Hacker Newsnew | past | comments | ask | show | jobs | submit | Drygord's commentslogin

Linux is vulnerable too (but not as vulnerable as windows of course) it’s just not targeted by hackers because it’s market share is so small. That wouldn’t be the case if, say, half of all users ran Linux.


There are far more servers running linux/bsd than there are Windows.


It's market share on servers (a juicy target) is not small at all.


And that sees plenty of attacks too. But here Windows wasn't under attack or a Windows vulnerability exploited, CS just fucked up and companies were stupid enough to put all their trust in CS.


It’s constraints on memory management basically will never allow that to happen.

It lures people in with “use any allocator you want”! Which only appears as freedom of choice when reality it’s locking the user into the same paradigm of memory management that has given C a bad name to begin with.


1/3 of the problem with c memory management is null unsafely, not a problem in zig. 1/3 more is conflating arrays with single item pointers. Also not a problem with zig. The only memory management "issue" with zig is lack of temporal memory safety.


On embedded systems you probably shouldn’t allocate at all.


Remember those good old fashioned windows that you could roll down manually after driving into a lake?

Yeah, can’t do it now: it’s all electronic.


I’m sure that lifts have been electronically controlled for decades. But why is Windows (the operating system) involved?


This is for critical infrastructure though. You AT LEAST test it out first on some machines


Same people who destroyed a US bridge recently.

This is the result of giving away US jobs overseas at 1/10th the salary


Do you have some more details?


They are tiny little fish humans don’t want to eat.


Yeah but it’s obviously the tiny little fish humans don’t want to eat.


Firstly, it doesn’t matter if humans wouldn’t want to eat them because they form a part of a food hierarchy that’s disruption ultimately damages humans. It also causes a cycle in which less wild fish is available and more must be farmed. Secondly, if you read the article you’d note that people do rely on those fish as a food source.


Obviously the people are eating the farmed salmon in place of the tiny fish. The “food hierarchy” remains completely untouched.


> Obviously the people are eating the farmed salmon in place of the tiny fish.

No they're not, read the article.

> The “food hierarchy” remains completely untouched.

I'm not sure how you've come to the conclusion that reducing the availability of food for wild fish leaves this system "untouched".


It’s clearly a zero sum system. Every farmed fish consumed by humans is one less wild fish caught and taken out of the food chain.

Would you also be concerned if there were more whales in the ocean? Because they eat literal tons of phytoplankton which is also a food source for other fish. I think you’re just refusing to see things logically.


The idea that you can reduce the complexity of global fishing, farming and marine ecosystems to a zero sum system is flawed. Whales cycle nutrients when they eat phytoplankton and aren’t comparable to human activity, you’re just trying to divert the argument to something unrelated.


I just press and hold backspace and try again from scratch


If you’re using wire shark you don’t also need mitm proxy. Mitmproxy is similar to fiddler/burpsuite in that they are high level traffic capturing tools whereas the with Wireshark you can inspect the actual TCP packets. It takes more setup as you’ve seen


Certainly true if the target application is running on the same host as Wireshark. But mitmproxy is very helpful when the device or application isn't fully under your control, for example if you can't set a proxy.

Mitmproxy also has a few features which make it a lot easier to use than wireshark alone, even if the aim is only to inspect TLS traffic. Including the wireguard server mode or transparent proxying for example.


Another approach is to route things through a managed switch and use port mirroring to get a the traffic. More expensive or not, maybe dependend on whether you have managed switches in the network or not. Less intrusive though.


Reverse engineering? More like “reading plain English”!

For a billion dollar corp that is some atrociously poor security


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: