Like another poster mentioned, I use Orion on my iPad with ublock origin installed as an extension.
It’s a really great browser, only a few bugs here and there.
We did sailing charters growing up and had one of these on the boat, I was in charge of it and the sound & feel of the CH-CHUNK is seared into my memories like nothing else. We never got any declines, but I always wondered how that reconciliation process actually worked out.
We never got any declines, but I always wondered how that reconciliation process actually worked out.
IIRC, the merchant gets paid if hitting a credit limit or similar decline reason. The card holder then gets hit with a financial penalty (usurious interest rates, or extra charges). If the card has been stolen, it ends up in a big phonebook-like book for offline use (otherwise the merchant just called it in for big purchases).
I remember buying books at a shop in Denver in the late 80s and watching the proprietor look to see if my card was in the big book of stolen credit cards numbers before he ran my card through the kachunka machine.
You didn't get any declines because you didn't ask for any approvals :)
If you mean chargebacks: I believe imprinters had card issuer liability for the longest time, at least as long as the transaction was under the (network-defined) "floor limit".
So if these were relatively low value transactions, the bank would simply not have any standing to decline payment.
Super neat - I did something similar on a lark to enable useful "web browsing" over 1200 baud packet - I have Starlink back at my camp but might be a few miles away, so as long as I can get line of sight I can Google up stuff, albeit slow. Worked well but I never really productionalized it beyond some weekend tinkering.
This is very accurate - microservices can be great as a forcing function to revisit your architectural boundaries, but if all you do is add a network hop and multiple components to update when you tweak a data model, all you'll get is headcount sprawl and deadlock to the moon.
I'm a huge fan of migrating to microservices as a secondary outcome of revisiting your component boundaries, but just moving to separate repos & artifacts so we can all deploy independently is a recipe for pain.
Network hop isn't needed if you're deploying your microservices correctly. So you can make pod groups inside of kubernetes and application that depends on another can call that lightweight container contained in that pod group. Pods inherently know the other is there in their group it has some or like network call without traversing hardware.
Same dream here - they work very interesting problems at very interesting scale, but I can see 3-4x the comp while working from anywhere? Not even a chance. I do sometimes fantasize about making a career shift when the cash comp isn't that important to me and the kids are out of the house, but as of now I value afternoon coffee breaks with my kids just too darn much.
I'm also super excited to see more on this, it's been living rent free in my head for a long time. I played around with keypress extraction from sound recordings a couple decades ago in college, and it was remarkably straightforward to extract keypresses based on sound signals, even with zero training - based on the time between keypresses and the unique signature of space/return/backspace you can build a predictor pretty quickly. We never made it to the "bounce a pair of lasers off two window panes a known distance apart and triangulate everyone's keyboard", but it was one of those things that's definitely doable with enough time and brains.
I remember making a demo in 6th or 7th grade of console login dialog and disclosing password asking friends to log in.. they couldn't, because during typing my program would analyze time between pressing different keys.. I don't remember if I hard coded it or it was trained first... But yeah, essentially it was checking not just the password, but also signature of it..
reply