Hacker Newsnew | past | comments | ask | show | jobs | submit | j88439h84's commentslogin

Compare to Nim?


Indeed. And Crystal (https://crystal-lang.org/)


Does Crystal have an interpreter? I get the impression traditional ahead-of-time compilation is currently the only way to use it.

daScript has both ahead-of-time compilation and an interpreter.


How much worse are the bad ones than the others?


Can you provide some evidence for these claims?


Snowden docs have been available for years. ShadowBrokers. Just this week a 20GB dump of private Intel source was dumped with backdoors included. It is beyond a reasonable doubt that x86 hardware has NSA backdoors in it. You're now sitting on a time bomb.

Remember when the NSA tools were dumped with their secret Windows exploits? WannaCry? North Korea picked that up and launched ransomware attacks. That's the sort of thing that's going to happen again with the newly published Intel backdoors. Just wait and see. Tim Cook is 100% vindicated this week about not adding intentional iPhone backdoors.


I don't remember WiFi or CPU backdoors in Snowden, ShadowBrokers, or Intel 2020. Unless by "backdoor" you just mean NSA holds zero days on various important technologies, which is reasonably likely given EternalBlue. Is that what you mean?


They don't need 0days when they can just easily corrupt the standards process. They've been doing it everywhere.

The Wifi Alliance has made some heinously bad choices that if you attributed to incompetence simply make no sense, they treat anyone who questions them with disdain and shoots down attempts to fix the mess they make. WPA3 was hilariously broken a month after getting rolled out.


TIL, any recommended reading on this?



> Just this week a 20GB dump of private Intel source was dumped with backdoors included.

> That's the sort of thing that's going to happen again with the newly published Intel backdoors.

This is not even remotely true. You have to read more than just the headlines.

> Anyone on WiFi AC or up are backdoored right now by NSA. All of them are compromised, no doubt in my mind. All the LTE. All the x86 hardware on the market. All of it.

Extraordinary claims require extraordinary evidence. Please provide some.


https://theintercept.com/2016/08/19/the-nsa-was-hacked-snowd...

there is proof that NSA has been mass hacking WiFi since at least 2005. that batch of Snowden leaks came out one week after the Shadowbroker's first leak.

NSA programs SECONDDATE and BADDECISION were used to mass hack into WiFi routers in Iraq in 2005-2007. note the slides say NSA breached the WiFi routers of EVERY INTERNET CAFE IN IRAQ. that is the Collect-It-All scale we expect from NSA.

also note, NSA did this FROM THE SKY! SECONDDATE is a sensor installed in Cessna and low flying planes. NSA flew over every WiFi hotspot of every Internet cafe in Iraq and deployed the BADDECISION exploit to install implants on the WiFi routers to then mass surveil everyone.

no futher leaks about BADDECISION have come out. we dont know if it is a protocol attack or crypto exploit. we dont know if WiFi is still vulnerable to BADDECISION.

how much do you want to bet that NSA only used SECONDDATE and BADDECISION in Iraq and NOT back here at home in America?

how much would you bet that NSA is NOT bulk hacking WiFi routers of ENTIRE US CITIES FROM THE AIR?

consider how much cheaper and easier that would be now in 2020 compared to 2005?


Interesting article, but I think you're way over drawing your conclusions.

> how much would you bet that NSA is NOT bulk hacking WiFi routers of ENTIRE US CITIES FROM THE AIR?

I would bet very good money that they are not doing this. If SECONDDATE has been around since 2005, and they are bulk installing it on millions of routers in the US, where are the people coming out saying "I found some NSA shit on my router"? Is there a _single_ example to support this?


are you so sure about that?

https://m.startribune.com/mystery-surveillance-plane-that-ci...

https://minnesota.cbslocal.com/2015/06/02/secret-aerial-fbi-...

since at least 2014, the FBI has a secret air force of over 100 planes that fly constant circles over the biggest US cities.

what do you think FBI is doing? joy riding?

https://www.eff.org/deeplinks/2016/03/new-foia-documents-con...

those FBI planes are equipped with DRTBOX's--cell site simulators and wifi interception sensors.

in the TAO ANT Catalogue leaked by Snowden, it shows NSA SECONDDATE is manufactured by Harris.

Harris also makes DRTBOX, and Stingray.

wanna bet FBI is using DRTBOX in exactly the same way NSA used it in Iraq? wanna bet NSA is actually helping FBI run this little domestic program?

why would NSA and FBI surveill all US cities from the sky? because you dont need a warrant or even a subpoena. "reading the air" is free--it's public space with no expectation of privacy. and radio signals you emit through your phone or wifi router are also public space.

but what is FBI and NSA's endgame to run a real-time monitoring program over US cities?

back in 2004-2008 in Iraq, the Pentagon deployed something called GORGON STARE. it stiched together the video feeds from all drones and jets and satellites into a composite video watching entire cities.

https://longreads.com/2019/06/21/nothing-kept-me-up-at-night...

Gorgon Stare has come home to roost.


Again, your original claim:

> Anyone on WiFi AC or up are backdoored right now by NSA. All of them are compromised, no doubt in my mind. All the LTE. All the x86 hardware on the market. All of it.

Still _zero_ evidence of any of this. Why not post some?

You also ignore questions like..

> If SECONDDATE has been around since 2005, and they are bulk installing it on millions of routers in the US, where are the people coming out saying "I found some NSA shit on my router"? Is there a _single_ example to support this?

> Just this week a 20GB dump of private Intel source was dumped with backdoors included. > That's the sort of thing that's going to happen again with the newly published Intel backdoors. >> This is not even remotely true. You have to read more than just the headlines.

> If SECONDDATE has been around since 2005, and they are bulk installing it on millions of routers in the US, where are the people coming out saying "I found some NSA shit on my router"? Is there a _single_ example to support this?


They'll be stuck in a tunnel. Is that worse than being stuck in the desert?


Yes, if you have no ventilation.

If you're above ground you'd just pop an emergency hatch in the tube.

You can't do that underground.

I'd also point out that a hyperloop tunnel is a much worse place to be stuck in than a normal tunnel.

In a normal tunnel there is room to walk alongside the tracks.

In a hyperloop tunnel there is virtually no room between the car and tunnel - maybe an inch or two, tops.


You might not want to pop the emergency hatch when you're surrounded by vacuum.


Hatch in the tube, not the car.


Heh, look up "vacuum cannon" on youtube. The tunnel would need to be slowly depressurized, otherwise anything in it would turn into a bullet when the atmosphere rushes in.

This also applies to any sort of failure that compromises the vacuum. A dipshit with a rifle could kill anybody in the system in a fraction of a second. Burying the tubes is probably the only way to avoid this, but thankfully the whole thing is vaporware anyway.


You don't need a full vaccum. Even half an atmosphere would greatly reduce air resistance and allow for 4x the velocity in 1 atm.

Humans can survive (uncomfortably) at .5 atm and you eliminate the vacuum cannon problem simply by putting pressurization valves periodically throughout the tube.


The tube is vacuum, you'd need an airlock not just a simple hatch, no? How do passengers get from car to airlock without a suit?


Hyperloop is not a full vacuum, only partial vacuum if I'm not mistaken. I don't know what kind of difference that would make on pressure but I assume that means that the tubes are not air tight and actually breathe.


Hyper-loop requires 99.99% of the air to be removed from the tube, so it is complete vacuum from the lethality / safety and structure / pressure perspective.

I am not sure what do you mean by 'ubes are not air tight and actually breathe', but they definitely are not air permeable.


Depressurize the tube first.


It looks like barely faster than Pandas?


Hey, Pandas wrap heavily optimized C and Fortran code, with a thin layer of Python interface on top.

This thing is pure Julia.

This being any faster than Pandas is a huge compliment to Julia the language in general and its JIT compiler in particular.


> This being any faster than Pandas is a huge compliment to Julia the language in general and its JIT compiler in particular.

Indeed. This 'whole stack under the same language' is an important feature to have. You get to reap the advantages of an improved JIT. End to end autodiff is easier. Some of these things are a problem, for example, in PyPy because of the Python <-> C bridge.


Which reviewers do that?


Two come to mind immediately: https://www.tomshardware.com/ does. German magazine c't at least did, haven't looked at their reviews recently.


http://www.jonnyguru.com/ Has always done some pretty in-depth electrical profiling of PSUs. I usually check them when I need to buy one.


Tweakpc, hardwareluxx, c't, computerbase and probably a few more all use pretty high end ATE (Chroma loads and such) for their PSU tests as well.


c't still does very in depth testing like that when they do a larger PSU lineup test, though not for smaller individual tests.


SingleFile can do it.


> Are everyday consumers harmed by Google’s practices YES

How are consumers harmed by Google presenting extracted data in an infobox? Isn't it more convenient?


I think what author said is explained in the article, as that such approach undermines small businesses which provide informational services. They won't be able to hire data analysts and researchers anymore, hence quality of information in info boxes will decline as information gets outdated. In other words Google is stealing data presenting as it's own taking all the benefits of embedding ads data


The consumer is harmed because there is no one incentivised to create new content, or at least the incentives are severely diminished.

In the story here the celebrity net worth data had to be created and this was worth doing due to the ad revenue. Making the existing data available to consumer is a benefit but the negative is the lack of new content. So now consumer have easier access to old, inaccurate data.


In this instance, yes, it's convenient for the user.

In the global scheme of things, it kills innovation and competition, so that hurts the end user.


You don't get the traffic -> you don't earn money (google does).


Is convenience the only axis that we care about now?


> Certainly better than closed source Windows 10 and OSX.

How can you tell?


By looking at it, literally.


How can you compare?


Can know for sure vs nobody knows. The comparison is clearly in favor of Linux.


The windows source code is actually readable for very large organizations and governments.


But can they build it and run it? Or do they have to trust the code is current and matches the binaries?


I would belive so. Probably possible to compile and debug but not distribute. There is little information about it. https://www.microsoft.com/en-us/sharedsource/


But not the White hat hacking world.


> Can know for sure

can know what -- that there isn't a backdoor? I can look at Linux source all day and not find the answer to that.


We, as a community, can.

One dedicated person, can.


> The comparison is clearly in favor of Linux.

Magnitudes of more people use Windows and macOS than Linux* and they have yet to fail catastrophically.

* not counting servers and embedded


There are far more devices running Linux in the world than Windows & macOS combined. That would seem to be a much more useful comparison than how many people own those devices.

Parent post was updated to say "not counting servers and embedded", but dismissing smartphones -- literally the most popular type of personal computing device in the world -- this way seems to completely invalidate the point.


I dunno, why do you say that?


The parent thread was about possible backdoors; more devices running a piece of software = more surface area for any possible backdoor in that software.


One thing is that anonova doesn't control the anonova namespace.


sure but who is going to steal it?

it seems easier to do that for the common case then deal with the complexity of namespaces


Fair enough.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: