Hacker Newsnew | past | comments | ask | show | jobs | submit | sciencejerk's commentslogin

Do you own one? How is camera and audio and geolocation support? Decent?

The threat model I imagined here was:

1. Initial access to physical machine, most likely via phishing malware, reckless employees downloading untrusted content, or bad luck.

2. Malware looks for browser cookies, hoping to steal temporary credentials but instead gains persistent creds, which grant Jira access. People re-use passwords; malware tries this password against AdUser and any other systems or other corp user accounts it can find

3. Direct Jira access used to pivot, that custom Jira app is probed for app vulns (likely given design).


So with a better system the malware has to wait an extra couple hours to get the password (by dropping the non-password authentication cookie and making the user log in again), and it can still prod Jira in the meantime. That doesn't strike me as a very big difference. It's an improvement in security but not a big one.

More likely:

1. Get e-mail from boss, look at headers, find boss IP addy

2. Failing that, memorize boss office number or workstation tag, run stealthy network scan, do reverse dns lookup

3. Be a router, arp spoof mitm attack

4. ?????

5. Profit


On January 13th, I woke up to the news that Meta had another round of layoffs and my role specifically as a research engineer had been eliminated.

Sorry to hear that! Hope OP got a good sev package at least?


It's called a sev pak these days.

The GA functionality is already here with a crafted prompt or jailbreak :)

it's gone a bit unnoticed that they've stopped support for response prefilling in the 4.6 models :/

Internet Operator License: Coming soon to a government near you!

Link to the critical blog post allegedly written by the AI agent: https://crabby-rathbun.github.io/mjrathbun-website/blog/post...

we have routers that you can monitor traffic on

Most traffic is encrypted with HTTPS unless you can root every single device you own

we have microphone use indicators on mobile, and I would imagine it would be pretty clear if an app was uploading audio with even very basic monitoring tools.

Complicated smartphone OS, firmware, drivers might have bugs allow overrides of visual indicators.

Companies have also been known to secretly eavesdrop and not tell users before (Apple + Siri https://www.courthousenews.com/judge-approves-95-million-app...)


>Most traffic is encrypted with HTTPS unless you can root every single device you own

>Complicated smartphone OS, firmware, drivers might have bugs allow overrides of visual indicators.

This line of thinking gets dangerously close to unfalsifiable territory.

If apps are eavesdropping on us, where's the network data? It's encrypted.

But you can disable https pinning by jailbreaking/rooting? The spying logic automatically disables if it detects it's jailbroken/rooted.

Where's the jailbreak/root detection logic? It's buried in 9 layers of obfuscation so you can't find it.

What about microphone indicator? They found a 0day in both Android and iOS, or the two are complicit as well.

But we don't see any backdoors in AOSP? It's built into the hardware/baseband itself.

>Companies have also been known to secretly eavesdrop and not tell users before (Apple + Siri https://www.courthousenews.com/judge-approves-95-million-app...)

"secretly eavesdrop" implies they were intentionally doing it, when even the plaintiffs admit it wasn't intentional.


That is fair. I do not think anyone could feasibly could detect/extract the exact data sent, because of HTTPS.

However I was more thinking of simple things, such as disabling anything that SHOULD be communicating with the Internet and seeing if any constant traffic persists.

Now of course, some very small (e.g plaintext) traffic might be almost undetectable, however that would suggest that most of the data would not be able to be transmitted due to size.


You think AWS is better?

Scarily - yes, although not by much.

I've used all 3 major providers - AWS, GCP, Azure.

AWS is no gem... it also has it's own byzantine processes to sign up and pay for things. And it also doesn't support any real and reasonable way to stop spend when you hit limits (abusive practices).

But at least I can generally sign up for and consume a new service without hours and hours of debugging.

For context - Google own Gemini 3 utterly fails to figure out how to do something as simple as "access the image doodle feature" proudly marketed here: https://gemini.google/overview/image-generation/

It can't figure out how to do. Honestly, I still can't figure out how to do it, despite signing up for about 5 different products, and trying 4 different UIs. The closest I got was to their inpainting/outpainting UI on the legacy models in their image create studio.

And none of that involved creating a billing account, which I already had, and was required for 3 of the signups.

As far as I'm concerned, this feature is fake marketing. It doesn't exist. That's the "quality" level of GCP.


Exact reason I used none of these platforms for my personal projects, ever.

Who is comparing to AWS and why? They can both be terrible at the same time, you know.

From 3rd party AI app use?

Using a proxy to switch accounts

Evidence for this claim?

I had a 1990 Ford Taurus as my first car. I had got it used and I remember it being completely impossible to afford a new car at the time.

It was sticker price of $33,000 adjusted for inflation:

https://en.wikipedia.org/wiki/Ford_Taurus_%28second_generati...

I don't think it would even feel safe to drive at all compared to what we have got use to with modern cars. It broke down 3 times while I had it and stranded me on the road. No cell phone of course to call anyone.

These were the mythic "good ol days".


A few generations ago almost nobody could afford a car, now many low income families afford two.

Maybe cars are not cheaper, just easier to finance due to the modern credit systems?

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: