Hacker Newsnew | past | comments | ask | show | jobs | submit | bslanej's commentslogin

I don’t even consider cyberattack a possibility since I assume all systems involved are completely airgapped. This was obviously something done from the inside.


> opened the schools to help communities of color

Farewell, racist schools. You won’t be missed.


What does open source have to do with this?


This is the kind of information projects need when doing FOSS operating systems and compilers?


That’s a really long stretch there.


Who, when creating new OSes focuses on really old, consumer, nothing unusual hardware?

Second, for compilers you have projects like LLVM that's like a framework for building compilers where those companies like Intel, AMD, Samsung, etc contribute.


Not everyone has the opportunity to only have new computers, especially in many third world countries.

LLVM shouldn't turn into compiler monoculture.


There will always be places devoid of normies, thankfully. They exist in every platform, new and old. Knowledge of dog whistles will be necessary though…


I’m too lazy to look it up but there was some string you could send over IRC that would make some routers drop the connection immediately - if you pasted that string in a big channel you would see dozens of people immediately disconnect.


An 0x01 control character (CTCP) followed by

    DCC SEND whatever 0 0 0
https://modern.ircdocs.horse/dcc#dcc-send

This caused the DCC ALG helper in ancient Linux kernels to close the connection, as they failed to parse 0 as a valid IP address. Users connecting to IRC servers over TLS were immune, as the ALG helper in the router could not observe the traffic.

This is what breaks DCC in general -- to use DCC on IRC while connecting to the server over TLS and behind a NAT, you must instruct your client to use a specific range of ports for DCC and preforward those ports to your machine in your router, as the ALG helper cannot mark the incoming connection as RELATED (and forward it through to you) as it cannot see the outgoing command that caused the incoming connection to occur. You must also instruct your client to determine the correct external IP address to advertise, as the ALG helper will be unable to rewrite it when the router does masquerading.


On AOL in chatrooms you could play sounds, so if you sent S{/con/con As the sound, you could crash anyone on windows that hadn't shut off user sounds.

My memory is a bit hazy and I don't want to look up the exact sequence, but that's close enough.


https://mazur-archives.s3.amazonaws.com/aol-files/breaches/c...

it was `{S /con/con`; my memory transposed two characters. the {S was the "system message" that AOL chatrooms used to send sounds, so that sequence of characters after a newline made your computer look for that sound. It was cool if everyone was trusted to not do the /con/con, people would have email chains with the audio files on them, like a proto-napster.


Have you tried using code generated by an LLM? It rarely runs at all until you fix it yourself.

It reminds me of how ezines would publish source codes to run exploits with slight errors so script kiddies couldn’t run them if they didn’t know how to fix them.


We’re talking about coding competitions here. These models have been fed the entirety of ACM, SPOJ, LeetCode, and whatever other competitions they can get their hands on. They are good at constrained coding competition tasks, and certainly strong enough to place highly in a competition meant for high school students.


> Have you tried using code generated by an LLM? It rarely runs at all until you fix it yourself.

In College Humor's Brennan's exasperated tone:

THEN WHAT ARE WE DOING!?

Like Jesus fuck. I feel insane. We scraped the internet, broke tons of trust in our community, fed tons of code we didn't ask for into an industrial shredder, and worked out nonsense generators that can make awful code that barely, and apparently sometimes just doesn't work, burning enough electricity to power several small countries in the process and lighting billions of dollars on fire.

What, and I can't stress this enough, the fuck are we doing anymore. I swear to God the entire valley needs to be pushed into the ocean and humanity will lurch forward 200 years.


That’s hyperbolic. An LLM gets you like… 90% of the way there. That’s much better than the previous baseline of 0%


To be entirely fair, that's the same experience I've had with some coworkers.


How do you “accidentally post a photo”?


It's possible to accidentally post something, or have it swiped by many of the untrusted and untrustworthy applications on a PC or mobile device.

It's even easier to unintentionally include identifying information when intentionally making a post, whether by failing to catch it when submitting, or by including additional images in your online posting.

There are also wholesale uploads people may make automatically, e.g., when backing up content or transferring data between systems. That may end up unsecured or in someone else's hands.

Even very obscure elements may identify a very specific location. There's a story of how a woman's location was identified by the interior of her hotel room, I believe by the doorknobs. An art piece placed in a remote Utah location was geolocated based on elements of the geology, sun angle, and the like, within a few hours. The art piece is discussed in this NPR piece: <https://www.npr.org/2020/11/28/939629355/unraveling-the-myst...> (2020).

Geoguessing of its location: <https://web.archive.org/web/20201130222850/https://www.reddi...>

Wikipedia article: <https://en.wikipedia.org/wiki/Utah_monolith>

These are questions which barely deserve answering, let alone asking, in this day and age.


I read the "accidentally" as applying to the "identifying" not the "post", although I agree the sentence structure would suggest "accidentally" as a modifier for "post" that makes a lot less sense.


A selfie with a snippet of building in the background might give away your location even if you think there's no way it could be locatable.


Did you somehow accidentally share a selfie?


You're being intentionally dense. No, people don't accidentally post pictures but they often do post them with the intention of showing a certain thing, e.g. profile picture, something for sale, something related to hobbies, household repairs, whatever. All of thse are posted with intent to include a certain object but may include background info that the poster did not consider.


>it's like saying "hey I got free lemonade here, but you can't have it unless I decide I like you first."

Which is completely reasonable, you may need a different analogy.


More like they love their content so much that they think those who want to read it would endure that penance.

If you are seeing ads it’s probably because you inadvertently disabled your ad blocker or it’s not properly configured.


First, to download the world of Warcraft client, you need to log into the battlenet client, which requires an account. Second, the world of Warcraft client is completely useless without a server to connect to. Alternative world of Warcraft servers are technically possible but illegal to run.


Implementing a network protocol is not illegal. Neither is writing a server.


You have to reverse engineer the protocol encryption, which is illegal in some places. Also, lots of copyrighted material such as NPC names and quest text must be stored in the server and transmitted from the server to the client, which is piracy in plain terms.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: