Hacker Newsnew | past | comments | ask | show | jobs | submit | illiac786's commentslogin

Fully agree, it’s akin to atheists, they very often are convinced they are not religious. Agnostics are the unreligious ones. In fact, atheists are the most fanatical zealots in my friends circle.


Yes, it is very much atypical. Most hacks happen because admins still haven’t applied a 2 years old patch. I hate updates, but it‘s statistically safer that running an old software version. Try exposing a windows XP to the internet and watch how long it takes before it‘s hacked.


Debatable. "I connected Windows XP to the Internet; it was fine" - https://news.ycombinator.com/item?id=40528117

One comment there points out that XP is old enough for infected attack vectors to have all died out. I dunno.


Anyone else noticed that we don't even GET patch notes anymore?

"Fixed some bugs" Yes thank you very helpful that! Now I can make a very informed decision.


I hate that. “Bug fixes and improvements” every time. And then there are the ones who think they’re being cute with “our bird Fernando has been hard ar work eating those nasty bugs and flying over the rainbow to bring you an ever delightful experience”. Just, no. I don’t mind you flexing some creative writing muscles in your release notes if you provide actual clear information, but if you’re going to say nothing like everyone else, might as well use the same standard useless message so I can dismiss it quick.


Yes! Mobile apps are the worst about this. As a rule, I don't update any apps unless I have a clear reason to do so.

I experienced this first hand in 2014. We got to a point where drive-by exploit kits just weren’t shipping IE8, Java 6 or Windows XP payloads anymore.


https://www.tomshardware.com/software/windows/idle-windows-x...

But good we are talking about my point rather than than the example.


> YouTuber Eric Parker demonstrated in a recent video how dangerous it is to connect classic Windows operating systems

The video referenced in that article explicitly connects directly to the internet, using a VPN to bypass any ISP and router protections and most importantly disables any protections WinXP itself has.

So yeah, if you really go out of your way to disable all security protections, you may have a problem.


Like leaving the lid off of my typewriter at lunchtime :-o


That’s still the example, not my point.

My point is, statistically, it is more secure to install updates as fast as possible.

We can take another example: search for “shitrix”, there’s thousands more CVEs out there to use as example.


You assume that the old software version has critical vulnerabilities. If it does not, then yes, updating is more of a risk since the new versions are unknowns.


My assumption is statistical. All software has critical vulnerabilities, not just the old ones. It’s just that these vulnerabilities are known, in the case of the old ones, which significantly increases the risk.


To be fair I doubt there are that many people scanning for internet facing XPs in 2026.

On the other hand, any server running old, unpatched versions of apache or similar will get picked up by script kiddies scanning for publicly known vulns very, very fast.

The notepad++ attack is politically targeted and done through unconventional channels (compromise in the hosting provider). I don't think 99% of the people reading this thread has a comparable threat model.


I don't know about Windows, but I've been running all kinds of outdated Linux (Debian mostly) and it never once caused a security problem.


Debian backports security patches.


It depends if the application itself touches the Internet or only when conducting updates.

The threat model for a server and for a personal computer are very different. On a consumer device, typically only the OS mail app and browser have direct contact with the outside world.


Let’s say there’s a balance between the two, and maybe optimising a bit more is currently a good idea for various reasons…


Very little people really care about a hobby. The ones that do are the most visible but the huge mass just isn’t passionate.


Makes zero sense. “Emotion” is a property of these “biomolecular machines”, by its definition.


But if you weren't one of them, would you be able to tell that they had emotions (and not just simulations of emotions) by looking at them from the outside?


If I wasn’t one of them I wouldn’t care. It’s like caring about trees having branches. They just do. The trees probably care a great deal about their branches though, like I care a great deal about my emotions.


Well some people appreciate the world around them, and would care about it just as they care about trees having branches.


Some people definitely, but you made a point that you don’t. People are “biomolecular machines” and they are “useful, sure”.

I wouldn’t call that “appreciating the world around oneself”.

Want that your whole point, that people aren’t better than machines?


Yes, my point was that people aren't better than machines, but just because I don't exceptionalize humanity doesn't mean I don't appreciate it for what it is (in fact I would argue that the lack of exceptionality makes us more profound).


I wouldn't proclaim a lack of exceptionality until we get human level AI. There could still be some secrets left in these squishy brains we carry around.


Hmmm, check the jxl-rs repository. I wouldn’t call it mature. Not to say it’s buggy, but most of its code is very fresh.


I think most of the comments on this thread crystallise two different conception of security: the intended one and the effective one.

The second one is messy to measure, it requires making statistics on how often NAT saved the day by accident, which is hard if not impossible.

I personally think that statistics always win, even if they are unexplainable. My bet (zero proof) is, IPv4 is statistically (maybe by accident) more secure than IPv6, just because of NAT.

I have seen so many horrors in terms of multiple NATs I will always prefer IPv6, also because I think the benefits outweigh by far the difference in _effective_ security.

Summary: yes, IPv4 is more secure, but the difference is so marginal that IPv6 is still way better. Security is not the only metric in my world and theoretical discussions obsessing about a single metric are pointless.


I see the split too. I'll add that each camp is frustrated and feels the other is missing the point and would make information security worse if its worldview won.

You can do some empirical analysis. Someone downthread linked to a paper claiming to being able to reach a few million vulnerable devices over IPv6 and not IPv4. This kind of analysis isn't dispositive, though, because there are all sorts of second-order effects and underlying philosophical differences. Facts seldom change minds when you can build multiple competing true stories around these facts.

I'll call one camp the "veterans". They see security mostly as a matter of increasing the costs incurred by attackers relative to defenders, looking at the system holistically. Anything that increases attacker workload is good, even if it's an unintentional side effect of something else or interacts with software architecture in a cumbersome way. It's vibes-bases: whether a give intervention is "worth it" is an output of a learned function that gives in the stomach of a seasoned security researcher who's seen shit.

The other camp I'll call the "philosophers". (My camp.) The perspective here is to build security like Euclid's elements, proving one invariant at a time, using earlier proofs to make progressively more capable systems, each proven secure against a class of threat so long as enumerated assumptions hold. They read security as an integral part of system architecture. Security comes from simplicity, as complexity and corner cases are the enemy of assurance.

The veterans see the philosophers as incoherent. There's no such thing as a safe system: only one not yet compromised. You can't solve problems for good anyway, so there's no use trying to come up with axioms. Throw away the damn compass and strait edge and just draw siege map in the dirt with a stick.

The philosophers see the veterans as short-term-oriented defeatists who make it harder to reach levels of provable security that can solve problems once and for all so we don't have to worry about them anymore. You have to approach complex systems piece by piece or you can't understand them at all -- and worse, you'll do things in the name of security gutfeels that compromise other goals without payoff that feels worth it to them. They say, "Without my compass and straightedge, how can I design my star fort with firing lines I know cover every possible approach?"

The divide shows up in various projects. TLS is a philosopher project. Certificate transparency is a veteran project. Stack canaries are a veteran project. Shadow call stacks are a philosopher project. I think you get the point.

This thread reveals a surprising split between veterans and philosophers on NAT. In retrospect, it's kinda obvious that the veterans would insist that "duh, of course IPv4 prevents inbound connections and it must because otherwise the Internet won't work", and the philosopher camp is "Hold up. One thing at a time. What's the actual goal? How can we achieve this goal minimally without side effects on Internet routing?"

My camp sees the NAT configuration issue as a red herring. We see "the UX makes it too easy to run unsafe" as an HCI issue distinct from the underlying network architecture. The veterans say "Well, you can't build that button if you have NAT, so we are led not into temptation."

Both camps have something to contribute, I think, but the divide will never fully disappear.


I understand your view, I just disagree with the value you're putting on it, and I feel you're straying into accidentally insulting people to justify yourself:

You called yourself a philosopher and then proclaimed philosophers are the only ones who read security as an integral part of system architecture, whilst veterans are essentially vibe coding and surviving on the lucky mess they create.

I find your position that misconfiguration is a red herring in security as completely unjustifiable and untenable.

It's probably that I'm just a puny brained veteran seeing your big complex philosopher smarts as incoherent though.

Anyway, I digress from the key point I've been trying to make in this entire thread:

I'm not arguing that IPv6 is not secure because it lacks NAT. My point was that this entire discussion is silly engagement bait: there's no clear right answer, but it's an easy topic for dogma and engagement. A holywars topic like NAT, IPv6 and security is prime for that. The author and submitter muddies the waters further by - probably not intentionally - choosing a strawman submission title.


In assuming you are not using your keyboard to set brightness because it’s an external display plugged into a laptop? Search for a DDC application for your desktop, it’s amazing, the brightness controls of your laptop will then control the external display as well. I use lunar on my MacBook, it was a revelation.


That’s not the problem. Analog dials were still easier and more convenient. I’m talking CRT days. Like these: https://i.ebayimg.com/images/g/M9cAAOSwrt5ncwpj/s-l1600.jpg

You could probably program keypad knobs like these to do the same: https://m.media-amazon.com/images/I/71s7PGYBkkL._AC_SL1500_....


Or switch to HDR if you have a capable display.

I was pleasantly surprised that HDR also means you can control brightness - it is all software I that case!

And the brightness keys on an external Apple keyboard work.


According to my (limited) testing, you can only control brightness when the transfer function used on the HDR content you see is HLG. When it is PQ, the luminance seems to be “absolute” and ignores the display’s brightness settings.


> In assuming you are not using your keyboard to set brightness

I prefer buttons on the monitor.

Using a game comtroller to change brightness is like driving a car from the back seat.


Autobrightness only works for screens which are against a wall. Your eyes care about what is behind the screen, not in front of it, and that’s one thing autobrightness never took into account.

I used to jailbreak my iPhone 4s to get some dark mode.


How is it more robust? There is no EU army, is there?


The EU defence clause is more binding than the NATO Article 5. It also demands that the other states * obligation of aid and assistance by all the means in their power* whereas Article 5 let's other states decide how much aid they want to supply


There's no NATO army either.


Just check for “NATO troops”. That’s a term that exists and mean something.


It means something, but doesn't imply the existence of a NATO rmy


ok, but now we’re nit-picking about the meaning of “army”. There are “NATO troops” while there aren’t “EU Troops”.

I would still like to understand why previous poster said the EU defense agreement was more robust, I am genuinely curious about what that agreement contains and how well it was respected in the past.


> I am genuinely curious about what that agreement contains and how well it was respected in the past.

Easy enough to find[1]. Here[2] is a nice article which digs a bit deeper into how it might play out.

[1]: https://eur-lex.europa.eu/EN/legal-content/glossary/mutual-d... (links to the treaty section if you want the text verbatim)

[2]: https://www.politico.eu/article/5-things-to-know-about-the-e...


> ok, but now we’re nit-picking about the meaning of “army”.

You started nitpicking...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: