Hacker Newsnew | past | comments | ask | show | jobs | submit | Stierlitz's commentslogin

"When the telex was sent, once the connection was made, the paper tape was played back to the receiving telex. In this way the message would not be hindered by slow typing with mistakes."

The purpose of using paper tape was to keep both machines in synchronization, something difficult to achieve using a human typist.

"An introduction to Creed Teleprinters and Punched Tape Equipment"

http://www.samhallas.co.uk/repository/telegraph/


> Why outsource your auth system?

To make it easy for the spooks to backdoor your clients systems?


I particularly like this one FTA: "When your competitors’ authorization systems are down at the same time yours are, nobody blames you for it, but when you’re the only company having issues, you suffer reputationally. No matter what your outsourced auth system is (FusionAuth, Cognito, AAD, etc), you can be almost certain that you won’t be alone in the event of an outage."

Ok...


They give the real reason: because if your auth provider is breached other clients will be as well and that diffuses the blame. (non)-security by herd instinct.


> .. jwz dislikes Hacker News ..

Why, what's the back story?


It has something to do with the 1990's dot-com culture, like the original Netscape was somehow more pure than what came after, and this causes him to view modern inheritors like YC with a jaundiced eye.

You can watch this if you have an hour.

https://youtu.be/4Q7FTjhvZ7Y


"One of the concerns .. was the lack of insight into malicious digital (state sponsored) activity towards vital infrastructure."

Have these people ever given consideration to not connecting their vital infrastructure to the Internet. Instead using VPNs running on embedded hardware providing a .. virtual private network.


@kevin_thibedeau: "She signed a document agreeing to keep secrets. That only requires modest reading skills."

Perhaps, the leak and the subsequent outing was part of a deep-state plot to legitimize the assertion that Russia manipulated the 2016 United States election to get their man elected President.


> .. as I recall, she shared documents from her workplace that either had printer steganography ID codes embedded into them .. None of which Winner was aware of the existence at the time ..

An 'intelligence specialist' doesn't know about protecting the source, I don't think so ;]


I highly suspect that whole story, 'Reality Winner' was outed by some yellow dots in the printout.


"Things were this way because of Richard Stallman – but I view his influence on these things as negative rather than positive. He was a cause that forced these outcomes, rather than being supportive of the desires and needs of others. Rather than indulge in gossip or stories, I would like to jump to the idea that he was supposed to have been deplatformed in October 2019."

"In resigning from his position as president of the FSF, he certainly lost some of his ability to reach audiences. However, Richard still gives talks. The FSF continues to use his image and rhetoric in their own messaging and materials. They gave him time to speak at their annual conference in 2020. He maintains leadership in the GNU project and otherwise within the FSF sphere. The people who empowered him for so many years are still in charge."

"Richard, and the continued respect and space he is given, is not the only problem. It represents a bigger problem. Sexism and racism (among others) run rampant in the community. This happens because of bad actors and, more significantly, by the complacency of organizations, projects, and individuals afraid of losing contributors, respect, or funding."

"In a sector that has so much money and so many resources, women are still being paid less than men; we deny people opportunities to learn and grow in the name of immediate results; people who aren’t men, who aren’t white, are abused and harassed; people are mentally and emotionally taken advantage of, and we are coerced into burn out and giving up our lives for these companies and projects and we are paid for tolerating all of this by being told we’re doing a good job or making a difference."


"So how do we guard against this type of attack?"

Don't allow access to your 'secret' source code from the open Internet.


Or actually do that and let everyone verify and build their own binaries. This is preatty much how Linux distros work, the multiple third party distro packagers packaging upstream code make it preatty hard to sneak in mallware unnoticed and almost impossible to affect multiple distros at once.

In comparison proprietary software companies are a single point of failure where customers can't access the source and have no means to verify what ghe binaries they get actually contain.


How to remember a password. Use the first and last letter of each word from a quotation, discarding two letter and single letter words.

aeshs fdsae meado rlele rdwhsp


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: