Hacker Newsnew | past | comments | ask | show | jobs | submit | thefrozenone's commentslogin

Would byte for byte build reproducibility address this?



That's good to know. Given that, I don't understand the suspicion of Google Play (App Store, sure).


Signal's reproducible builds are not maintained well. Many versions have been released without anyone noticing the mismatches, until a user reports it.


How did you find out? (If you're able to share)


Open source intelligence. From the ASN to IP ranges, and onwards to old messages on mailing lists, where the headers leaked the fact that the person sent email from WYLTK, and the person was publicly associated with the FBI by way of speaking gigs.


Children of Men was a documentary.


You should at least mention what city you lived in. Your initial comment is hardly credible. Lots of people have ridden buses for more than 18 months in their entire life and appreciate it.


I've had an interesting time transitioning our project from OpenCensus to OpenTelemetry now that the former is EOL'd. We use the otel stackdriver output. Anyone have a refernce comparison between GCP cloud metrics vs. a prometheus monitoring stack?


I did use stackdriver for quite a while before I moved to Mimir. TBH its great that you are still sticking to opentelemetry. Stackdriver as metric storage is not even a wise option in todays world give there are some really good TSDB providers SaaS or otherwise that would do a much better job.

I moved away because of 2 primary reasons

1. The cost of stackdriver can add up with large-scale deployments or high-frequency metrics. It's essential to monitor and control usage to avoid unexpected billing.

2. I have experienced delays in metric updates, specifically at high frequency data. While the delays are usually minimal, they may not be ideal for some real-time monitoring use cases. FYI GCP on its own resources makes metrics available after 210s so you are always behind.

Going the TSDB route to reliably run storage has worked for me.

Also if this helps https://last9.io/blog/time-series-database-comparison/


I'm surprised there's such little hardware (just a small PCB) in the Nest. Appreciate that source tweet puts "jailbreak" in quotes, it's a board replacement in the shell of Google Nest peripherals.

Are there other smart assistants that we can now get for cheap, that have usable and rootable hardware on them to run custom LLMs?


> ... such little hardware (just a small PCB) in the Nest.

> ... have usable and rootable hardware on them to run custom LLMs

All the heavy-lifting is done on the server, hence the board replacement—no need to root. Install your own board with your own firmware which communicates with your own API/servers—where all heavy-lifting is done.

"smart assistants" are glorified iOT microphone/speaker combos which get all their magic from their connected microservices. A warrantless wiretap, if you will.


I don't think it makes any sense to be running custom LLMs on-hardware on these devices. They're too small and too low power to be doing so. It makes a ton of sense to hack their small, specialized hardware for speech-detection to forward that to your own servers, though, and I'd love to see that article.


It may also be that poor people have their services (drivers license renewal, K-12 school, apartment maintenance requests, welfare, job interviews) "improved" by AI while the affluent get to talk to a human


The jetsetters could very well have their personal assistants decide whether/how to interact personally with AI in the wild, or rather to have one of their own local personal AI sub-assistants take care of it.


TikTok is being singled out for having uniquely bad data practices, which is true, but banning a single app won't solve the larger problem. This 1-off is a distraction from Congress's inability to pass real data protection legislation, and will only serve to benefit Reels and Shorts (not smaller competitiors, nor consumers).


TikTok is being singled out because it’s controlled by an adversarial government which the US may very well go to war with in the near future.


if America goes to war with China then we're all dead


Not to be overly pedantic but China does not have the capabilities to inflict damage to the U.S. commensurate with U.S. nuclear capabilities.

I believe this implies that escalation would be limited and probably wouldn’t involve substantial incursions into either mainland China or the U.S.

The scale of consequences of a nuclear exchange with Russia remains much more worrying at the present time.


So the U.S. nukes aren't "Made in China"?


By painting car shows as gang activity and by emphasizing the angry neighbors, the article has painted this entire genre of social gathering and an entire circle of enthusiasts as antisocial, and in need of policing.

Instead of thrilling mass gatherings that push the limits of our car infrastructure and actually do something new and innovative with it (for once), cities will be hollowed out, denuded of their culture, so that sleepy suburbanites can move in and lodge noise complaints. Urban revival will only mean basic bitch breweries and putt putt, instead of mass gatherings of poor workers, with rowdy music and sizzling fajitas.

https://illwill.com/sideshows-and-wayward-lives


Doing donuts in an intersection pushes the limits of our car infrastructure how exactly?


Imagine if an intersection was shut down for 3 weeks, or maybe 3 decades. Every night, it threw the best party you’ve ever attended in your life. Instead of being a place where you commute every morning and think about how cool it would be to quit, that intersection becomes the place you meet your best friends, or make the happiest memories of your life.

Cars and roads don’t just kill and maim us. Their psychic operation on us makes it impossible for us to dream.


You could say that about literally any place, anywhere. Shut it down and meet your best friends there and make the happiest memories of your life.

You could meet in a Walmart parking lot. You could meet in a field. You could meet at a race track.


It led to the invention of these hard rubber dots that were meant to stop donut-doers. They don't work though...

https://www.nbclosangeles.com/news/local/those-newly-install...


Interesting article and thanks for posting it. I've been curious about that aspect of car culture since I have been rebuilding a Chrysler 300C and searching on youtube for how-to videos often brings up sideshows. Its been fascinating.


How does this tool go from a vuln. in a library to -> a set of affected functions/control paths? My understanding was that the CVE format is unustructed which makes an analysis like this difficult


We added support to the Semgrep engine for combining package metadata restrictions (from the CVE format) with code search patterns that indicate you're using the vulnerable library (we're writing those mostly manually, but Semgrep makes it pretty easy):

    - id: vulnerable-awscli-apr-2017
      pattern-either:
      - pattern: boto3.resource('s3', ...)
      - pattern: boto3.client('s3', ...)
      r2c-internal-project-depends-on:
        namespace: pypi
        package: awscli
        version: "<= 1.11.82"
      message: this version of awscli is subject to a directory traversal vulnerability in the s3 module
This is still experimental and internal (https://semgrep.dev/docs/experiments/r2c-internal-project-de...) but eventually we'd like to promote it and also maybe open up our CVE rules more as well!


Here is a good writeup of some of the pros and cons of using a "reachability" approach.

https://blog.sonatype.com/prioritizing-open-source-vulnerabi...

>Unfortunately, no technology currently exists that can tell you whether a method is definitively not called, and even if it is not called currently, it’s just one code change away from being called. This means that reachability should never be used as an excuse to completely ignore a vulnerability, but rather reachability of a vulnerability should be just one component of a more holistic approach to assessing risk that also takes into account the application context and severity of the vulnerability.


Err, "no technology currently exists" is wrong, "no technology can possibly exist" to say whether something if definitively called.

It's an undecidable problem in any of the top programming languages, and some of the sub problems (like aliasing) themselves are similarly statically undecidable in any meaningful programming language.

You can choose between over-approximation or under-approximation.


I saw that Java support was still in beta. But it makes me wonder if it's going to come with a "don't use reflection" disclaimer, then...?


My question too. All I see is this citation:

> [1] We’ll be sharing more details about this work later in October. Stay tuned!


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: