Hacker Newsnew | past | comments | ask | show | jobs | submit | joelanders's commentslogin

Is there a reason "fork over" and "shell out" can both (roughly) mean "fork and exec a shell" or the seemingly unrelated phrase "pay?"


Well "fork over" comes from the system call fork() which creates a new process. "Shell out" as explained by the author means to run an external shell command, which has been implemented in some languages by forking a shell, and then spawning the process. fork() is known as so because it results in a hierarchy where there is a parent process and a child process, and so forth. Shell just seems to be a general term for an interface used to operate an OS. [0] So no, just a coincidence.

[0] https://en.wikipedia.org/wiki/Shell_(computing)


Stumbled across and started reading A. E. van Vogt's "The World of Null-A" last night.

Super trippy.

https://en.wikipedia.org/wiki/The_World_of_Null-A

http://www.amazon.com/World-Null--E-Van-Vogt/dp/0765300974/


Null-A is probably the Van Vogt's most famous book, but others are great as well, I loved "Slan" from the same author : https://en.wikipedia.org/wiki/Slan


didn't expect anyone to mention this book... but it's been a long time favorite of mine. I first read it in my teens, when I was heavily into asimov, vance, dick and other classics :)


Here's a pretty comprehensive guide:

https://help.riseup.net/en/gpg-best-practices


I just posted this Linux Journal article from 20 years ago, "Linux in Antarctica." We've come a long way.

[0]: http://www.linuxjournal.com/article/2843

[1]: https://news.ycombinator.com/item?id=8571947


There are trusted software client things (Spotify, Netflix, etc.) that seem to work well enough. Snapchat should be able to do better.


Totally different incentive. Spotify only needs protection that's enough of a pain the the ass to make it easier to just get the content from somewhere else or perhaps just pay the $n.99 for it.

Snapchat is full of (supposedly private) information that is not available anywhere else. Attackers will be far more determined.


See links for a bit of reading about how hard it is to break DRM on Spotify or Netflix. They're doing a lot more than Snapchat. The difference between "you just need to reverse engineer the HTTP API to make a 3rd-party client" and "you need to run IDA Pro and PANDA and whatever else" is significant. The latter exploit would have far less reach.

[1] http://moyix.blogspot.de/2014/07/breaking-spotify-drm-with-p...

[2] https://www.usenix.org/node/182951


I read through the Spotify article, and if I understood it correctly, you don't need to run QEMU+PANDA to get at the unencrypted stream. That was just the method the author chose to analyze the running code. He tracked every memory read and write made by the CPU, and looked for byte distributions that looked like encrypted data, and found the decryption function at address 00719b84. He then located that code inside the Spotify binary, at 0x0042e2ed.

Once you know that, you don't need to repeat the initial analysis every time. You can just set up a hook to record all the data that flows through that function after it's decrypted.


Yes, that's my understanding as well; my other comment was sloppy. I'm unsure what was meant by "hook," though. Is that something you set up with the target process running under a debugger? That much privilege wouldn't be available to apps in an app store, right?


I meant "hook" in the most vague, hand-wavy sense of the word… anything from attaching a debugger at runtime, to modifying the binary so it automatically saves every song on your desktop. Obviously if you did something like the latter, no extra privilege would be needed.


I wonder how they "confirm[ed] out of email that the keys we exchanged were not intercepted and replaced by your surveillants." Key exchange is the hardest part.


That was my thought as well. Given all communication is considered compromised, I can't think of a simple way to do this that isn't a face to face.


Could you explain how exchanging PGP keys over TLS would be compromised or compromisable?


Simple. Analog man-in-the-middle; i.e., you're not talking to who you think you're talking to. That's the whole point of key exchange.


Who doesn't ;) Any speculations? Ideas? Agreeing on an entropy source is one thing, but really exchanging keys out of NSAs sight is hard, right?


I think the weak link in the chain is only after decryption, but before uncompression (for lossy formats, so books excluded). See, for example, [1] and [2], where the authors look at randomness and entropy measures of I/O to find where the decrypted-but-compressed buffers are.

[1] http://moyix.blogspot.de/2014/07/breaking-spotify-drm-with-p...

[2] https://www.usenix.org/node/182951


Steven Levy's _Crypto_ (referenced in the article) is quite good (as is everything he writes).


I will second this recommendation. I was about 1/3 of the way through the book before I realized it was a 'historical' book and not a fiction.

I have in the many years since I read this one, become quite the fan of all his works.


Check out the stuff made by Alphasmart. A larger display would be nice for editing.


I actually checked them out before, but especially their displays seem to be quite limited for writing long texts.


I'm going to get downvoted for being a grammar nazi, but this disingenuous "spokesperson" should know the difference between "insure" and "ensure."


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: