind. In that arena, this approach was widely deployed, but is at odds with the more recent trend of explicitly stating to promote inclusion and diversity.

Staunchly meritocratic online interaction and collaboration, from software development to messageboards, allows people to cultivate identities largely defined by their contributions, which is often distinct, or even at odds, from the identity they wish to demonstrate in their real life. In online spaces where individual contributors aren't restricted from speaking out against the leadership, this disconnect will manifest instead of being suppressed.

While I don't disagree with the author's recommendations and rationale, it's unfortunate that the OP's argument essentially reduces down to the fact that the less casual interaction between people, the more inclusivity will result. It's also re-framing the implied problem: the equality vs. equity debate. In the OP's view, the solution is to cultivate a minimalist, work-focused culture that solves the inclusivity question by avoiding it entirely. This is very much at odds with the approach that receives a lot more press these days, which seeks to prescriptively address inclusivity within its own problem-space.

6
nashashmi 21 hours ago 5 replies      
I am going to wrap this article around a bigger more general concept. I might be going off topic but bear with me.

The difference between a startup culture and a corporate culture is the difference between a creative company and a disciplined company. "Discipline" is like a swiss knife, something that can work anywhere and everywhere. Creativity only works in some places, in places that are desperate, in places that are still making basic decisions, in places where the problems are high and the solutions are few.

A disciplined company has no problem being acquired by a creative company. But a creative company has many problems when they start masquerading in a disciplined company. (Read: Microsoft acquires Company X and writes it off 5 years later.)

Working in a disciplined company is easy for most people. No manual required. Working in a creative company is difficult for most people but easy for creative people. Most foreigners or people with diverse minority backgrounds have a difficult time adapting to very social environments. They would rather stay strictly professional and confined to their work.

But here is the problem: what is the point of having diversity if social interaction is nil? How messed up is your social world if it does not include unsocial minorities?

There is a balance that is needed. Google started as creative and became more corporate and also became more "boring". (Sergey Brin's word)

7
jblow 22 hours ago 9 replies      
This is all fine, but there are side-effects.

If you only work a minimum number of hours within your field, you are unlikely to emerge as one of the peak achievers or thought leaders in your field. That's just because you learn more from experience, and working more hours gives you more experience.

You can extrapolate from there what this means for companies and individuals.

I am not at all saying that companies should ask people to work long hours. (I run a software company, and we are super-lax about hours, people showing up at the office, etc). But I am saying that if an individual wants to be an expert in a particular field, that person should probably work a lot (and probably wants to work a lot anyway, due to interest in the subject). This doesn't necessarily have to be at the company; it could be at home, on personal projects, whatever. But the deeper and more challenging the project is, the better you learn, and it's easier to have one project that is deep and challenging than somehow to have two in parallel. And if only one is deep and challenging, then you are sort of idling with half your time. So there are basically two paths to this kind of deep work: work for a company, make sure you get a project that's really good, and then work hard on it; or go do your own thing, make sure you have enough money somehow, and work hard on what interests you.

This also means that "work-life balance" is not a thing for experts the way it is for normal people. But that's fine, because for these kinds of experts their work is a serious part of their life and the two things are inseparable.

Of course if you don't feel this way about what you're working on, that it is a serious part of your life, then this strategy doesn't make sense; and I would not encourage people who don't feel this way (who are the majority of the population) to work that hard. I am just pointing out that there are some of us for whom a different life strategy is best.

8
platz 18 hours ago 1 reply      
It is also known that casual dress is somehow connected to less social mobility.

> But above all I didnt have the cultural and social capital to know how to dress casual in the right way. My casual dressing was made of nerdy, unfashionable and cheap clothes: you could immediately say that I havent accomplished anything. And I didnt even know that there was a rich way to dress casual.

http://marginalrevolution.com/marginalrevolution/2017/05/inf...

theres more art to looking sharp in casual attire than in a suit and tie!

> Tyler Cowen: Well, being a casual person myself, I'm very glad being casual is in vogue, and probably will stay in vogue. But what I find striking is societies with a lot of upward mobility often tend to have strict dress codes. So you see this today with Mormons, at Mormon businesses. You see it in Japan in its heyday years--you know, the businessman or journeyman suit, they more or less all looked the same. There's something about upward mobility where actually clothing is not that casual and one is being more formal in trying to impress; and that is a [?]. But the thing about being casual is it actually makes it harder for people to prove themselves. So, Bill Gates goes to a meeting and he may show up dressed very casually; but he's still Bill Gates--either everyone knows or if you really needed to, you could Google him. So there's a code of casual that's actually very difficult for, say, people from other cultures in America to master or demonstrate that's actually made signaling harder. Just that right way of looking casual is in a funny way more conformist than like the blue suit and tie, which you could do and then innovate around and try to climb to the top. So I find this disturbing, the more I think about it.

http://www.econtalk.org/archives/2017/05/tyler_cowen_on_1.ht...

9
lmm 22 hours ago 3 replies      
> Its so comfortable and nice to lead an integrated life where your colleagues are your friends and vice versa, where your conversations over beers solve problems encountered over keyboards.

> But maybe that comes at a cost. If we set aside that desire and focus on what were really trying to do heremake good softwarethen maybe well open up some different possibilities. By constraining the number of things we have to agree on, and the number of hours we have to spend agreeing on them, we naturally open ourselves to a diverse world of talented people.

Much as we might wish otherwise, I think this article is right that informality and diversity are in tension (though I think it's massively wrong to conflate informality with long hours; it's very much possible to have a culture where you drink alcohol, play Rock Band, play board games, but still go home after your 35 hours/week). But having to give up informality would be a very heavy price. For me a comfortable life is the end and making good software is the means. But even if your goal is good software, looking at the past couple of decades of big professional companies being displaced by scrappy startups, informal organizations seem a lot better at producing good software.

10
andrewfong 20 hours ago 0 replies      
The takeaway for me is less about minimum hours and more about minimum culture. Or put another way, "keep your identity small". http://www.paulgraham.com/identity.html
11
Animats 21 hours ago 0 replies      
Maybe this is more about drinking than dress code. Companies of Japanese salarymen have the same problem - too much group drinking, and a very uniform culture.
12
323454 18 hours ago 0 replies      
Sometimes, to solve really difficult problems, you have to make big personal sacrifices.

Sometimes, to evolve, adapt and gain the edge, you have to be loose and unprofessional.

Sometimes, to survive a famine or a drought, you have to ruthlessly cut what isn't absolutely necessary.

These are the other phases of the business cycle that the author neglects. Professionalism, openness, and work life balance belong to a certain phase of the cycle. That phase does not come from nothing and it does not last forever.

13
Mz 21 hours ago 8 replies      
Overall good post, but:

Yesterday, I had a wide-ranging Slack conversation with some very nice people who patiently allowed this privileged white male to repeatedly touch the third rail of diversity and inclusion. That conversation led me to the realizations in this post. Ill thank them by not naming them, and by promising never to bring this up in their Slack channel again.

In other words, people openly hated on him for wanting to discuss something with them and get informed -- a white male in a position of power that few women or poc occupy. And all they can do is make him scared to bring it up again and act like the abuse they heaped upon him is some sort of privilege he didn't deserve or something.

Wow.

I am so sick of women and people of color being openly hateful to people who were born the "wrong" gender and color to be part of the unfortunate many. Hello? Whining about how "it isn't my job to explain this stuff to you!" instead of being all "OMG! An opportunity to have a useful conversation with a white male who is actually curious about how the so-called other half live!" is part of the problem, not part of the solution.

(Before you auto-downvote this on the assumption that I am some overprivileged asshole man, please note I am a woman.)

14
mnm1 13 hours ago 0 replies      
The whole article is brilliant. I'd argue one great way to make this happen is remote work. Agree on some basic tools for text and voice chat and you're good to go. No stupid bro culture. No having to be seen working late. No dress codes. No bullshit. Either you create the product or you don't and get fired. Been working for years for my company and many others.
15
anothercomment 18 hours ago 0 replies      
The assumption seems to be that companies culture is driving women away. Is that even true, as in, are there really hundreds of thousands of female software developers in waiting who would jump at a job at a company with the appropriate culture? It seems very unlikely to me - more likely, the pipeline dries out long before the hiring stage.

That some companies with great effort manage to compete over the few female developers on the market doesn't prove every company could hire lots of female developers if only they changed their culture.

To be honest, personally, even if there were those hundreds of thousands of female developers supposedly driven away by bro culture, I would still maintain that people should have a right to create companies they enjoy working in. If some people want to work in T-Shirts and get drunk every night, it is their right to do so (if they can earn the money to sustain it).

Luckily not all companies are the same, so that people can apply to companies that suit their tastes.

If it weren't so, there wouldn't even be a need for hiring or job seeking to begin with. People could just apply to the next best company and be hired, likewise, companies could hire the next best applicant - because there would be no such issues as cultural fit or whatever. Not very realistic (source: I am not friends with everybody and not everybody is friends with me).

16
jankotek 22 hours ago 1 reply      
Remote work is even more inclusive.
17
golemotron 20 hours ago 0 replies      
I wish I could up-vote this more.

It is a problem that corporate America tries to optimize function by getting everyone closer and closer together with team building exercises and alignment of values.

Values are deeply personal and we should recognize that people are going to differ. Freedom of conscience is as basic as freedom of religion and important for the same reason.

If we keep work a professional space we maximize diversity of thought and life experience, which are ostensibly what the large push toward ethnic and gender diversity are a proxy for.

18
alexashka 21 hours ago 0 replies      
I think he's taking the surface level and assuming if we copy the surface level, we are going to get the rest.

No.

The reason Fog Creek works well, is because it's very smart people, who care about what they're doing. They care because it's a product company - they get to make decisions that impact the product. They feel a sense of ownership.

Contrast that with a sweat, uh sorry, I mean dev shop. Contrast that with doing contract work for big companies where you come in, leave 6 months later. Contrast that with start-ups that only exist because someone got free money.

Contrast that with shit maintenance work at big corps.

Does that about cover 95%, if not more, software jobs out there?

There is no fixing shit workplaces because the foundation is rotten. When you have no say, when you don't care about the product, when you move around every few years - yeah, it's shit culture.

There is no fixing that - most people long for a stable group of people they can make something happen with.

Most people are confused about how much work and dedication it takes to make something great. Most people's actions create what most people complain about and they don't even know it. There is no fixing it, there is only becoming good enough to either start your own Fog Creek, or be good enough to join one.

19
to_bpr 22 hours ago 0 replies      
There's no shortage of corporate environments to work in for those who want it.
20
voidr 3 hours ago 0 replies      
Why does racial and gender diversity matter in tech? I have worked in teams of all white guys and teams of mixed race and gender and I have seen no difference in productivity. The only thing that ever mattered was the skill level of the people. I see nobody complaining that most successful basketball players are tall black people.

I don't see a problem with having companies with corporate culture and companies with startup culture side by side, just because I dislike the suite and tie culture doesn't mean I want it gone, however from reading the article I get the impression that the author wants the more liberal companies gone just because he doesn't like them.

21
Humjob 19 hours ago 2 replies      
22
vedranm 22 hours ago 3 replies      
23
Sir_Substance 22 hours ago 2 replies      
Am I the only one who gets the niggling feeling that anyone who uses the words "males" and "females" in their public dissertations like it's normal to refer to people the same way one does cable connectors must have a tenuous and possibly weakening grip on the real world?
24
thegayngler 22 hours ago 2 replies      
So by forcing everyone to work strict 9-5 schedules you can create diversity. Ok.

Hmmmm... I agree at least in principle that one shouldn't be required to always hangout late nights after work. However, admittedly occasionally I think it's useful and it's helpful to understand your co-worker's motivations and spending a bit more time with co-workers sometimes is certainly reasonable and helps to build trust and respect amongst other co-workers.

Maybe people should be working only 30 hours a week and spending the other 10 hours just on team building.

I also think its useful to understand the social aspect of things because understanding motivations can help the team solve problems in a way that everyone will agree to.

25
Kinnard 22 hours ago 1 reply      
I'm looking for an alternative framework to work-life balance: https://news.ycombinator.com/item?id=14538411

I bet there's more than one out there.

Work/life balance doesn't "work" for a lot of people, a lot of types of work and a lot of lives. Astronauts, Presidents, Prophets . . . startup ceo's . . .

21
Fractal planting patterns yield optimal harvests, without central control phys.org
250 points by dnetesn  3 days ago   69 comments top 12
1
chrismealy 2 days ago 3 replies      
This reminds me of something from Sam Bowles's "Microeconomics":

Like the overnight train that left me in an empty field some distance from the settlement, the process of economic development has for the most part bypassed the two hundred or so families that make up the village of Palanpur. They have remained poor, even by Indian standards: less than a third of the adults are literate, and most have endured the loss of a child to malnutrition or to illnesses that are long forgotten in other parts of the world. But for the occasional wristwatch, bicycle, or irrigation pump, Palanpur appears to be a timeless backwater, untouched by Indias cutting edge software industry and booming agricultural regions. Seeking to understand why, I approached a sharecropper and his three daughters weeding a small plot. The conversation eventually turned to the fact that Palanpur farmers sow their winter crops several weeks after the date at which yields would be maximized. The farmers do not doubt that earlier planting would give them larger harvests, but no one the farmer explained, is willing to be the first to plant, as the seeds on any lone plot would be quickly eaten by birds. I asked if a large group of farmers, perhaps relatives, had ever agreed to sow earlier, all planting on the same day to minimize losses. If we knew how to do that, he said, looking up from his hoe at me, we would not be poor.

2
aetherspawn 3 days ago 3 replies      
I didn't understand:

1. how they didn't have pest problems if they planted in fractal patterns

2. but they did have pest problems if they didn't plant at the same time

Could someone kindly explain that in a little more depth?

3
jcoffland 2 days ago 4 replies      
I fail to see how the planting patterns are fractal. A fractal pattern is one which repeats itself at different scales. I realize that the repetition does not need to be exact but I don't see how there is any at all in this situation.
4
ggrothendieck 2 days ago 0 replies      
There is an agent-based model of Balinese irrigation written in NetLogo here: https://www.openabm.org/model/2221/version/3/view
5
chriswarbo 3 days ago 3 replies      
This looks very interesting from a regulation point of view, as a potential way to bring greedy self-interest into alignment with national/international social interest. I wonder what scenarios could be given a "pest tax", to alter the dynamic from a tradgedy of the commons to a cooperative/competitive optimum?
6
kakarot 2 days ago 1 reply      
Now how can I apply this to Dwarf Fortress?
7
abhinai 2 days ago 0 replies      
TLDR; Locally collaborative greedy planting strategy leads to globally optimal results and looks like a fractal from above. Mind == Blown.
8
havella 2 days ago 1 reply      
this is very interesting, wondering the principle applies to societal organization and current reversal trends on globalization (mono-culture) and weakening of international 'controlling' organizations.
9
marmshallow 2 days ago 1 reply      
Can anyone find sample satellite imagery that illustrates the fractal patterns? I didn't see any in the article or with a quick google search.
10
chiefalchemist 3 days ago 1 reply      
Is this a form of emergence?
11
anigbrowl 2 days ago 0 replies      
These insights will be useful for my political project.
12
Polarity 2 days ago 0 replies      
so: monolithic frameworks vs loose coupled components?
22
Stench gas everything2.com
240 points by raldi  3 days ago   53 comments top 15
1
abalone 3 days ago 1 reply      
> air allows mines to use a very interesting way to communicate

This is a very important point to remember about subterranean tunnel systems. It is exactly what came to my mind when I watched the Boring Company video about a huge network of 3D tunnels.[1] The tech press, which had probably never even covered a construction project yet alone tunnels, was basically like "what about earthquakes"? But tunnel collapse is not the primary safety issue.

It's fires. Smoke and toxic gases from fires spread very quickly through tunnels.

I am a huge fan of the concept, by the way, but I want to emphasize that most fatalities from traffic tunnels have been from fires (apart from ordinary traffic accidents).[2][3][4][5] And Elon Musk has stated that what makes this vision feasible from a cost perspective is smaller tunnel diameters. Which makes air "communication" all the more accelerated and safety critical. Thus any vision of tunneling without detailing fire safety, evacuation systems and firefighter access is significantly incomplete, as these can add significant cost and fundamentally constrain designs.

[1] https://www.youtube.com/watch?v=u5V_VzRrSBI

[2] https://en.wikipedia.org/wiki/Caldecott_Tunnel_fire

[3] https://en.wikipedia.org/wiki/Gotthard_Road_Tunnel#2001_coll...

[4] https://en.wikipedia.org/wiki/Kaprun_disaster

[5] https://en.wikipedia.org/wiki/Mont_Blanc_Tunnel#1999_fire

2
quadstick 3 days ago 0 replies      
100 years ago, yesterday, was the worst hard rock mining disaster in the US, in Butte, Montana. They didn't have this way of warning the miners back then and 168 miners died due to a fire in one of the shafts. Most died from asphyxia.

Michael Punke, the author of the Revenant, wrote an excellent non-fiction book about it called "Fire and Brimstone: The North Butte Mining Disaster of 1917".

3
userbinator 3 days ago 2 replies      
They remain there until an all-clear is given, which may include a distinct all-clear scent such as wintergreen.

If you search for "stench gas" you will find some... interesting photos of the control panel for these systems:

http://c1.staticflickr.com/2/1686/24201183892_c8a2dffc3b_h.j...

(Something about buttons marked "release stench gas" and "release anti-stench gas" seem amusing in a rather comical fashion.)

4
Herodotus38 3 days ago 3 replies      
Just reading about that article triggered an olfactory memory of the related compound 2-mercaptoethanol (or beta-mercaptoethanol as it was labeled in the lab). Used to reduce disulfide links in proteins (edit: see more correct response below) so that they would unravel a bit and separate by size more as they travel through the western blot matrix.

Unlike carbon monoxide this compound had a very "this will kill you" smell to it.

https://en.wikipedia.org/wiki/2-Mercaptoethanol

5
thomk 3 days ago 3 replies      
Everything2 is still around?!?! Awesome.
6
hitekker 2 days ago 1 reply      
If our noses were "sharper", i.e., able to distinguish on a deeper more meaningful level like a dog, could we transmit complex information with olfactory encoding?

Right now the smells are simple signals; I'm curious if a scent could be engineered to contain a language. Like paper and writing.

I'm asking for my story, in which sapient rats struggle against two-legged monsters with opposable thumbs.

7
rcarmo 3 days ago 0 replies      
I wonder if we could tie this to Jenkins for when a build breaks. Would make for a nicer alternative than sirens and flashing lights, although I suspect people would tend to clear the office...
8
rmm 2 days ago 1 reply      
It smells absolutely wretched, and is totally unmistakable.

Had it go off on a couple sites I've been on, and it's remarkable how it reaches every corner of the mine.

9
pjs_ 2 days ago 0 replies      
I instinctively hovered my mouse over the link to wintergreen, my brain fully expecting to click and experience the smell - as I would with any image, video, or sound. Took me a few seconds to manage expectations!
10
cobbzilla 3 days ago 1 reply      
11
smsm42 3 days ago 0 replies      
Same principle in fire alarm for the deaf:

https://www.techdirt.com/articles/20080310/020944491.shtml

They use wasabi.

12
toomanybeersies 3 days ago 0 replies      
I remember seeing this for sale on BOC's website when looking for CO2 a while back (https://www.boc.co.nz/shop/en/nz/stench-gas). I briefly considered buying some for nefarious purposes, but I think I figured that they probably wouldn't just sell it to any random person.
13
rabboRubble 3 days ago 1 reply      
Reminds me of the Friends' episode where Ross goes on and on with the (bored and weirded out) pizza delivery girl about the smelly chemical added to natural gas in order to make it olfactible & safer to use.

Found it... https://youtu.be/kH5JhYsfNMA?t=1m10s

14
hammock 3 days ago 0 replies      
Same compound that is added to propane
15
__s 3 days ago 0 replies      
I think my family went to that exhibit while I was pre adolescent. I got scared so only my mother & sister went, while I stayed topside with my father. We window shopped the souvenir shop

Nowadays my sister suffers claustrophobia & I feel most comfortable shoved into small crooks. But I think I was mostly offset by anxiety related to ventilation

Visited Timmins this May, another northern Ontario city. It was snowing

23
Are Google, Amazon and others getting too big? bbc.com
249 points by happy-go-lucky  2 days ago   327 comments top 31
1
jondubois 2 days ago 17 replies      
I agree they should be regulated. The world is a better place with lots of smaller companies.

These big companies turn regular people into corporate livestock to serve the wealthy.

If you were to analyze Facebook as if it were a country, the wealth gap among employees would be atrocious - The top 1% would own maybe 99% of the wealth of the country and everyone else would earn a minuscule fraction of the total value that they produced.

If we let monopolies take over, then the economy of the world will start to mirror the economies within these large corporations.

What's worse is that the social aspects will also be mirrored. We will gradually lose freedom of speech, in the same way that employees of large corporations don't have the freedom to say what they really think to their bosses.

Many who have worked for a big corporation will know how suppressing the environment can be. I'm really glad that I live in a time when there are still alternatives.

2
tyingq 2 days ago 4 replies      
Feels like it's getting worse too. For example, things like Google Home and Alexa discourage choice. "Order me a pizza" means they are now either kingmakers in the space, or incented to open their own pizza business.

I'm not a fan of big government, but at some point depending solely on their goodwill seems dangerous.

3
marcoperaza 2 days ago 8 replies      
I am ultimately skeptical of companies that get all of their revenue from advertising and who fail to make money from sales of products. The value of online advertising is massively inflated.

Of the tech giants, Apple, Amazon, and Microsoft seem to be in the best shape at the moment. They make their money from selling real products and services to real end users.

Amazon is strong but not unbeatable. Walmart in particular, as well as a hypothetical alliance/merger of supermarket chains, are well positioned to break Amazon's dominance of e-commerce. But they will need the ambition and ruthlessness that has served Bezos so well. Few large American corporations still have the vigor and virility of Bezos's Amazon.

Microsoft (full disclosure: my former employer) too is strong but not unbeatable. All of their products are facing tough competition from Apple (in OS and hardware sales), Google (in online services), and multiple others (in business software). Microsoft's wins are hard fought and fair, and the competition never lags too much.

4
jimnotgym 2 days ago 0 replies      
RE Amazon: I think it is problematic that they are now one of the biggest marketplaces, as well as being a trader. Put simply this allows them to watch other peoples sales, and if they look pretty good on a certain product, undercut them. This could be solved by divesting, hiding the transactions nature from Amazon, or more radically, having the data in the open so everyone can use it

Re Apple: Technology comes and goes, but the iphone was a good one. The troubling thing for me is the amount of cash they are hording. If this is intended to underwrite Applepay as a new bank, then firstly they must allow open access to all technology platforms to use Applepay. You can't have a new dollar that works better at Walmart than Tesco.

Re Google and Facebook: These companies are advertisers. I have no problem with their size or structure at present. I do have a problem with using their easy cross border presence to avoid taxation. You cannot have the biggest revenue generators for advertising paying no tax, when everyone else has to. In the UK Google is headquartered in Ireland so the UK receives no tax from the billions of revenue. This is unsustainable for the country.

My real problems with Google and Facebook is they regard everything about us as their to do what they want with.

5
codefined 2 days ago 3 replies      
It does concern me when people say that the internet should be unregulated, especially given the recent vote in the US and the likely upcoming votes in the UK.

Monopolies are very easy to form on the internet, and in the interest of improving everyone's use, we need to try to avoid them. Walled gardens currently trap people into one service and limit the ability to swap between them, similar to "forcing" you to use just one company for your construction work, no matter the price.

I haven't heard a great answer to this problem yet, if one even exists. Is there a way to attempt to prevent these from forming which can be practically implemented?

6
gigatexal 2 days ago 1 reply      
Regulation only makes the largest companies that much more untouchable. Why not invest what would have been spent on regulation instead on education? That way the next pioneer could be fostered. Or invest in subsidies for health and wellness and food programs so the next Zuckerberg doesn't go hungry and can have the luxury to innovate (terrible analogy since he came from a middle class family but still). Or if you don't want to do that what about allowing foreign nationals with an idea but without capital and a safe and business friendly government to come to the States to create their businesses?
7
cmurf 2 days ago 1 reply      
Regulating them ultimately doesn't work very well because a.) it's reactive rather than proactive, so there's regulatory lag b.) it injects politics, and political wind c.) because of a and b we get inconsistency, changes in policy, this isn't good for either consumers or employees or investors.

I'm not sure what the work around is, but for sure we (Americans) do not apply anti-trust / competition law as aggressively as we should. It just seems wrong to me to allow these big companies to buy up smaller companies and then just obliterate them into nothing, not use their technologies, just destroy them by putting the patents into a vault and sue anyone who infringes but not letting anyone benefit either. They all do this to varying degrees.

It's like at a certain market value as a percentage of either global or maybe national wealth, companies should be disallowed from mergers of any kind. And at another level of size, they are required to break themselves up into pieces.

Edit: Maybe disallow hoarding patents. If after X years you're not using a patent, it either auto-expires and is relegated to public domain, or it's compulsory to sell it. Use it or lose it!

8
unityByFreedom 2 days ago 0 replies      
If you don't like their services, you have plenty of other options, one of them being that you don't need to use them at all.

On the other hand, you're locked in with your broadband ISP. If I'm going to decry some internet business, I will first point the finger at Comcast and their ilk.

9
sangnoir 2 days ago 0 replies      
If I didn't know better, I would say this is a reaction to "nouveau riche" companies. When was the last time that the BBC proposed reining-in banks or oil companies despite clear consumer antipathy? Even after LIBOR, the 2008 crisis, Deepwater Horizon and HSBC cartel laundering, no one suggested these companies were to big, outside of the phrase "too big to fail". They were punished by being bailed out or given a nominal fine, but these uppity tech companies ought to be broken up.

Perhaps they are "too big", but only because they isn't a revolving door between tech companies and the corridors of power (yet?)

10
Asdfbla 2 days ago 1 reply      
I'm surprised the EU hasn't acted against Google already. Remember when they (rightfully) went after Microsoft and forced them to offer a browser choice? And that wasn't even the peak of the Internet Explorer monopoly.

And yet it's allowed that like 80% smartphones sold in Europe come with Android versions that basically lock the user into the Google ecosystem, else you can't use the default store.

11
BenoitEssiambre 2 days ago 2 replies      
I'm not usually very pro corporate taxes. I think (with some caveats) that it is generally better to tax the owners of businesses than the businesses themselves. However, in order to counter the unfair advantages of overly large companies and promote competition (in tech, in finance or elsewhere) wouldn't it make sense to make corporate taxes slightly progressive where the larger a business is (by revenues), the higher the tax rate?

Is there an obvious flaw to this approach? Why don't I see anyone ever suggesting it?

12
someSven 2 days ago 0 replies      
If some gov dosn't like the power of those companies then the should feel free to support free software. The same goes for competitors and consumers. Regulation only in rare cases please.
13
sr2 2 days ago 0 replies      
Things like Mastodon[0] and IPFS[1] are always worth checking out, if you want to get a sense of control over your data. With regards to the argument that these companies are so entrenched in our society that they are very difficult to remove, almost like barnacles, then I agree that something has to be done. The real problem exists when there is no other choice for people. For example, the default search engine on Android phones is most certainly Google and not DuckDuckGo. Another example of terrible monopolistic practice is that Android phones are so fragmented. It seems kind of odd that in order to have the most secure Android installation, that I also have to have the latest hardware. I find it very unfair that legacy devices are locked to a single Android install and can't upgrade properly. These things should be future proof and be able to respond to threat landscapes. I feel very uneasy communicating on legacy devices because there is the uneasy feeling that the device has been infected by either low-level attackers, or nation states.

[0] https://mastodon.social/about

[1] https://en.wikipedia.org/wiki/InterPlanetary_File_System

14
whyenot 2 days ago 0 replies      
What is interesting to me is that according to the article, the five largest companies in the world (by market cap) are all now companies headquartered on the west coast of the US. What a remarkable shift in the world from the way it was just a few decades ago. We are in the midst, of a massive power shift, a revolution. I think it's hard to predict what the results of any regulation would actually be -- everything is changing too quickly.
15
seattle_spring 2 days ago 1 reply      
From the perspective of a software engineer, I would also say "yes." It's frustrating that 80% of the available positions, even in a tech center like Seattle, are at the huge mega-corporations.
16
jrnichols 2 days ago 0 replies      
Apple & Amazon and the others, probably not. They have their own markets and they're just doing well in them. Google might be a little different in that what they've done in some areas affects so many others, especially in small business communications and now into education. I'm just thinking about how kids are unaware that there is even another email provider out there because all they know is Gmail. To me, that's where things have tipped over into "kind of a problem." The Googleverse is massive, and we don't even know how much data they've collected.
17
benevol 2 days ago 1 reply      
Well, that was pretty clear more than a decade ago.

Proprietary technology has a monopolizing effect in capitalism.

Since technology by definition has an exponential growth rate of efficiency, the monopolizing effect grows with it.

18
Mendenhall 2 days ago 0 replies      
Anything "big" causes me to pause and count the concerns. The bigger any entity is the more damage they can cause. I tend to support "small" things as best I can.
19
redm 2 days ago 0 replies      
When I look at these monoliths, I can't help but think about the fabled Sci-Fi Mega Corporations of the future that seem to be anything other than positive. [1] [2] [3]

There are of course real life examples from the past.. [4][5][6]

[1] http://residentevil.wikia.com/wiki/Umbrella_Corporation

[2] http://alienfilmspedia.wikia.com/wiki/Weyland-Yutani

[3] http://bladerunner.wikia.com/wiki/Tyrell_Corporation

[4] https://en.wikipedia.org/wiki/East_India_Company

[5] https://en.wikipedia.org/wiki/Breakup_of_the_Bell_System

[6] https://en.wikipedia.org/wiki/Standard_Oil

20
rdlecler1 2 days ago 0 replies      
The problem here is that only one or two of their business lines actually make money. Everything else simply strengthens network effects and gives them optionality for new businesses. It would be hard to break up Google and say: you get to provide search for the US and another company has to do it for Europe. While that may be in the interest of Europe, it's of less interest to the US.
21
therobotking 2 days ago 1 reply      
On one hand I absolutely love Google's ecosystem and have an Android phone, use Gmail, have an nVidia Shield TV, use Android Pay, travel using Google Maps for transit every day, use Docs for work, Drive for all cloud storage needs and YouTube is YouTube.

On the other, being so reliant on one company for so much is bound to cause problems at some point.

22
therealmarv 2 days ago 1 reply      
Two words: too late.
23
jorblumesea 2 days ago 0 replies      
What's to stop the most powerful companies from using regulation to squash business competitors? Almost every industry has abused this to a certain extent. Regulatory capture is a thing, at least here in the US.

Regulations are a double edged sword and it's often used to stifle new business and crush possible competition.

24
strin 2 days ago 0 replies      
I highly recommend the book "Master Switch" by Tim Wu on this topic. (https://www.amazon.com/Master-Switch-Rise-Information-Empire...).

It argues that every information networks in the history- telegraph, telephone, radio, cable - follow the pattern of consolidation and disintegration. The new inventions always had the chance to disrupt the old industry, but our modern network - the Internet - might be an exception. Because the Internet is the master switch of all things digitized.

25
notadoc 2 days ago 0 replies      
Remember in the 90s when Microsoft was the subject of an antitrust case over bundling a web browser?
26
yalogin 2 days ago 0 replies      
Are the existing laws enough to regulate them though? The anti competition laws don't apply here as all of them are competing in the same space and all of them are huge.
27
ilaksh 2 days ago 0 replies      
Integrating technologies for both decentralization and common platforms are the answer, not more traditional government or more capitalism or more communism.
28
TheRealmccoy 2 days ago 0 replies      
yet again, one of those posts. all those people who have the ability to do something, discuss and post detailed comments and then wait for next such article, and then rinse and repeat.

what is the point of discussion, if we nothing concrete, other than rhetoric can be done?

29
esturk 2 days ago 0 replies      
No. This MAGA (Microsoft, Apple, Goggle, Amazon), is actually making American tech great.
30
anth1988 2 days ago 1 reply      
> In 2013, the European Commission fined Microsoft for giving preferential treatment to its own browser, Internet Explorer.

I don't understand why Microsoft gets fined, but Google gets a pass when they used their other products to push Chrome to a dominant position.

31
blairanderson 2 days ago 1 reply      
"Too big to control?" Uhhhhmmm I don't want to be controlled. No control necessary. Just guidance.
24
Pistol sights yarchive.net
250 points by luu  10 hours ago   96 comments top 16
1
seibelj 1 hour ago 10 replies      
Anyone who is diehard anti-gun for personal use, I recommend taking a pistol class from a reputable organization, and keep an open mind. No one is telling you to get a license or buy a gun, just go take a class. They will teach you all about safety, how to shoot, gun cleaning and maintenance, and all of the basic skills needed to properly own a gun. Then if you are still diehard anti-gun, great! But if you have no experience, then taking a day to learn more might help you understand how the other side thinks.
2
electrograv 9 hours ago 5 replies      
If you're interested in the science behind this, you may be even more interested in learning how peephole style rear iron sights almost eliminate the dual sight alignment problem of goal-post style rear sights (as commonly found on pistols).

The rear peep sight on rifles take advantage of actual "optical effects", without any glass -- much like a pinhole camera can actually magnify images without any lenses or mirrors at all.

By simply providing an arbitrarily small "aperature" you're looking through in the rear, the front-rear sight alignment problem is not only capped at an upper bound of error (defined by the peephole size and sight radius), but the actual error from front-rear sight misalignment is visually magnified and centered through a fixed viewing point, making it vastly easier to keep the actual error near zero.

So generally, to achieve precision within the (small) upper bound of error with a peephole sight, all you need to do is place the front sight post on the target when looking through the rear peep sight. Even better precision is made much easier via a sort of "peephole camera" effect through the aperature of the rear sight.

3
chrissnell 8 hours ago 5 replies      
Going target shooting is incredibly relaxing and a great break from the workday. The focus required to sight in a target and control one's breathing, arm, and finger movement is a very powerful relaxant to me and melts stress away.

I work from home and I live in the burbs so pistol or rifle shooting is not possible. However, I've gotten really hooked on shooting (of all things) my Red Ryder BB gun. It doesn't make a loud noise, it costs almost nothing to shoot, and it's surprisingly accurate for how inexpensive it is. These little BB guns have iron sights like the article discusses.

My favorite thing to shoot is little plastic bottles--particularly the ones that over-the-counter medication comes in. They're durable and make a nice popping noise when you hit them. I put them on little stakes in the back yard at about 10-15 yards and shoot at them from my deck. As I got better, I made up little games, like shooting them in a sequence and trying to get 100% accuracy. I find it easy to get back to writing code after doing this for five or ten minutes.

4
binarytransform 7 hours ago 5 replies      
Former JSOC dude here. Circumstances requiring engaging with pistols == bad day for everyone, so only a few things matter. Front sight focus (which implies maintaining equidistance from the rear sight posts), both eyes open, fast presentation, parallel grip, smooth trigger pull, reacquire, repeat as necessary. And optical sights = more things that can break / run out of batteries / fall off and make noise / etc etc.
5
danielvf 2 hours ago 0 replies      
I lucked into learning to shoot with a small weekly local group that included a future many time US National Champion, and another person who was in the top five nationwide.

Competitive pistol shooters actually use several different sight picture styles.

In the speed styles of competitive shooting, the goal is to hit targets as fast as possible, so you want to make each shot in the "worst" way that will give you about a 95% chance of a hit. So for a close, low risk target, a shooter may look only at the target and ignore the sights, for a tiniest fraction more speed.

For most targets, the looking at the front sight is correct. Shooters tend to lock their upper body into one shape, then pivot it from target to target while shooting a string. This locks the rear sight in just the right place behind the front one. When the front sight is put on target, the rear sight is automatically in the right place. It's true that the target does become blurred a little when you do this.

Then for really far targets, you do have to bring your focus back a little farther, and see and care about both sights.

The sight picture is not the only thing that changes from target to target. You usually budget the amount of time spent for each shot.

Surprisingly, many pros know where their round will hit before it reaches the target. The time penalty for missing a shot is so high that it's almost always better to take a second shot in case of a miss. However, it takes a while for a pistol shot to reach the target, and for your eyes to see where it landed (plus you'd have to change your focus to look for it, then back again to your sights). To get around that, with practice, you can know in the moment you pull the trigger where the round went, and follow it up in about a twentieth of a second with another round.

In most competitive pistol matches, the sequence of targets to be shot on a given stage is not rigidly defined. There are often plenty of constraints (this group must be shot before these) or timing related constraints in some sports (shooting this target will cause a pair of targets to pop up in 1.2 seconds). Given this, there's a surprising amount of planning that goes into discovering the optimum run. The details of each shot are then worked out and mentally rehearsed.

6
leroy_masochist 1 hour ago 1 reply      
It's also important to note for broader context that pistols, despite the number of people who take pistol accuracy seriously, are not really designed for precision marksmanship.

For the use cases that really matter, you won't be taking well-aimed shots, you'll be trying to get rounds out of the weapon in the general direction of the threat as quickly as possible, in order to buy yourself some time and/or space.

The front sight rule is not just the best aiming mechanism for the reasons of geometry described in the article, it's also the quickest way to acquire a basic sight picture under stressful conditions.

7
csours 50 minutes ago 0 replies      
> "But optical sights small and robust enough to be mounted on a pistol slide are a recent development, and are costly; very few handguns have one mounted."

This is still true, but pistol red dot sights are becoming more prevalent.

8
c517402 7 hours ago 1 reply      
Instead of using convolution to produce the imagery, I think it should be produced using fractional Fourier transforms. IIRC fractional Fourier transforms are mathematically equivalent to Fraunhofer and Fresnel diffraction integrals. Although, the convolutions look good.
9
euroclydon 5 hours ago 1 reply      
I have this little drill I do, with a iron sighted handgun or rifle. I give myself no more than 2 seconds to bring the weapon up, acquire the target a shoot. I can pay attention to the rear sights, but then I never hit anything. In this drill, I've found that maintaining a consistent body position, and only paying attention to the front sight yields the best results. I just put the front sight on the target and pull the trigger. Distance about 10-15 yards. Target is soda can.
10
ajmarsh 1 hour ago 1 reply      
There are improvements to be had in pistol sites that don't involve battery powered gimmicks. The trapezoid sights on Steyr M pistols for example. I rented one from my local range and it works well for new shooters.
11
xtreme 8 hours ago 1 reply      
I wonder if this is related to [Hyperfocal Distance](https://en.wikipedia.org/wiki/Hyperfocal_distance), a concept familiar to many photographers. Roughly, if you focus on the background (infinity), the foreground would be blurry; and vice-versa. If you focus about ~1/3rd into the scene, you'd have everything in reasonably sharp focus.

Unlike camera lenses, our eyes can't easily focus on an arbitrary distance without an object being present there. Perhaps the front sight is working as an approximation of the hyperfocal distance.

12
RUG3Y 9 hours ago 1 reply      
Near the end of the article, he mentions that some people say that it's more difficult to aim a weapon that has a shorter sight radius. Actually, I think it's more accurate to say that having your sights out of alignment with shorter sight radius will have a more dramatic effect on your accuracy.
13
cynicalbastard 9 hours ago 2 replies      
> I was told once by a proficient pistol shooter that he ignored where the front sight was on the target, and paid attention only to the alignment of the two sights relative to each other. Since he did in fact hit the target,

is the "two sights" here the rear sight which has two posts, or the two sites as in front sight + rear sight?

several pages of reading and then .. an ambiguously worded conclusion.

14
plazmatic 29 minutes ago 0 replies      
P.S.

Thank god for the HIDE option, you second amendment freaks are everywhere. Back under the bridge you go, losers.

#ImpeachTrump

15
baby 5 hours ago 2 replies      
Kind of off-topic. But I had a thought the other day: without the US we wouldn't have action movies like James Bond or FPS and other shooters video games. It's interesting to see that guns are rare in other countries' movies/discussions. Maybe FPS would all be like Nintendo's octopus thing.
16
plazmatic 31 minutes ago 2 replies      
Isn't this supposed to be a HACKERS NEWS blog? What in the hell does some article about pistol sights have to do with this?

I literally only made an account to post about how absurd and out of place this article is. If I wanted some second amendment lovers blog (and I don't), I'd simply find one.

Strike one, "hacker news". Strike one.

25
Verelox Wiped by Ex-Admin verelox.com
240 points by jonmarkgo  3 days ago   378 comments top 24
1
tgtweak 2 days ago 2 replies      
This exact thing happened to realitychecknetwork hosting about 6 years ago (now rebranded to serverstack and digitalocean).

There was 250+ dedicated servers, 2-3 weeks of restoring week-old backups (thankfully they had these weekly intervals kept offline). Mass exodus of clients.

"Ex-employee" used root keys and a boot zerofill drop and rebooted every server resulting in severe data loss. Their online backup systems were also using these keys and we're not spared.

They said they would have to shut down the company as a result, but ended up securing capital and eventually launching what would become digitalocean.

They said it was highly probable that it was an ex employee and that the FBI was investigating buy nothing was released about it.

Good cautionary tale for segregation of credentials and proper user key management.

2
treyfitty 3 days ago 8 replies      
This may be an unpopular opinion, but I want to preface this by saying: "before passing judgement, context is always necessary."

Mario Savio was a Free Speach Activist and organized a protest to protect the Freedom of Speech at Berkeley around the 60s. In his speech to protestors, he says "there's a time when the operation of the machine becomes so odious... that you can't take part... and you've got to indicate to the people in charge that unless you're free, the machine will be prevented from running at all!" Applied to free speech, this notion of disrupting the functioning of an organization was lauded, because freedom of speech is just that important.

But let's shift to employment. Without employment, it's very hard to survive. And here's a situation where the people in charge has the upper hand in every arena- hiring, pay, work Place behavior... etc. How do we know that the ex-admin wasn't blackmailed by the CEO to come back to work for free to fix something, or future references will be negative? Why are we so quick to side with the employer in this matter when we know nothing of the situation at all? Why do we start calling the employee a felon? He hasn't even been charged yet.

My point is, context is important. Fine, corporations have the power to ruin your life as a deterrent to keep you from acting against their interests, and that's just the way society is. And fine, We're not all rational at every instance of life. The calculus of establishing status quo equilibrium of those two conditions/constraints is hard, but without context to the situation, who are we to decide who's right or wrong? Would you label Mario Savio wrong for protesting and urging protestors to prevent the operation of the college from functioning in the name of preserving Free speech wrong? No, because you've learned the context.

3
yardie 3 days ago 10 replies      
So in addition to the criminal side of things I guess the ex-admin wants to work in manual labor or fast food. There is no way in hell he'd have the references or pass the background.

BTW, we had a netadmin interview a few months ago. Guy was really smart, aced the technical and group interview. We were really looking forward to hiring him, and only needed to pass a background and reference check. HR told us in no uncertain terms to run the other way. They didn't share what was in his check but it wasn't good.

4
preinheimer 3 days ago 3 replies      
Wayback Machine link if you want to know who they were:

https://web.archive.org/web/20170603212121/https://verelox.c...

5
pmarreck 3 days ago 2 replies      
This is so stupid. If you have a problem with your employer, either you quit or they fire, you move on, full stop. If you're in a relationship and someone isn't happy enough with you and breaks up with you, the dignified response is NOT to key their car. I see employment relationships mostly the same way. Either it works (for both) or doesn't (for either or both ends).

And having switched jobs quite a few times, the next one is always better for you, regardless.

6
wilhil 3 days ago 10 replies      
Other than treating staff well, how would you go about stopping something like this?

As my own company is growing, we fully trust all employees, (limiting only what is essential), but, a dev ops guy if he was so inclined could technically do something like this... It always scares me.

7
stevenh 3 days ago 4 replies      
If I ran a hosting company and all of my servers were compromised by ring -3 malware exploiting the Intel AMT vulnerability, the first thing I'd do is privately inform Intel that I intend to go public with the story and sue for damages, after which Intel would perhaps offer a very generous bribe for my silence and a week-long window to replace all of the server processors for free, on the one condition that I bury the truth by fabricating a story about an imaginary ex-employee who improbably was both smart enough to gain an administrative position in a large company while also being stupid enough to risk decades in prison for petty revenge over workplace drama.
8
yangtheman 3 days ago 7 replies      
Proper exit procedure should have disabled all access from this ex-admin..., unless s/he had some sort of cron job or launched some process that would execute commands at certain time? I am very curious to know how it was done.
9
bobbob1921 3 days ago 1 reply      
Lots of comments are interpreting "ex-admin" as someone who was fired and then after went and did this. Just want to float the possibility that "ex-admin" could also mean someone was employed there, then did this and is now no longer employed as a result of doing this.

(Btw, IMO there is no excuse or justification for any admin or exadmin to ever do this. Among many other issues is the fact he deleted the data/work of individuals who had nothing to do with whatever "problem" he has with Verelox )

10
tw04 2 days ago 2 replies      
It's always interesting watching startups learn the lessons that thousands of enterprise learned along the way. "Why would you ever want offline tapes sitting in iron mountain, how inefficient".

Nothing is foolproof, but anytime you've got constant network access to every last copy of your data, you're begging to lose it. It's the reason why people who think one copy (redundantly dispersed or not) in AWS S3 is sufficient scares me to death. Is it unlikely Amazon would get hacked and have the entire thing blown up? Sure... but if we go to war with China I wouldn't want to bet my company on it.

11
pavement 3 days ago 2 replies      
I would expect to see some kind of police report, and prosecution of an individual charged with a crime, no?
12
jldugger 3 days ago 2 replies      
Been waiting for a company to announce shutdown after this was posted: https://news.ycombinator.com/item?id=14476421

Possibly related?

13
zokier 3 days ago 5 replies      
Wiped by ex-admin, or by the ineptitude of current admins that can't maintain proper exit procedure?
14
jacquesm 3 days ago 0 replies      
This is why you have the backups stored under a different account than the primaries and you make sure that nobody has access to both accounts.
15
CM30 1 day ago 0 replies      
This is why a hosting company needs to both segregate credentials to only what an employee needs for their job, as well as to revoke them the minute they leave the company.

Otherwise while the vast majority of your staff will be decent people and not cause problems like this, it just takes one angry ex staff member with a grudge to cause problems.

They also need to revise their backup system too. There should rarely if ever be a risk that any data is 'unrecoverable', yet their update says some data will just be impossible to get back.

As for the employee involved... well I hope they like the inevitable lawsuit their selfish, stupid actions will bring them. I don't care what you think of a company you worked for, there's no excuse to destroy their business through actions like this. Also, good luck getting any jobs in the industry after too. Because with this on your track record, no one will touch you with a ten foot bargepole.

So yeah, what a disaster all round.

16
cannonpr 3 days ago 0 replies      
A lot of 'managed' hosting providers are pretty bad with security, there still is a major provider that just gives root credentials to all servers to all techs not just admins, doesn't audit who accesses which credentials, and doesn't rotate credentials, doesn't rate limit dumping credentials...That's before we go into more interesting issues with their security.Frankly I am surprised this sort of thing doesn't happen more often ? In some ways it both restores some of my faith in people while reducing some of it at the same time in a different vector.
17
keithpeter 2 days ago 0 replies      
https://www.lowendtalk.com/discussion/116329/what-s-up-with-...

Some posts from Verelox staff towards bottom third of this forum page search for user name Verelox

18
quicksilver03 3 days ago 0 replies      
The thread title should be changed to "Verelox allegedly wiped by ex-admin": we only know one side of the story.
19
ceejayoz 3 days ago 1 reply      
Yooooowch. They appear to be VPS and dedicated host.
20
gaius 3 days ago 1 reply      
Who even knows it was an ex-admin? Could be the current one fat-fingered it and is trying to shift the blame! We just don't know.
21
svakacast 3 days ago 1 reply      
Anyone of us know what is the best way to get refunded? My Company lost 20.000 for this joke.
22
antfarm 3 days ago 0 replies      
I wonder whether the ex-admin was already an ex-admin at the time he wiped the servers.
23
kashif 3 days ago 2 replies      
Use Vault from Hashicorp where possible.
24
Sir_Substance 3 days ago 3 replies      
Dick move from the ex-admin, but I'm curious to know what would compel an ex-employee to take such a brazenly criminal and traceable yet damaging action.

I'd like to know more, I think...

26
Uber CEO Kalanick likely to take leave reuters.com
221 points by pdelbarba  22 hours ago   145 comments top 25
1
yladiz 21 hours ago 1 reply      
I'm in no way a fan of Uber, and I have a hard stance on not taking it anymore due to the company's actions in the past, but I really wish his possible leave of absence wasn't spun as a result of the investigation done by Holder, at least not majorly. I would imagine him taking a leave of absence may be much more due to his parents boating accident where his mother died and his father was seriously injured, and while the investigation may play a role in his stress, from my understanding the board is in support of Travis and he has major voting rights in the company anyway, so he can't just be forced to leave.
2
xbeta 21 hours ago 2 replies      
For someone who recently lost a mother and still have a badly injured father. This is totally understandable regardless whether he is a CEO of Uber. For a regular employee, he could request for a sabbatical. But as a CEO, that's difficult given there is no CFO, CMO, COO existed.
3
WisNorCan 21 hours ago 6 replies      
Assuming this is actually true, this tweet [0] captures the unusual state of Uber right now "Uber no longer has a COO, CBO, CFO, CMO or SVP of Eng and may temporarily not have a CEO. From autonomous cars...to autonomous company." And there have also been reports about the CTO being asked to leave [1].

[0] https://twitter.com/hemal/status/874300172330647552

[1] https://www.recode.net/2017/5/16/15616024/uber-sexual-harass...

4
nugget 21 hours ago 1 reply      
If my mom had just died in an accident and there was a friend in place who I trusted to take over and mind the store while I went and rebooted my soul for a few months, I'd probably take leave too. Seems like it's likely a net positive for Uber in the long run.
5
niuzeta 20 hours ago 2 replies      
I'm no fan of Uber(Interesting how many of comments either start off with this sentiment or include it at some point of time), but as a human being, I can't help but feel sympathy for Kalanick for his situation.

Looking at some comments that treat this as a comeuppance of a sort is disturbing[1]. We really shouldn't use anthropomorphization of a company to justify inhumanity in us.

[1] and I'm seeing those comments being flagged. Very good.

6
redm 21 hours ago 6 replies      
In general, I'm glad Uber is getting their comeuppance, with all the shady things they've done, they are overdue.

On a personal note, having worked for a period with Travis at RedSwoosh, I think he's getting the raw end of this deal. He's a really great entrepreneur and a nice enough guy. He pushes hard but and plays to win; as the CEO, he's getting an inordinate amount of fallout from these issues. I would say he's not the root cause of the issues but he is the root cause of Uber's success. Uber will not be the same without him.

7
blacksqr 19 hours ago 0 replies      
In all this brouhaha, will Uber ever bother either to confirm or disprove Susan Fowler's original anecdotes?

Validating her word and her integrity would go a long way toward showing Uber is serious about reform. Otherwise, it seems like they are simply taking another very roundabout path to silencing a woman.

8
ProfessorLayton 21 hours ago 2 replies      
I'm curious to see what'll happen to Uber's governance structure when they finally burn through their cash hoard. At their current burn rate, they'll have completely exhausted their cash hoard within 10 quarters [1].

Due to TK and his buddy's supervoting shares, he may be able to withstand his oust, but only while there's still money in the bank.

I can't see them being able to raise money on founder-friendly terms again after all this turmoil. Indeed this may be the only way to remove TK's grip on the company, or even altogether.

[1] https://techcrunch.com/2017/05/31/ubers-head-of-finance-is-o...

9
naturalgradient 21 hours ago 1 reply      
Regardless of what specific reasons he has or hasn't for accepting this move, this is fascinating from an organisational perspective.

With a significant part of senior leadership replaced, what will happen to Uber's work place culture? As in, can culture in such a large organisation be changed top down? Are there any examples where an organisation has changed on a short time scale?

I am thinking of the Ballmer/Nadella transition but in my (outsider) perception it took years for Microsoft to be viewed differently as a company. There is also an aspect of bringing in an outsider versus letting an insider take over.

10
flinty 20 hours ago 2 replies      
Its sad how very few if any news orgs will mention his recent loss of his mother and serious injuries to his father in a boat accident as a potential cause for taking a leave of absence.
11
williamle8300 19 hours ago 1 reply      
Note the article: Kalanick has "super voting powers." The board didn't put him on an involuntary vacation. He put himself on a vacation to avoid the fallout from the leaked email[1]

1. https://www.recode.net/2017/6/8/15765514/2013-miami-letter-u...

12
jimjimjim 18 hours ago 0 replies      
Terrible company. but the money people will have too much invested to just let it die.

So this will probably happen:

Clear the decks

Put someone boring in charge

Lie low for a while + submarine mode

Resurface

Announce some new interesting thing

Charm offensive

Carry on.

I say the taint is still there, drive the stake in and add holy water.

13
kafkaesq 20 hours ago 1 reply      
Chief Executive Travis Kalanick is likely to take a leave of absence from the troubled ride-hailing company, but no final decision has yet been made, according to a source familiar with the outcome of a Sunday board meeting.

Where "is likely to take a leave of absence", in this context, is shorthand for "has grudgingly agreed to resign as soon as we can find a replacement -- which, believe us, we intend to do as soon as humanly possible. But we'll in the interim call it 'taking leave' to soften the overall business impact -- and of course to at least attempt to staunch the exodus of the best and brightest of our employees, no doubt already in progress."

14
losteverything 18 hours ago 0 replies      
Imo there has not been enough time for a thorough report (since Feb). Investigations of an entire company take a long time, especially if sexual harassment is investigated. I wonder how deep into the organization the investigators solicited input? Did Joanne and Joe Schmo get interviewed?

How about any customers or contracted employees?

But- uber hired the advice, a point I need to remember

15
trhway 19 hours ago 0 replies      
giving a bunch of people departing - involuntarily or supposedly not - right now, what happens with their options, ie. do they get a [sweet] deal on it (one can see how loosing potential multiple [tens/hundreds] millions may possibly put them into litigious and/or talking mode otherwise)? If i remember Uber didn't allow for secondary market transactions, and given the valuation i don't think anybody would be able to afford (or believe in Uber's current valuation strong enough) to pay that size of AMT on their own. On the other side, giving deal to the ones who is supposedly being punished for bad behavior - that wouldn't send a good signal either.
16
baq 20 hours ago 0 replies      
There comes a time when one must take a position that is neither safe, nor politic, nor popular, but he must take it because conscience tells him it is right.
17
rtx 20 hours ago 0 replies      
How to lose $70 billion.
18
mifreewil 17 hours ago 0 replies      
This is why you don't wait to go public.
19
adventured 17 hours ago 0 replies      
Reading this thread, and the hundred other threads on HN about Uber over the years, I can hardly believe how many people don't understand basic business concepts that are preventing other companies from easily taking Uber's crown.

If it can be done as easily as so many in this thread are claiming, then why aren't you a billionaire? (oh I know, you just don't want to be)

It's a repetition of the same things I read on HN when it became obvious that Facebook was going to be a social monopoly. Fantasy: it's easy to clone Facebook, it's really not even that complex, someone should build an open competitor that the public will reject in every way and never want to use. The same was frequently said about Twitter as well, countless clones were attempted, zero succeeded. And it's dramatically harder to successfully replicate & compete with Uber than Twitter.

There are in fact numerous switching costs and extreme barriers to entry, that prevent competitors from just rising up and taking Uber's position as king. Otherwise there would be a dozen Ubers in the US, all vying to be multi-billion dollar companies, making their founders billionaires, and yielding huge returns for VCs.

21
mabbo 20 hours ago 3 replies      
He might be a good guy, but he's running a company like a sociopath and breeding a toxic environment. A company's culture and reputation are a reflection of the person or people at the top.

He either needs to legitimately fix the problems or stand aside and let a better leader do it.

Edit: For the record, I'd much prefer to see him do the former than the latter.

22
overcast 20 hours ago 1 reply      
It's been an incredible journey!
23
zajd 21 hours ago 2 replies      
24
throwawayhf 21 hours ago 2 replies      
25
Myrmornis 18 hours ago 1 reply      
Without claiming expertise regarding the company, I disagree fairly strongly with the attitudes commonly expressed towards Uber in the media (I read the Guardian and NYT mostly), on Hacker News, and elsewhere in the mostly liberal sources I am exposed to. Here are my reasons:

1. The Susan Fowler workplace sexual harassment claims were horrific and sounded true. So it does sound like there are some complete dicks working there. If the CEO was party to this stuff then I'm wrong, but I assume he wasn't.

2. The hatred for the CEO is surely exaggerated. The video of him in the cab with a customer was fine, it was a good robust conversation -- towards the end both parties became annoyed. Perfectly normal behavior. He sounds nice enough to me from the words of his that I've read. Obviously you don't take CEOs that seriously; they're entire job is to place inane positive spin on their company every day that they wake up.

3. The Guardian and NYT so obviously have the knives out for the company that it's become laughable reading their coverage.

4. His mum just died in a tragic accident and people are not even mentioning that in stories about him taking time off.

5. It's become common for people to say stuff like "they're not contributing anything novel", and otherwise completely underestimate the wonderful transformation that they have effected in personal travel and efficient usage of cars.

6. Young American liberals have become so annoying about political correctness causes such as workplace sexual politics that I have really come to hate that aspect of working in America and I am inclined to support Uber just to annoy them (being honest here, I didn't claim my post would be appreciated).

7. The sight of Bernie Sanders-supporting liberals earnestly trying to improve the world by choosing one silicon valley start-up over another would be funny, if the failures of the left weren't so depressing at this time when we need a grown-up left more than ever.

27
Signal intelligence 101: SIGINT targets satelliteobservation.wordpress.com
176 points by vinnyglennon  1 day ago   9 comments top 5
1
dforrestwilson1 1 day ago 2 replies      
A good primer, but more like SIGINT 101 CIRCA 1970. No mention of China, Iran, North Korea, or the use of SIGINT against terrorist or insurgent networks.
2
sr2 1 day ago 0 replies      
"Your emails may not be as private as you think". When has email ever been private? Even if you're using PGP there is still the issue of metadata leaks and people who don't understand PGP and reply with the unencrypted text in the reply (botching your attempts at secure comms). Not to mention people storing their whole life in a single email account and making it easier to build up a dossier of the person over time.

https://satelliteobservation.files.wordpress.com/2017/05/ech...

3
russtrotter 22 hours ago 0 replies      
Fascinating read, but i'd be lying if the old Unix nerd in me initially thought this was about signal(3)
5
tapatio 1 day ago 0 replies      
Cool historical read. Thanks.
28
Comdb2 Bloomberg's distributed RDBMS under Apache 2 github.com
238 points by Callicles  3 days ago   65 comments top 9
1
Scaevolus 3 days ago 1 reply      
Reading through their VLDB paper [1], Comdb2 appears to be a moderately scalable (up to dozens of nodes (?)) RDBMS with a strong emphasis on consistency and availability. Benchmarks show numbers comparable to Percona XtraDB (MySQL with a different storage engine), at ~2,000 writes/s and 2,000,000 reads/s against a 6 node server cluster. High availability and global sequencing is provided by using GPS clocks, similar to Spanner/Truetime.

Schema changes happen lazily, with old rows being rewritten on the next update, and a background job doing bulk rewriting.

Scalability: "While reads scale in a nearly linear manner as cluster size increases, writes have a more conservative level of scaling with an absolute limit. The offloading of portions of work (essentially all the WHERE clause predicate evaluations) across the cluster does help scale writes beyond what a single machine can do. Ultimately, this architecture does saturate on a single machines ability to process the low level bplogs."

This doesn't provide the horizontal scaling that Spanner does, CockroachDB aims at, or FoundationDB presumably has.

[1]: http://www.vldb.org/pvldb/vol9/p1377-scotti.pdf

2
macdice 3 days ago 1 reply      
Some assorted interesting points:

* optimistic concurrency control (sometimes you need to retry, but often the optimism pays off)

* serializable transaction isolation (something like but not exactly like ssi, rather than 2pl)

* ieee 754-2008 decimal floats

* undo-based mvcc (writers don't block readers)

* group (network) sync replication

* paxos based failover

* lua stored procs

Interesting technology and I'm very happy to see it open-sourced. Kudos to the team. (I used this when I worked there. Few firms can pull off something like this in-house; they could. You wouldn't believe how much data they store in this thing.)

3
NickGerleman 3 days ago 15 replies      
This is really cool but I'm curious why Bloomberg would need this. Ie, what special needs does Bloomberg have that would lead to a primarily non-engineering company investing the resources to create this. Was there nothing off the shelf that would have fit their needs?

I don't mean that in a derogatory way, I'm just curious what motivated making this.

4
boxfish 3 days ago 1 reply      
What's the motivation for Bloomberg to open-source this?
5
nodesocket 3 days ago 2 replies      
Somewhat annoying you have to copy data to nodes manually:

 copycomdb2 mptest-1.comdb2.example.com:${HOME}/db/testdb.lrl
This sort of stuff is why I loved RethinkDB. They handled all these complexity details for you.

6
gleenn 3 days ago 1 reply      
Nice they have a JDBC driver... makes it a lot easier to hook into. After looking at all the C++ jobs on Bloomberg's website, makes sense the schema format looks C++ish.
7
ihenriksen 3 days ago 2 replies      
I see Comdb2 requries SQLite to install. So, I'm guessing Comdb2 is a distributed storage engine for SQLite, or?
8
brian_herman 3 days ago 0 replies      
Neat! It supports wsl! Even better! O_o
9
shusson 3 days ago 0 replies      
I wonder how this compares to CockroachDB
29
Amazon sues former AWS VP over non-compete deal geekwire.com
208 points by mindhash  1 day ago   143 comments top 26
1
Twirrim 1 day ago 4 replies      
Amazon's non-compete is overly broad and sweeping, and arguably stops anyone from going to a company that even uses cloud technologies. It's written in a way that allows the court to decide just how far it can actually be applied.

As you'll notice from the article, Amazon seems to try to enforce the non-compete every few years, I'm guessing mostly as a message to existing Amazon employees. All I've every seen it do is piss off their employees.

That said, it's totally possible to leave Amazon and move on to an actual competitor. You just have to get lawyers involved. Oracle's Bare Metal Cloud org, that I work for, is made up of roughly 75% ex-aws staff (Amazon has been hemorrhaging staff to Oracle because better pay, and way better working conditions)Lawyers on both sides end up negotiating back and forth and you just end up not working on anything related to what you were working on for AWS.

2
jimbokun 23 hours ago 3 replies      
"Last year, an attempt was made to pass legislation that would have banned non-compete agreements in Washington state, but the bill stalled after business groups, including the Washington Technology Industry Association and the Association of Washington Business, opposed the bill."

This is a perfect encapsulation of political reality in 21st century USA.

Corporations run every aspect of our government, no one else has a meaningful voice.

3
driverdan 1 day ago 3 replies      
This is nothing new. Amazon has attempted to enforce their non-compete clauses again and again, often losing but causing financial burdens on the individuals and their new employers. Just another reason why you shouldn't work for Amazon.
4
Bedon292 1 day ago 4 replies      
I recently changed jobs, and feared my old employer could (but not necessarily would) come after me for non-compete. So, first my new Employer's lawyer looked over everything and said I should be good. Then I hired my own lawyer, to do the same thing (and look over the new employers docs as well) just to cover myself independently. And finally I got in writing that my new employer would cover any legal action pursued by my old employer, just in case.

I would highly recommend the same to anyone else. Absolutely worth the time and money to be safe and covered if you still live / work somewhere they are enforceable.

5
wyc 1 day ago 3 replies      

 When we looked at their offerings and what Smartsheet does, it is two totally different worlds, said Mader. Using Amazons logic, Mader said that Smartsheet would be a viewed as a competitor to Amazon Prime because both services make people more productive.
If this interpretation is correct (take with salt as it comes from the defendant's side), then it sounds like an attempt to debar this person from working on any technology at all.

6
bla2 1 day ago 3 replies      
Certainly makes Amazon a less desirable employer for me.
7
dbot 23 hours ago 2 replies      
Non-competes are tricky: they essentially try to extend trade secret protections to information that people know (which is hard to track), instead of information that's written down (which is easy to track, see Waymo). It seems most people on HN are fine with protecting the latter, but not the former.

In my opinion, a non-compete is something that needs to be separately negotiated and compensated, rather than lumping it into "employment." If you agree to a non-compete, you are paid $X in exchange. If you violate the non-compete, you must pay $X back (and there could be a negotiated multiplier, e.g. $3X). In the absence of agreement, the legal default should be 1:1. If you are paid nothing for a non-compete, it is unenforceable. If you are paid $1, you must pay $1, and so on.

This gives each side an opportunity to value and agree upon the non-compete apart from the job itself. Eventually, most industries would settle on standards.

8
drawkbox 18 hours ago 0 replies      
Non-competes... anti-worker, anti-innovation, anti-freedom, anti-competition, anti-freemarket, anti-independence, anti-entrepreneurial, anti-business (to the ones wanting the skilled labor not the ones the employee left because it is a free employment market) and fully anti-American.

Non competes treat employees like they have no value and are mere slaves or sharecroppers.

I especially like the ones where you have a contract that is for 3-6 months and they want a non-compete for multiple years.

How about this, if a company really wants a non-compete, then make sure they are paid fully above salary, otherwise this is just ownership of skilled labor.

9
rpazyaquian 1 day ago 6 replies      
So, random question: if you end up interviewing for Amazon at some point, is it a faux-pas to bring up legal troubles and controversial issues like this while speaking to your interviewers? Is it a bad idea to bring up (for example) this non-compete behavior on the part of the company when negotiating, or should you keep quiet about it?

This seems like the sort of thing that should give someone pause when interviewing with Amazon for a job.

10
christophilus 18 hours ago 0 replies      
Non-competes really should be illegal. I have a friend who is a doctor. He is being forced to sign a non-compete for a 12 mile radius and 2 years.

The irony is that his boss is forcing this on them because she quit her job and brought a bunch of her former coworkers with her in order to start her business, and she doesn't want anyone to do the same to her.

What it means is my friend essentially can't find another job without either:

A. Moving (which is not an easy choice if you have a family) or

B. Subjecting himself to a significantly increased commute

This means his current employer can essentially take advantage of him, as she knows he won't be going anywhere unless the situation becomes truly unbearable.

11
TSiege 1 day ago 1 reply      
(Pipe)Dream scenario this gets challenged and ends up in the supreme court and non-competes as a practice are ended completely.
12
iamleppert 21 hours ago 1 reply      
I've heard nothing but bad things about working at Amazon. They may have an amazing (technically) company and are winning in a lot of ways, but at what cost?

I'm often hit up by Amazon recruiters and I've talked to a few before and got the sense (just by their tone) its not some place I want to be working. They also were deceptive in their recruiting tactics.

13
bhouston 1 day ago 1 reply      
That is sort of dumb. I can more understand if he went to Google Cloud or Azure, but this is a very very broad usage of a non-compete clause. They are setting themselves up to lose I think.
14
PKop 23 hours ago 5 replies      
Non-competes enforced in this way certainly seem unfair to employees.

But let's talk this through. Assuming we all agree we don't like them, what's the alternative? There seem to exist obvious negative consequences of them not existing in any form.

Wouldn't large companies such as Google, Amazon etc be able to poach any employee of let's say a startup competitor, by simply paying way more, therefore being able to steal ideas, technology, etc?

Or even amongst (well-capitalized) companies of any size: a free-for-all for employees within industries, good or bad? Maybe not so bad actually.. what say you?

Seriously asking because I'm trying to envision the positives and negatives of them being outlawed..

15
coredog64 1 day ago 1 reply      
How does Washington state still allow non-compete agreements?
16
comice 23 hours ago 1 reply      
Vendor and now employer lock-in - always innovating!
17
simonebrunozzi 10 hours ago 0 replies      
I remember Gene. We worked together on a demo for the launch of AWS Workspaces, back when I was a Tech Evangelist. Unfortunately, at the last moment we couldn't present it at re:Invent. Can't disclose much else (unless you buy me a good espresso in SF).

I don't like non-compete agreements. They are now far away from their intended purpose. It's wrong to point fingers at a single company, though - the entire sector suffers from this.

18
mankash666 22 hours ago 0 replies      
Federal courts need to set nation wide standards on these unfair practices. It's 2017, but we still allow companies to routinely violate free will - a basic human right!
19
jokoon 19 hours ago 1 reply      
I don't understand how non compete deal are even legal. I thought competition was good in the economy...

I mean wouldnt both conservatives and liberals agree?

20
bsamuels 23 hours ago 2 replies      
if you move from washington to a state where non-competes are unenforcable, can amazon still sue you?
21
CobrastanJorji 18 hours ago 0 replies      
> This feels more like a general bullying behavior that you usually see from legacy Day Two companies.

Ouch. Going right for the Amazon jugular right there.

22
devy 22 hours ago 0 replies      
Anecdotally, I've heard that non-compete agreements are very hard to be enforced in some states (e.g. NY) due to the burden to prove damages.
23
outside1234 22 hours ago 2 replies      
at this point, why would anyone work for Amazon?
24
briankwest 22 hours ago 0 replies      
This is one thing Oklahoma got right, A non-competes is not enforceable except in a couple of narrow instances.
25
kmicklas 20 hours ago 0 replies      
Amazon employees should organize, strike, and get these non competes mass nulled.
26
cafard 1 day ago 1 reply      
Very odd.
30
Apple Is Trying to Make iMessages More Private vice.com
177 points by bipr0  2 days ago   110 comments top 17
1
yalogin 1 day ago 3 replies      
I see a lot of complaints about closed code. That is the first thing that people bring up with Apple and security. But how is open source changing things here? No company open sources their server side components. Even if Google released their server code we have no confirmation that they deploying the same code on their servers. They are not vouching for that. We have a company here that really seems to want to do good on security and privacy. Immediately going to the closed source argument is just lazy and not helping.

Of course the good part about a crowd is all views come out and so th closed source thing has its place but we should atleast give them their due and some kudos. We know people will try to evaluate the implementation and see what happens. In this case it's just a PR article. Let's wait for them to release detail and see if it stands out. May be the protocol is enough to give us confidence that their claim is true. We don't know yet.

2
voidmain 1 day ago 1 reply      
We don't have to speculate how Apple could possibly handle account recovery without entirely sacrificing security, because it's spelled out in their iOS security whitepaper: https://www.apple.com/business/docs/iOS_Security_Guide.pdf

TL;DR: Keychain recovery relies on a cluster of hardware security modules to enforce the recovery policy. After 10 tries to guess your PIN, the HSM will destroy the keys. Apple support gates all but the first few of these tries. The paper also implies that you can use a high entropy recovery secret as an alternative, though I can't figure out how you would enable that.

This seems like a pretty reasonable point in design space to me. Of course, you are relying on Apple's trustworthiness and competence to implement this design. But that is true without recovery, since the client software is also implemented by Apple.

3
tptacek 1 day ago 5 replies      
iMessage is fine. Don't use it deliberately.

For secure, private messages, your sane current options are Signal, WhatsApp, and Wire. Signal is the best option, but you're going to make some UX sacrifices for security. WhatsApp and Wire are extremely comparable. If you worry about implementation or operational security flaws, WhatsApp has the Facebook security team behind it, and a long-term relationship with OWS; no cryptographically secure messenger is better staffed. If you're worried about Facebook seeing your metadata, which is a sane worry, Wire is approximately as slick and usable as WhatsApp with mostly the same underpinnings.

Regardless of the underlying cryptography, in the absence of a well-reviewed published crypto messaging protocol, iMessage is basically just an optimization over SMS/MMS. It's great for that, but it shouldn't be anyone's primary messenger.

4
abalone 1 day ago 1 reply      
The headline is misleading. There are two features here, iMessage syncing and iCloud device backups. All Apple has announced is better iMessage syncing with no change in (already maximal) privacy. There's no indication that Apple is going to stop backing things up the way they do now, which is not maximally private but is capable of surviving a forgotten password, which is probably a good default setting for consumer backups.

If Apple has changed backups to function in a more private manner, then they would announce that, not something exclusive to iMessage.

More detail: iMessage syncing has always been maximally private from day one. However a drawback to the current implementation is that new devices cannot sync message history. The reason is that each message is encrypted separately by senders for each currently registered device for the receiver. And yes that means if you have 3 devices on your iCloud account, whenever someone sends you an iMessage, 3 separately encrypted copies get sent. Apple has gone to great lengths to ensure that private keys are never shared by devices.

So what's new is apparently Apple's figured out a way to sync history via iCloud. I'm interested to hear the implementation details, but there can be no doubt that it still respects the design goal of never sharing private keys.

Now, the privacy goals for backups are different. You obviously want them to be as private as possible, but most people generally want to be able to recover their life in the event of a simple forgotten password. There are certainly scenarios where you want to encrypt your backups, but it always should be an informed, opt-in choice. You should clearly be aware that if you forget your password, you lose your backups. So generally it's desirable to default to having a fallback recovery method.

Like I said earlier, if Apple has figured out a fallback recovery method that somehow does not involve storing your data in a manner they can decrypt, that would be something they announce as part of iCloud Backup... not just for iMessage. But it seems almost a fundamental design constraint. You can either have something impossible for anyone else to decrypt or conveniently recoverable backups, not both.

5
ec109685 1 day ago 2 replies      
The question is whether Apple will allow recovery if you lost all your devices.

If they don't, I don't think it is that hard for Apple to extend their current security model to iCloud. They currently rely on senders encrypting messages with each destination device's public key, so they can store the individually encrypted messages separately in iCloud.

When a new device arrives, they could have an existing device perform re-encryption of the messages for it (after the user authorizes that the device should be added).

Even without the new iCloud functionality, Apple has always been in control over the key exchange, which would allow a malicious employee / government to write code that could add a new authorized device/key silently and thus allow Apple to eavesdrop from that point on in future conversations.

6
tsunamifury 1 day ago 3 replies      
Except of course via Chinese access to the unencrypted cloud as required by their laws. Who as we've seen this week, is willing to sell to anyone.
7
amelius 2 days ago 2 replies      
Sounds great. But how do we check if what they say is true?
8
WA 1 day ago 1 reply      
Good. Only problem: iMessage is useless in Germany, where Android market share is at least 70% or so and 95% of my friends use WhatsApp.
9
notadoc 1 day ago 1 reply      
What if you could enter a special private iMessage chat with someone where to decrypt and read/reply the participants had to verify each message with Touch ID?

Good or bad idea?

10
likelynew 1 day ago 2 replies      
Has there been any known exploit(by government or any other actor) that worked by exploiting advanced cryptography. I feel using a zero day is more easier way for exploiting anything. Also, there are limited ways in which one can exploit cryptography, unlike zero days for which there is a free market and continuous supply.
11
jakob223 1 day ago 5 replies      
What's to stop apple from registering another device on your account, which will get the shared keys?

color me skeptical.

12
dsacco 1 day ago 0 replies      
A few thoughts I have after reading the article:

> "Our security and encryption team has been doing work over a number of years now to be able to synchronize information across your, what we call your circle of devicesall those devices that are associated with the common accountin a way that they each generate and share keys with each other that Apple does not have."

> It's unclear exactly how Apple is able to pull this off, as there's no explanation of how this works other than from those words by Federighi. The company didn't respond to a request for comment asking for clarifications. It's possible that we won't know the exact technical details until iOS 11 officially comes out later this year.

> Meanwhile, cryptographers are already scratching their heads and holding their breath.

This might be uncharitable, but in my mind I think this writing and presentation of facts (probably unintentionally) implies that this capability is novel, when it's not. Sharing keys between multiple devices is a straightforward issue if you're willing to make user experience trade offs. Cryptographers are not scratching their heads wondering how Apple could achieve E2EE with a network of devices, they're wondering how they did it without sacrificing account recovery. It's not clear to me that readers would automatically understand this, because the real head scratcher isn't addressed until near the end of the article, which brings me to my next point:

> "The $6 million question: how do users recover from a forgotten iCloud password? If the answer is they can't, that's a major [user experience] tradeoff for security. If you can, maybe via email, then it's [end-to-end] with Apple managed (derived) keys," Kenn White, a security and cryptography researcher, told Motherboard in an online chat. "If recovery from a forgotten iCloud password is possible without access* to keys on a device's Secure Enclave, it's not truly e2e. It's encrypted, but decryptable by parties other than the two people communicating. In that sense, it's closer to the default security model of Telegram than that of Signal."*

I'm hesitant on how much faith to put in Apple's scheme here. On the one hand I generally trust Apple very highly when it comes to security and cryptography in particular. On the other hand I don't see them making account recovery impossible.

However, over the past few years they have been increasingly pushing two-factor verification, and then full two-factor authentication based on a network of trusted devices. The iCloud password used to be enough to manage the account's security and trust, but now it frequently defaults to requiring authenticated approval from a trusted device (instead of e.g. security question responses).

I could see Apple abandoning conventional account recovery if they keep proceeding down this path by providing a huge amount of access redundancy. For example, they could keep redundant copies of all user data synced in iCloud which are respectively end-to-end encrypted on the client with a user's backup keys. Each authenticated user device might have 10 backup keys, with a typical warning that they should be written down and will not be displayed again, etc. The keys could be downloaded from the device and stored by the user but never given to Apple, and would primarily be useful in circumstances where a user only has one trusted device authenticated to iCloud. Then if a user loses primary access to any given Apple device, the user has two ways to recover data:

1) Authenticated approval from another of the user's trusted devices, or

2) Use the backup keys, which do not provide a method of changing the account password, but which instead decrypt the redundant user data corresponding to the key.

The basic idea is that removing conventional password-based account recovery required inordinate redundancy to counter usability loss; you can do this with redundant authenticated devices (each with their own keys), or you can simulate it on one device with redundant keys that are ideally harder to lose.

13
repler 1 day ago 0 replies      
Why is Vice so excited to write this article, with this headline, and then provide absolutely no details:

> It's unclear exactly how Apple is able to pull this off, as there's no explanation of how this works other than from those words by Federighi.

All Apple says is "end to end encryption". From your phone to the cloud is 2 ends, and then from the cloud to the FBI is 2 more. Yay!

14
mlosapio 1 day ago 0 replies      
If you encrypt your iCloud backups isn't the whole concern moot anyway?
15
EGreg 1 day ago 0 replies      
The trade-off is that if you lose your keys, you're shut out.

I would recommend having an option to generate keys based on something you have and something you know that you won't easily forget, such as a passphrase. That way you can always recover them later!

16
mtgx 1 day ago 0 replies      
First priority to make iMessages more private: disable iMessages by default when iCloud sync is enabled, or at least give users the option to have iMessage backup disabled when iCloud sync is enabled.
17
520794 1 day ago 1 reply      
With true end-to-end encryption there is no need for a middleman.

Each user

1. encrypts her data at the source i.e. on her own computer and

2. sends the encrypted blob over the untrusted network, or so-called "dumb pipes".

Hardware company that makes the users computer tries to dictate whether and how #1 can be done.

Not necessary.

The software for doing #1 does need to be open source.

On mobile, does such software even exist?

And even if it does, is a mobile phone really the users computer? It is an effectively locked enclosure with several computers controlled by third parties.

The way to do secure mobile messaging would be to encrypt the message on a computer the user controls, then move the message to the "mobile phone" and then send to the untrusted network.

Alternatively, do not use a mobile phone for messaging if worried about others have access to the messages. Wait for a pocket sized portable computer that can be tinkered with. No baseband, etc.

       cached 13 June 2017 15:11:01 GMT