Hacker Newsnew | past | comments | ask | show | jobs | submit | ikmckenz's commentslogin

This is different than push data, which already does not contain any content or metadata in Signal. This is about local OS caches, whereas for push notifications Signal only sends a push saying “message received” which wakes the device up and triggers the device to pull the message from the server over the regular e2e encrypted path.


I really want a small SBC with USB-C DP Alt mode that I can stuff into a ~60%ish mechanical keyboard-sized case to make into a headless laptop thing so I can justify buying some display glasses like the XReal One or similar. Seems like it would be the ultimate travel computing solution.


That's precisely what I want. I've got all the parts other than the SBC. Even designed my own keyboard with this in mind. You can do it with a pi zero 2 but going from mini-HDMI to full-HDMI through an adapter to USB-C to only then pop out too the XReals is a complete mess of cables and little boxes, not least of which is caused by the HDMI->USB-C adapter needing to be independently powered. I'm tempted to print up a case to hide the mess but it's still, you know, a mess.

Also the zero 2 is a little under-powered. It's fine as far as it goes, it just feels like there's probably performance on the table with a more modern chipset.


Parent comment was talking about relay nodes, not exit nodes. The risk of running a relay node is essentially zero in a free country.


I appreciate the correction. It's been so long since I've looked at tor that I guess I forgot that relay nodes were a thing and conflated the two terms. Or maybe the coffee hadn't started working yet.

So with the correction, I agree completely: Running relay node (a thing that deals only with indecipherably-encrypted anonymized data) is not a meaningful risk.


IP addresses of relays are still known in the network, and IP reputation firms may flag your IP as potentially suspicious. This may or may not cause issues when dealing with orgs that filter based on "known bad IP address" lists. I've had it happen before, where everything was fine until a few days after running a tor relay (not an exit node, just a relay) everything suddenly wanted more verifications I was not a bot, some paid video services started blocking me, and a few other issues. Stopped running the node and later things cleared up.


Lists that include Tor relays are completely bogus lists, and most but not all people know this.


It doesn't matter if you or I know it, the problem is when a vendor I'm wanting/needing to use is ignorant to the quality of their list they're using to block stuff.


I think the hosts that Tor recommends against because there are already so many nodes hosted on them like OVH and Hetzner are perfectly happy with their (quite good) reputations.


That’s almost what we already have with the CVE system, just without the legal protections. You report the vulnerability to the NSA, let them have their fun with it, then a fix is coordinated to be released much further down the line. Personally I don’t think it’s the best idea in the world, and entrenching it further seems like a net negative.


This is not how CVEs work at all. You can be pretty vague when registering it. In fact they’re usually annoyingly so and some companies are known for copy and pasting random text into the fields that completely lead you astray when trying to patch diff.

Additionally, MITRE doesn’t coordinate a release date with you. They can be slow to respond sometimes but in the end you just tell them to set the CVE to public at some date and they’ll do it. You’re also free to publish information on the vulnerability before MITRE assigned a CVE.


Yeah, something like that, nothing too much, just to exclude individual to deal with evil corps


Your opinion is that Apple should have just handed over Jamal Khashoggi‘s information to the Saudi Arabian agents who were trying to kill him, because then Saudi Arabia wouldn’t have been incentivized to hack his phone? I think you’ll find most people’s priorities differ from yours.


OpenSSH has been moving quite quickly in the direction of multiple, privilege separated processes, each also heavily sandboxed with pledge and unveil


As of 2025 OpenBSD has support for AMD SEV and SEV-ES, with support for SEV-SNP work-in-progress, so with the right hardware yes it's able to isolate itself sufficiently https://www.bsdcan.org/2025/timetable/timetable-Confidential...


> very deep interests in things i was completely unaware that they existed ... say goodbye to the cognitive ability of a large chunk of future generations

I would think very deep interests in niche or obscure topics is correlated with increased cognitive ability, not a decrease.


anime waifus?


> very deep interests in things i was completely unaware that they existed

That's just a symptom of getting old. Young people always find stuff that baffles adults. When I was a teenager, Anime itself was like this - just being "into" anime was considered some kind of bizarre, obscure affectation by adults.

I think smartphones present real challenges (and I don't get how/why they're allowed in schools), but a lot of what you're describing is normal.


Is this comment AI written?


You’re absolutely right, that’s a great catch /s


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: