Hacker Newsnew | past | comments | ask | show | jobs | submit | bonzoesc's commentslogin

For all the janky looking URLs I get from eggs that only have like twenty tweets, half of them janky looking URLs, I don't believe anything is trivial for Twitter's spam filters.


> Ironically, there's a Nissan car that does enable and disable the limiter based on the GPS detecting it being on a race track or not. But they're transparent about it.

It's the GT-R, and it's only on the Japanese version: [trigger warning: gadget blog] http://www.engadget.com/2007/12/22/nissan-gt-r-disables-spee...


From firsthand experience, the PostGIS extension for PostgreSQL is fantastic.

A couple of my coworkers at Basho have done geospatial work with Riak, our scalable, distributed database: http://basho.com/indexing-the-zombie-apocalypse-with-riak/


That's so indescribably worse than just killing that process the mind boggles. Breaking in a simple, predictable, and detectable way vs. corrupting data and hoping (excuse me, "praying") nobody notices.


> vs. corrupting data and hoping (excuse me, "praying") nobody notices.

Well it seems to work for MySQL

Anyway, you wouldn't ever return the nulled data. If the process tries to access the data, THEN you crash it.


Spying on all of the email isn't simple either. When there's a will and a bottomless font of taxpayer money in the name of national security, there's a way.


Is this a case of design for the sake of aesthetics alone?

Welcome to Hacker News!


Heh, yes.

I was going to facetiously suggest that if designers wanted to work on another ephemeral product, they should redesign the patterns printed on TP (first suggestion: chevrons indicating which direction to pull). Then I remembered http://www.getshitter.com/


I've never had this happen.


Yes, this is pretty common for printers installed in service desks at the airport. However, they tend to not have overly-branded stock because in the irregular circumstances you tend to get a pass from a service desk, you might be rebooked on a different carrier, and would therefore have a mismatched boarding pass.


Usability. One time pads have been around forever, are provably secure, but a pain in the ass.

Modern symmetric ciphers solve the "you need to securely exchange as much key material as you wish to send data" using mathematical formulas to stretch key material. Asymmetric ciphers use mathematical formulas to fix "you need a secure way to exchange keys."

Unfortunately, the math can't be probably secure, only believed secure and proved insecure.


>Usability. One time pads have been around forever, are provably secure, but a pain in the ass.

With cell phones so widespread, I wondered why someone doesn't write a one time pad app. People could share gigabyte-sized pads via trusted wireless or a cable if they prefer.

http://softthere.com/projects/otp/


The only reason to use one-time pads is an extraordinary level of paranoia. If you are paranoid enough to need a one-time pad then it makes little sense for you as a private citizen to trust that hardware you take into public places hasn't been compromised. Manual creation and transmission of the encrypted message is the only approach that makes sense.

If lots of people adopted one-time pads it might hinder NSA et al but this would be akin to trying to convince people to wear masks whenever they are in public to hinder monitoring with CCTV.


Not sure why this is the case though. What makes it inherently impossible to prove something is secure?


I'm confused as to why you'd need a third-party for this.

The Authy app is better.

Look at the screenshots at https://itunes.apple.com/us/app/google-authenticator/id38849... . The buttons are ugly, labels are misaligned, and the colors are ghastly.

Re-ordering tokens in the Google Authenticator app is janky as hell too, and the only way you'll know if it's going to work is if the regular view switches to one with subtly different font sizes.

Authy's not without its rough edges, but it never looks that bad.

From down-thread, regarding Google Authenticator: e.g. setting up 2-factor with MS with the same email you use for Google will overwrite the Google one unless you rename it.

Authy does this correctly.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: