Hacker Newsnew | past | comments | ask | show | jobs | submit | krater23's commentslogin

I don't think the the conclusion is right. It's just that the security had cost money, why pay a developer for 5 days when he can do it in 3 without proper security? There is no proper security needed, so don't pay for it. And thats exactly the same that happens with bigger software too. As long as it doesn't creates pain for the seller to sell insecure tools, they will stay insecure.

> What would stop someone from building their own printer and building and selling printers to others who don't have the skill set?

That it's easier with this skillset to build guns and sell them to criminals when the penalty is the same.


Except selling the printers as plain printers without any restrictive AI firmware or other has a thorny abstraction layer in between that and convicting someone of actually making firearms and selling direct. The printers are universal machines within the parameters of additive processes. Silly proposal this "blocking technology" written by people with no analytical thinking skills.

Tried the same, doesn't do anything on my scanner. Interestingly, there are regions of banknotes my scanner refuses to scan. But had no time to investigate further.

Some more tests on this old page: https://murdoch.is/projects/currency/ (2004)

Nope. The first home computers like the C64 had RAM and sectors on disc, which in case of the C64 means 256 bytes. And there it is again, the smaller base of 1024.

Just later, some marketing assholes thought they could better sell their hard drives when they lie about the size and weasel out of legal issues with redefining the units.


This has nothing to do with the 1024, it has todo with the 1200 and the multiples of it and the 14k and 28k modems where everyone just cut off the last some hundred bytes because you never reached that speed anyway.

How else would you secure skynet against Sarah Connor?

As long as you do regulary updates of your debian stable, you are not secured against supply chain attacks.

I don't think you understand Debian. There's a new release every 2 years. A few months before every release there's the so called package freeze on the testing branch. The version the packages are on at that point that's the version they will have for the next stable release. Between releases the only updates are security updates.

Do you mean I should worry about the fixed CVEs that are announced and fixed for every other distribution at the same time? Is that the supply-chain attack you're referring to?


Supply chain attacks have impact on more systems, so it's more likely that your system is one of it. Opening a poisoned textfile that contains a exploit that attacks your text editor and fits exactly to your version is a rare event compared to automatically contacting a server to ask for a executable to execute without asking you.

Never had this issue. Its just as simple as start to work without contract and the promise of department head to get a contract and after two weeks mention to the contracting that you work since two weeks and have still not signed a NDA.

Next sentence is: I don't fear to not get my money, but currently I don't know if you pay or someone else...


compiler error: `since(time_point_t)` cannot be called with `time_duration_t`

were you trying to use `for(time_duration_t)` ?


Which emergency can happen that I really want this? And now don't say suicide attempt. Nearby all emergencies that could happen where someone needs my exact position are things that would additionally lead to a loss of the base connection or a switched off smart phone.

Car accident? Broken leg while hiking? Mugging? Slip and fall on icy sidewalk?

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: