Hacker Newsnew | past | comments | ask | show | jobs | submit | balboah's commentslogin

Except here in the EU where they increase import tax because china producing “too cheap” EVs


Got to protect the business that failed to innovate when it had the chance.


I often replace searching for something on google with ChatGPT these days. I expect the way we interact with information to be replaced completely in the future. Why would I skim through all those clickbaits and ads instead of getting a tailored result of exactly the information I was looking for


Same here, Google's "How to" search share will be eaten by ChatGPT and similar products in about 5 years maybe.


people won't switch to a "free" sponsored chatbot?


Used fastmail (and proton) for a year or two. Had to go back to google because there’s just too much spam otherwise


I've been on Fastmail for several years and I've had no spam in my inbox at all. Not a single email. That's a better track record than Gmail for me.


I've been on Fastmail for almost a year, and I get spam/obvious phishing attempts in my inbox. Compared to my experience with GMail before switching to Fastmail, I found Gmail to be noticeably better at spotting and filtering both spam and phishing emails.

Having said that, I'm still not going back to Gmail.


Same experience here. Fastmail is amazing.


I am using Protonmail for some years now. I have maybe one spam mail per week in my inbox, everything else is filtered correctly.


I haven't have any problems with spam on PM, but I also don't give out my email addresses willy-nilly. I have junk emails for that.


What I'm hearing is that PM's spam detection is so poor that you don't feel like you can freely share your PM email address, out of fear that you'll get spammed. That's not a very convincing pitch for their product.


I got the TiDB coffee mug, it looks better than the MongoDB mug


Tandem (who sold high-availability via redundant hardware) coffee mugs had two handles. What are some other companies whose mugs reflected their value proposition?


I'm running my rpi 4 as a kubernetes controller on Ubuntu. It also has wireguard hooked up with 8 dedicated server nodes. The SD card class A2 has been enough for disk performance, no SSD needed.

It's mounted on a din rail with the DINr mount plate and a Poe hat, makes it very compact and it fits in my small fiber network clauset. Planning to add 2 more for hight availability.


This list can be used on Android or iOS by downloading the Blokada app


Could you sum up how someone is able to read keybase exploding messages when a key is compromised? After it explodes


If an attacker obtained the ciphertext of the message, they are under no obligation to delete it just because it "exploded" on your device. They can hold onto it as long as they want, then if they ever get your key, they can decrypt it.


So, firstly the comment you're replying to specifically says that Keybase _does_ use PFS for exploding messages. I'm going to assume in good faith that you've simply misread the comment but I'll circle back on this because the technical details are interesting.

1. For _other_ Keybase messages without PFS it's open season. Say Alice sends you a normal Keybase message right now about murdering her husband Bob. Keybase will ensure Alice provides keys to decrypt that message for your iPad, iPhone, the MBP and your old Thinkpad. This way you can read the message from any of your devices. Convenient.

Spooks can record Alice's encrypted message and get it back if they at /any/ subsequent point obtain the Keybase device key for your iPad, iPhone, MBP or Thinkpad, for example as a result of seizing it for some other reason. Maybe it's next week, or next month, or next year, or in ten years time. The device may never have received these messages, maybe it was switched off, or they've since been removed. Doesn't matter until the key is replaced.

In contrast a PFS system would discard the keys as soon as they'd been used to decrypt stuff, and agree new keys for subsequent messages. Signal's double ratchet does this for every single message back and forth. "I killed Bob" (new key) "You did what?" (new key) "I was so angry I just stabbed him" (new key) "Shit. Now what?" (new key) and so on.

2. Actually though "exploding" messages are another Keybase compromise. Visually it seems like they blow up instantly when the time limit expires right? Gone. But cryptographically it takes up to a month or so for the bomb to "explode". Suddenly it's more like you wrote the message in chalk on an outside wall rather than it instantly "exploding". This was easier for their multi-device large group stuff. That's right, your 1 hour exploding message about the lawsuit was optimised for cases where you'd need to share it with a 500 person group who all have multiple devices. That makes sense right?

Always with "exploding" messages the actual expiry is implemented by some software explicitly deciding to throw ephemeral data away. Signal's ratchet makes doing so constantly the unavoidably the correct software engineering choice, otherwise your code leaks endless old keys because of the ratchet. But Keybase only throws away "ephemeral" keys after at least a week, chances are if you're a multi-device user there are some fortnight old "ephemeral" keys in one of your systems right now. A Keybase exploding message you got on the 1st of December with a one hour "fuse" on it is still actually readable now using keys from that device. Huh. The Keybase UI doesn't make that apparent at all.


You can also show fake ID at a competing telco sales point and tell them you want to move the number in Sweden. Happened to me that depending on which provider the call was coming from, sometimes it would reach me and sometimes not.


I’m Swedish, didn’t quite get the part about J and Y being pronounced the same? Sounds different to me


I think he's talking about Y when used as a consonant at the start of English words. Y exists in Swedish as a distinct vowel sound but is not used as a consonant like in English.

Swedes tend to pronounce English "yes" and "yoke" as well as "juice" and "joke" all with the same Swedish J sound.


I’ve made a http json service that allocates IPs and configures WireGuard. Not sure if it can be used for this project but here it is: https://github.com/balboah/wireguard-operator


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: