Hacker News new | past | comments | ask | show | jobs | submit | Nanzikambe's comments login

Yes, I'm in France, I contacted the Italian reseller for this company:

https://www.freedomwon.co.za/

I got this instead of a powerwall because 1) price per kwh 2) tesla will not let you install your own powerwall, you need to go through an installer and attract all those associated costs (which are significant) 3) better integration with a mixed solar equipment install and pv array 4) powerwall does not support an offgrid installation, or at least did not when I looked into it 5) has canbus to a BMS, you're never obligated to connect to the internet


Direct sunlight near equator would be a hard no for anywhere you want to work. Much rather have large/deep overhangs as this building has and most house designs integrate so you have indirect sunlight for most of the day. It will still be very very bright inside with ambient light refracted inward


Victron's Multiplus and Quattro are drama free. I buried and conduited/sealed all my cabling and had zero issues.

Added bonus: if you use them with a CCGX and are comfortable with MQQT and/or Python there is literally nothing you can't control, automate or visualise with them. The CCGX itself is arm + linux and mostly open sourced https://www.victronenergy.com/live/open_source:start

The downsides are: 1) price but imho you get what you pay for many times over. 2) veconfigure for the multiplus itself is windows only, but runs fine in Wine on Linux and Mac


The headline claim is demonstrably poorly researched and as others point out the project seems to be incredibly poor value.

There's a lower tech approach that's been extensively proven and in production since 1998, it produces not just veg, but firewood/biomass, shrimps, fish, fresh water and more:

http://articles.latimes.com/2001/jan/06/news/mn-9169 https://www.youtube.com/watch?v=_P1rPnVUME4


Agreed. After reading the snippet of the manuscript in the OP's screen-shot this sprung to mind:

http://www.telegraph.co.uk/culture/10049454/Dont-make-fun-of...


See my comment here - https://news.ycombinator.com/item?id=12314100

Also, English is not my native language. In fact I wrote and published the novel in Spanish first (https://www.amazon.com/dp/B00I1EU1Q0). I didn't trust my English enough to translate it myself, so I hired a translator to do the job. The result is OK but I have the feeling I could have written it better! FWIW, I'm probably going to write whatever I write next in English.


If you don't mind revealing this information, which version is doing better?


They're both rounding errors, to be honest!


Oh that is golden. "The critics said his writing was clumsy, ungrammatical, repetitive and repetitive." Apparently DB isn't an Oxford comma man?


The lack of additional detail in this very sparse announcement really compromises users' ability to damage control effectively.

Would like to know if an installation is vulnerable if:

    1) If Applications, PDF is set to "Always ask"
    2) Ublock and/or privoxy are used
    3) Javascript is disabled
    4) pdfjs.previousHandler.alwaysAskBeforeHandling == false
    5) pdfjs.disabled == true
Also which advertising network and which Russian site would be helpful for blocklists.


Hi,

I reported this 0-day. It used a PDF.JS same origin policy violation to access local files. You should be safe because you have javascript disabled and pdfjs.disabled set to true. There's no way for the script to run. It was on a international news website operating from Russia. The exploit was not on an ad network. The exploit was simply injected on every news article page through an iframe. Therefore I assume the news site was compromised. It could have been deliberately injected by the website operators, but I highly doubt it. The exploit targeted developers or tech-savvy people. On Linux, it targeted the contents of the ~/.ssh directory and some other sensitive files. I should say that I am not a security expert and I came across this 0-day by accident.


Please identify the exact international news website. Was it rt.com?


No it was not. I'm not sure if I should mention which website it was (yet). The exploit is still active. I am trying to get in touch with them to get it removed.


> The exploit was simply injected on every news article page through an iframe

Was the "src" of the iframe 3rd-party to the web site? I want to know whether merely blocking 3rd-party iframes would also have prevented the exploit from working even if javascript is not blocked.


Yes it was so it would have prevented the exploit from loading.


Do you know if NoScript with javascript disabled but iframes allowed and pdfjs enabled would have stopped it?

A vulnerability test would be really nice but I understand why it doesn't exist yet.


It would have stopped it. Js has to be active for the exploit script to run.


My thanks for reporting it and this clarification


Agreed, I use an ad blocker and have Firefox's PDF viewer disabled and I have no clue if I'm still vulnerable. At a minimum, I'd like to know if disabling the viewer is enough to mitigate the risk, or if popular add-ons like Adblock Plus, NoScript, or Privacy Badger are enough.


Totally agreed. I use a few of those, and I have exempted pdf.js in the past because I would rather use that then native PDF readers on my work laptop, since Adobe Reader/Acrobat is a wonderfully famous vector.

Inquiring minds would like to know.


Happy ubuntu phone user here (E4.5) will probably skip the E5 and wait for the next one if it's beefier in spec.

The only gripes I have with Ubuntu touch atm are:

1) Lack of USB or Bluetooth tethering 2) Lack of USB or Bluetooth tethering 3) Lack of USB or Bluetooth tethering 4) Lack of FDE


you can have USB tethering but you have to install the terminal app :wink: for now http://i.imgur.com/KQZNl1v.jpg


Yep that works fine for my laptop. But I still need bluetooth tether for my android tablet. Sadly I still need that for essential apps (City Mapper, airline checkin apps, k9mail, chat secure)


FDE == Full Disk Encryption?


Yep, it's coming soon(tm) according to Canonical

source Mark's AMA: https://www.reddit.com/r/IAmA/comments/1j166z/hi_im_mark_shu...


Does it have wifi tethering?


Not yet


Am I missing something? Isn't their targetting of Xcode as massive as if they'd just announced they'd backdoored Gnu gcc?

I mean whether they've backdoored the regular version available to all or only those in use by specific developers, the implication (to me) would be that binaries/applications/etc produced would then be automatically backdoored or at very least weakened?

Disclaimer: I know zip about Xcode or dev in the Apple ecosystem


Agreed, though I doubt this is going to be a popular opinion. I've been steadily divesting myself of pretty much all Google products because of these sort of arrogant and obnoxious decisions.

First it was the won't fix VPN + countless other Android bugs, then repeatedly breaking Canvas in Chrome (why do I care about this? well Chrome auto-updates for 99% of users, so when they break canvas they're breaking sites) and not least the numerous platforms and products they introduced and then dropped despite vibrant & loyal user bases.


kvm/qemu + virt-manager, switched from vmware-server ages ago & never looked back.

Granted my needs are hardly enterprise scale, but may be worth you taking a look (if you haven't already)


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: