Hacker Newsnew | past | comments | ask | show | jobs | submit | hafichuk's commentslogin

They can technically do anything they want with the input you provide. Personally I would never trust an opaque operating system even if they provided clear details as to what the configuration options are and how they are used.


I assume this article is interesting because it tells you to "disable ad-blocker" :) -pass


You forgot your closing tag :)


The article is light on the technical details. Here's the API: https://developers.google.com/gmail/api/


IANAL. The ham radio community needs to raise this with the FCC. This section was originally constructed a long time ago (1993?). I'm guessing it's biased this way to stop 1940's era spys from operating.


The regulations prohibit various forms of commercial use, e.g. preventing a cab company from moving its dispatch onto the 2m ham band— a reasonable policy since there is limited spectrum and commercial parties could easily overrun it: but if the traffic is encrypted how is the community management supposed to function?

Personally I'd like to see the regulations adopt special rules for highly directional or low-power limited-range signals in the SHF+ bands where there is plenty of spectrum which basically drops all the content rules beyond requiring cleartext contact information. Without competition for spectrum the balance of interests is different and it would be nice to be able to lawfully backhaul community internet access over some chunks of spectrum up at 3cm. Since no one would likely notice or care you could already use crypto in these places, so it might as well be made permitted.


http://www.arrl.org/news/fcc-dismisses-encryption-petition

The amateur radio community is not universal in their dislike for this rule. I don't personally see any way in which the rule could be removed without altering the fundamental character of the amateur radio service.

You simply should not be making transmissions in the amateur radio service that require privacy. Permitting unrestricted encryption makes that basically impossible to enforce.


I’m too lazy to look it up but I would be surprised if many of the founders of the internet where not ham operators. Again I’m being lazy about looking it up but if not specifically in writing at least in spirit I believe one of the purposes of the armature radio program has been to advance wireless communication and technology.

Right now strong encryption and authentication are where most of the efforts in the field seem to be focused. It should be at the forefront of the experimentation being done by amateur radio operators.

Not that I really have an answer to the problem of bandwidth abuse. I completely understand how this would be a problem and have no doubt that it would be abused.


Not in our lifetime. Cryptocurrencies will just be another bolt on and thing we need to integrate. The upshot is that the banks probably won't manage this. The downside is that the banks probably won't manage this.


All of the banks I deal with use FTPS (which is called "secure" ftp). I have yet to deal with one that uses SFTP (ssh-ftp).

http://www.differencebetween.net/technology/internet/differe...


Does Will Blythe have a paypal account I can send some love to?


Any advice if the company is already public and they are offering stock options as part of the compensation package?


Look at the share price on the market. If they option strike price is less than the market share price (and the market price seems like it will be steady or go up), might be a smart idea.

IANAFinancialAnalyst.


IIRC, the last time Google gave a service the ability to download (export) data, they closed it shortly there after. (RIP Reader)


https://www.google.com/settings/takeout

Exporting data via Google Takeout is supported for 15 (and counting) products, including Youtube, Google+, Drive, and more. Google made a commitment to make it easy to extract your data, and is executing on that. It has nothing to do with shutting services down.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: