Hacker Newsnew | past | comments | ask | show | jobs | submit | technics256's commentslogin

How would one get around this if they found themselves in such a situation?


In this exact scenario, just use ports other than :443

But GFW certainly had the capability to block all ports. So no one really knew.


Well for starters recreate the situation and test out different approaches. Thanks to the detailed analysis that can be attempted.

If I understand right, a good next step would would be with eBPF or some type of proxy ignore the forged RST+ACK at the beginning.

Then it would come testing to see if sending a bunch of ACK packets, perhaps with sequence numbers that would when reconstructed could complete the handshake. Trying to send them alongside the SYN+ACK or even before if it can be predicted. Maybe try sending some packets with sequence id 0 as well to see what happens.


> ignore the forged RST+ACK

See <Ignoring the Great Firewall of China> in 2006. That won't work if RST/ACK was injected to both sides.

> Then it would come testing to see if sending a bunch of ACK packets, perhaps with sequence numbers that would when reconstructed could complete the handshake. Trying to send them alongside the SYN+ACK or even before if it can be predicted. Maybe try sending some packets with sequence id 0 as well to see what happens.

This is an interesting approach already being utilized, namely TCB desync. But currently most people tend to buy VPN/proxy services rather than studying this.


I've been using Astrill to bypass the GFW for almost a decade. It's a bit expensive, but worth it.


What about for things like moving objects? I’ve used the AD pluto system but looking for something more affordable


This is the first thing I thought too, the name confused me with the company and brand Vocera, I thought it was from them.


Feedback taken. Thanks for your input. Definitely we will evaluate this


You can do this yourself with Shortcuts app.

Create a timer function to run a shutdown on a time interval you order. Change shutdown to "restart".


You clearly haven't tried it or even googled it - because it's impossible to do it unattended. A dialog pops up (and only when unlocked) asking you to confirm the reboot. It's probably because they were worried users might end up in a constant reboot/shutdown cycle, though presumably they could just implement a "if rebooted in the last hour by a script, don't allow it again" rule.


A second day!

I can't believe the full up and down owning of the communications supply chain.

Makes Hezbollah look like a clown show.


Now we don't yet know which radios exactly these are. But more likely then not, wouldn't these be from the exact same supply chain attack and maybe even come in the same shipment?


I'm looking at pictures on my MidEast Twitter TL, with legit reporters RT'ing them, of palm-sized slim ICOM radios.


According to Routers, they were bought at the same time as the pagers 5 months ago. So I would bet on it being the same supply chain operation that targeted both devices and maybe other devices that were bought at the same time.


I mean just from a pure opsec perspective, you'd think they'd have popped them open to look right?


Thousands of civilians injured... very few Hezbollah dead.

Makes Israel look like a terrorist organization, IMHO.


There has been no statement or indication that the thousands of people injured were comprised in any significant proportion of civilians. Given that these pagers-- reportedly 5000 of them-- were purchased by Hezbollah directly and videos of their explosions show a minimal blast radius it is premature and, depending on motives, propagandistic to claim that the thousands of people injured were civilians.


Israel's bombing of Gaza made them look like a terrorist organization. I believe the majority of deaths and a significant fraction of injured in this attack are in fact Hezbollah members.


You can't take Lebanon's report on who the injured were at face value. I've not doubt that innocent people were injured by this, but it's not _thousands_ of innocent people.


>Thousands of civilians

You have absolutely nothing on which to base the claim that these were civilians and not Hezbollah members.


There has been no statement or indication that the thousands of people injured were comprised in any significant proportion of civilians. Given that these pagers were purchased by Hezbollah directly and videos of their explosions show a minimal blast radius it is premature and, depending on motives, propagandistic to claim that the thousands of people injured were civilians.


I doubt you would have been happy either way, but I think your statements about the injuries is also unsubstantiated.


Why would civilians have in their possession tactical communication devices of a military organization?


Hezbollah like most other similar organisations is not a primarily military organisation even though they are a paramilitary one. The vast majority of the members of Hezbollah have non-military roles of various kinds.


Civilians are shown to be in proximity of these devices when they are exploding. It appears that these devices were all triggered simultaneously, rather than waiting for individual targets to be isolated.


One reason is that Hezbollah is not a purely military organization, and has political, medical and educational arms. Another is that some of the reported casualties are the family of Hezbollah members.


How can we enable the text reply with a function call? Usually the message returned is a tool call only when it calls a tool?


There's no special interface, but you can write an instruction in a system message in the first position. E.g., "Before each function call, explain to the user what you're about to do." It's not super reliable, but the model can do it. Few-shot prompting might help as well.


I live in Munich, totally agree.


I have preview access to devin, and I can tell you that it's the real deal. It's making PRs to our codebase daily, and acts as a junior engineer.

It frees us up from doing menial tasks and is a great help for stuff like that.

It's not perfect, but it's a glimpse of the future that definitely needs to be noticed.


Some proof would give your comment weight.


proof or not true.


Milk is pasteurized



Decentralized systems, peer to peer, Blockchain, smart contracts, are all important technologies with real use cases. It is not accurate to refer to any of them as simply "crypto" especially in this context.


Are they now


[flagged]


It's true. Latin America already knows it, USA and Europe are yet to catch up. Most of crypto is bullshit, but at the very least Bitcoin is a massive, massive use case.


The fact that you don't say what the usecase actually is kind of spoils your poiny


What can I currently buy with Bitcoin?


Peace of mind


Less bitcoin


So you’re happy to continue forever with the system we have now - governments printing with no consequence?


No, but I'm not going to invest in a bunch of grifters and con artists holding up a technically bad solution because they want money and power.


Commercial banks make up most central banks, and if you believe commercial banks aren't grifters or con artists, you've obviously never heard of LIBOR for starters.

As for bad solutions, I'll give you incorrect economic forecasts on inflation and using interest rates as a lever.


Nobody is asking you to invest in banks and or wallstreet.


EigenLayer's tag line is? "Build open innovation ∞ play infinite sum games. Also: @eigen_da" (from their twitter profile).

Infinite sum games...


LMAO

"infinite games" + "positive sum" => "infinite sum"

has big Sarah Palin energy: "refute" + "repudiate" => "refudiate"

https://www.npr.org/sections/itsallpolitics/2010/11/15/13133...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: