Hacker Newsnew | past | comments | ask | show | jobs | submit | Cheeeetah's commentslogin

People who think it as merge are undoubtedly mostly Chinese.

> most of them have good relationship with China

I can enumerate more than half of the neighbours of China who has territorial disputes with it.


> US big tech is basically US government military tech arm.

Completely different from that of China. US big tech are own by individual organizations out of US government and cooperate with it. Huawei benefits people from CCP directly.


> either top students or really hardworking students, and most of them will be excellent engineers and scientists

Only true for PhD students. Most are just from rich/CCP's families.


Xi Mingze. Harvard. You don't know just because you don't really care about it. The info is on Wikipedia.


Seeing emacs for aarch64, I recall that Voidlinux still lacks non-x86 machines for prebuilt packages.


Screen sharing needs pipewire. My personal experience with pipewire is fine through, just lack good documents, and finding required softwares for screen sharing itself can puzzle quite some people, so far from easy-to-use.


Don't represent everyone.


There is M.2 E-key, so bluetooth should come from the wireless card.


> keeping ~17% of the world's population under their health/monitoring umbrella

This has not seriously happened.


Yeah... I guess thats an issue. WHO cooperating with China when push comes to shove may be a total fantasy.


- Unlock bootloader as phone manufacturers should not be trusted. Even if the ROMs manufacturers provide are open-source, the firmwares are usually not.

- Unlocking bootloader also makes the phone receive secure updates again.

- Firefox is a great browser that can resist fingerprints. The sandbox function on Android should be achieved by restrictions on permissions and storage isolations.

- Traffic over Tor is also much better than just over telecommunicator. A small fraction of non-privacy nodes is also not a problem as routes are always changed, and how can a organize contorl most nodes?


I recently installed GrapheneOS on an old Pixel and recommended practice was to relock the bootloader after unlocking it and installing a custom OS, which is supported on Pixels.


An unlocked bootloader makes the phone vastly more insecure (see https://news.ycombinator.com/item?id=35790499). Phone firmware cannot be fully open-source nowadays due to manufacturer restrictions. Even the most open-source Android fork will still have to include binary blobs from e.g. modem manufacturers.

Additionally, the updates that the forked OS provides don't include firmware updates for essential parts like the modem (this is also the reason why phone updates are not available in the first place). So it's essentially a security theatre.

Firefox doesn't use per-site isolation, doesn't use process sandboxing and - on top of that has a JIT, so there's W^X violations. Normal app sandboxing via Android permissions is not sufficient for something as complex as a browser. The potential for possible exploits inherently is massive. Other browsers (chromium-based) like Vanadium have very sophisticated sandboxing, so there's no reason to use something inferior.

Traffic over tor is good, but shouldn't be used with authenticated services, as it deanonymizes your connection. Instead, it should only be used for specific (unauthenticated) actions, like browsing news.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: