Hacker Newsnew | past | comments | ask | show | jobs | submit | woofcat's commentslogin

Yes that's what they do.


Because the modern system is that the parenting has been offloaded onto the school. The reason we have sex-ed is because we can't trust parents to do that.

The notion that the school board would simply ask a parent, then deal with the parents from kid A complaining that they read a book checked out by kid B is out there.

We run our schools to a lowest common denominator system.


That's the way it is, but is that the way it should be?

We had a better system once (maybe only in this one way). We can do it again.


screen readers / text based browsers / etc.


I don’t want to use a “separate but equal” Internet. Screen readers support very specific situations that don’t apply to me. I see using them as the equivalent of tweaking my knee and having to sit in a wheelchair so that I can just use wheelchair accommodations and call it a day. Nah. I don’t want to use a wheelchair or a screen reader because those devices weren’t made for my own needs and don’t suit me.


Screen readers do not skip ads! If they're there, they still get in the way. There are commands you can use to make things more efficient to navigate, but if the ads take up most of the page, it's just going to be an exercise in ridiculousness!


That sounds awful, and it's something I hadn't really thought of before. I can empathize with not wanting to have to deal with that.


Understandable, but my point was that the ADA is not a “I get whatever I want” law. It has specific requirements. IANAL but I do not believe that just declaring something desirable for yourself and your needs makes it legally required under ADA.


Text based browsers are largely non functional on modern websites.


Yeah, I don't use one lol!


I'm presuming they were trying to say "Doomed from the start of the digital revolution"


One can come up with plenty of criticisms of Kodak. But they did sell off their chemical business when the selling was reasonably good and they did do a fair number of things that anticipated digital.

But you can't just yank out the carpet from a massive consumables business that basically underpinned a company's revenue and profits almost overnight and reasonably expect them to deal with it.


Yes, that's exactly what I meant. Thanks for clarifying, and sorry for being unclear at the start.


Goofy question, I also got this email and am trying to go through the process. However no emailed ever make it to my inbox.

Is Blackblaze getting flooded with these requests? I'm also a bit confused at the decision here. :)


Basically yes, so they are a bit slow to send. We reset quite a few passwords so the system is overloaded a bit. More details from our CISO on our subreddit: https://www.reddit.com/r/backblaze/comments/1j67bte/comment/....


Mixnet would be a solution. Like what you described, have inbound packets held for some period of time and released as a group so that you cannot as easily correlate the inbound and outbound traffic.

The downside is that it gets much slower, and feels 'bad' as an end user. Each packet takes longer.


Why do all of these new VPN solutions want some form of Crypto payment that has to go through KYC regulations to acquire... doesn't that somewhat defeat the purpose?

Mullvad with cash seems like a super ideal way to go. Why can't I just mail you $20 and call it a day?


There are a couple of options for acquiring crypto without KYC. One might sell goods and services for crypto (I have done it myself, sold a videogame console P2P through a local libertarian group chat), or buy crypto with cash via P2P or in a country with looser KYC laws, and lastly they could just mine it themselves. Having significant money through mining might seem improbable, but we can't forget the market dynamics, someone might have mined a lot of some altcoin before a big boom (e.g. dogecoin) and ended up rich overnight.

Also, let's not forget Monero. Even if you buy Monero in a KYC exchange, the letterbois can only track if you've bought, but can't track where you send it to next. You could then exchange it for bitcoin with someone or using a non-KYC service, and there you have it, an anonymous BTC reserve. Or you could just bypass BTC altogether and use the much superior Monero to buy whatever you want.


That whole comment is "With a way harder method than going to the ATM".

I understand that it's possible to get crypto through obscure methods. However if you're selling a privacy focused solution, ideally you shouldn't have to spend 3-4 weeks to acquire the funds to purchase it.


I agree cash is currently king, but we need a crypto (or even better, Monero) economy if we are going to maintain financial privacy in the long run. In the event of a full transition to a Central Bank Digital Currency, like the EU is discussing and Brazil has already announced, cash will not be private anymore, as any physical bills will be just tokens for the underlying digital currency, which is tracked by the government.


You mean Aha! isn't hiring 100 people in 100 locations world wide at all times?


The one person I know who worked there was very disillusioned.


Whomever has this fake certificate can run a server and say it's google.com and windows will say "yep you are" with the little green lock.


Where? In Edge you mean?


And everything that uses the OS trust store, when run on Windows, I assume.


The certificate is for a specific IP address, no?

And without DNS pointing google.com to that IP address, it's pretty useless.


Nope, certificates are issued for CNs(Common Name), also known as FQDNs (Fully qualified domain names). Something such as *.google.com, not IP addresses.

If they were issued for IP addresses they would have to reissue the certificate every time they spun up a new server. Also it's why if you spin up another server and make DNS point google.com to that server, it would not pass verification since the certificate you will be using on that server is not issued to *.google.com, but rather some other domain you own. The IP address plays no role in certificates.


Nit: a CN (stored in the Subject field of a cert) is not an FQDN, though historically web browsers treated them as such. This practice is now deprecated. Modern practice is for the domain name(s) to be placed in the Subject Alternative Name (SAN) field.

The Subject field is not consulted so long as the SAN field is present, and can in theory be any X.500 Distinguished Name, of which Common Name is one possible attribute, which may be any freeform string of a limited length (though it is typically set to the primary domain the cert is issued for, for easy identification).


Certificates can be issued to IP addresses (at least on SAN level, not sure if they are allowed in CN in CA/B baseline requirements), like https://crt.sh/?id=15492507462


That is different in context to what was being asked though.


> And without DNS pointing google.com to that IP address, it's pretty useless.

On the internet itself maybe, but you can still MITM people on some network, right?


How is this any different than the other 1,000 "encrypted chat" solutions?


This has been used by doctors and is not free - this is how I found it.


My doctor can barely use a mouse let alone comment on surveillance technology


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: