Hacker Newsnew | past | comments | ask | show | jobs | submit | Shendare's commentslogin

So... the electric company can't become a monopoly because you can spend the money and effort to create your own electric company? How can that not be said for anything anywhere that becomes an obvious monopoly?


> How can that not be said for anything anywhere that becomes an obvious monopoly?

I can't hook up my own ISP or manufacture my own prescription drugs quite as easily as I can put up solar panels or buy a generator.


What exactly are you proposing goes in this generator?


> What exactly are you proposing goes in this generator?

Whatever fuel you have access to that's cheapest. For most people, that will be natural gas or propane.


So we're back to buying fossil fuels from a third party


> we're back to buying fossil fuels from a third party

If we ignore the non-fossil fuel solution mentioned, yes. The point is it's a weak natural monopoly due to multiple alternatives.


Yes that's basically the definition of not beeing able to becomes a monopoly. Any old joe can compete with you.


In addition to the non-cookie fingerprinting mentioned by others that can happen, there is a loophole in the GDPR cookie control legislation that allows "legitimate interest" cookies to continue to be placed and tracked when you click Reject All.

You have to edit your cookie preferences for the site (assuming they provide the option) and deselect Legitimate Interest cookies proactively in order to block them.

This recent write-up on Reddit alerted me to this information:

https://www.reddit.com/r/YouShouldKnow/comments/14ddk4u/ysk_...


This is wrong. Cookies are covered by ePrivacy, article 5(3), not GDPR. There are two regimes for cookies: strictly necessary ones, and others, requiring consent. The fact that disabling “legitimate interest” cookies does not break the service should tell you that they are not strictly necessary.

GDPR enters the picture when cookies are used to identify users. And using the “legitimate interest” basis for ad purposes is illegal, and instead will require consent. Adtech is just hoping that users won't notice and lodge a complaint.


Thank you for the correction!


I have somehow never gotten around to throwing away the box of ancient floppies I've got in a closet from ages ago, and the Windows 95b (OSR2) installation disks I made were still in it, complete with custom color printed labels I splurged on.

https://i.imgur.com/iVNVleR.jpg

The media I copied from took up 28x 3.5" HD floppy disks. It's possible they were copied from what was originally a CD-ROM. I don't remember clearly anymore.

Note: I'm not trying to refute or correct your 13-disk figure, which was clearly a different installation set, and likely original Windows 95 rather than my OSR2, which came out around 1997.


I am a layperson, so the answer is probably painfully obvious, but why can't e-mail have TLS-style key exchange, where the sender's server gets the public key from the recipient's server and encrypts the message with it before sending it over?

The recipient could keep their private key secure so that only their client could decrypt the messages, and take the risk of losing access to those messages if they lose their private key.

Or they could let their provider hold onto a copy of the private key so they don't ever have to worry about losing it, with the trade-off that the provider could decrypt their e-mails.

But either option requires zero user interaction on the sender's or recipient's part past "login and send" or "login and receive", while limiting decryption to the recipient and maybe their provider.


You could, but you're dropping the qualification of end-to-end encryption.

Brainstorms of a (mere) hobbyist:

Some might reason that that yields additional hardening to traditional TLS-enabled webmail applications.

On the other hand, that is more architectural design and work shifted away from the endpoints (and wasted, complex efforts with no added benefit if improperly implemented by the provider).


One more brainstorm,

The provider can serve key escrow and still have the end-user application perform the encryption, which may or may not technically qualify. It certainly wouldn't fly without skepticism in a popular service/standard.

I haven't looked into it deeply enough to present a confident statement either way.


The keys don’t come from the servers but from the end users, so the remote server won’t have the remote user’s key.

> Or they could let their provider hold onto a copy of the private key

Then the key is no longer private. The idea of a private key is not to share or distribute it.


Why can't somewhere.com have the public key for user@somewhere.com and serve it to other e-mail providers on request?

Letting one's provider hold onto the private key doesn't provide the same level of security as the user being the only one with it, but it's a helluva lot better than not bothering with encryption at all.

Private keys can also be protected with a password, right? So the provider could have a copy of the private key but not the password to utilize it. The user would just have to never forget the password as opposed to never losing their private key to a hard drive failure or whatever.


> Why can't somewhere.com have the public key for user@somewhere.com and serve it to other e-mail providers on request?

They could, but then somebody would have to deliberately request it. That would also mean adding a separate transmission/protocol different from the email protocols routing the messaging. That is a more streamlined process, but still not fully automated.

The only way to ensure adoption is to force onto users as an automated check of the primary protocol like the handshake of TCP. Even then you should still have to account for SPAM and anonymous users you don't want to exchange keys with.

Yes, private keys can be issued with a password. That is not an excuse to disperse your private keys though, because that password can be brute forced and then a criminal can access any account using that key set provided they aren't further blocked by something like 2 factor authentication. The password is just there as added security for things unintentional disclosure or unintended access, but not as a primary means of security.


"Targeted" for me would imply that Windows is checking first to see whether Firefox is installed, and only showing the suggestion if so.

If this is just a general suggestion that gets pushed out to all Windows computers, then it's not so much targeted as merely questionable use of platform.


I would be very surprised if it was just pushed out irrespective of telemetry. Since Windows 10 is a mass-market operating system, I'd be surprised if 1% of their users had ever heard of Firefox.


Since Firefox usage share on Windows is >1%, I'd be pretty surprised if most of those users are inadvertently using Firefox without every having heard of it.


It shows up if Firefox is your default browser


Plausible line of thought.


Though in this case mitigated by the split between .docx (macro-less) documents and .docm (macro-enabled).

Either file type can also be unzipped and have their contents inspected for anything suspicious.


Norton Utilities, XTree Pro Gold, and Borland Sidekick were the tits on MS-DOS.


https://www.wikidata.org/wiki/Q7167193

Percussive Maintenance

(uncountable) (humorous) The use of physical concussion, such as a knock or a tap, in an attempt to make a malfunctioning device or person work.


Device or person? I've been tempted on the "or person" part, but never actually tried it...


"Beatings will continue until morale improves"


Pete Conrad famously had to smack around some surface experiments during Apollo 12.


Such is the difference between an emoji and an emoticon.

https://writingexplained.org/emoji-vs-emoticon-difference


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: