Hacker News new | past | comments | ask | show | jobs | submit | ahbyb's comments login

More context: https://www.theatlantic.com/ideas/archive/2018/10/its-not-fr...

I'd rather see nudity censored than criticism of religion, to be honest, so thank the Lord it's not Europe using soft censorship.


I think it's a great and funny publicity stunt, I don't know what exactly I should be mad about? Or the "won't someone think of the children" argument doesn't work both ways?


People are annoyed that footage from their home was used, without their permission or any payment to them, by Ring for adverts.

People are annoyed that footage from their family trick-or-treat session was used, without their permission or any payment to them, by Ring for adverts.

People are annoyed that millions of unregistered surveillance cameras are being installed with few protections or oversight. They're realising that creating a panopticon might also need to include some protection for how the data is used.


>People are annoyed that footage from their home was used, without their permission or any payment to them, by Ring for adverts. People are annoyed that footage from their family trick-or-treat session was used, without their permission or any payment to them, by Ring for adverts.

They should have read the terms of service. Really I'm tired of this argument. "X service should not exist because nobody reads the terms of service"? What about the people who read them? Why should they be deprived of using this service?

>People are annoyed that millions of unregistered surveillance cameras are being installed with few protections or oversight. They're realising that creating a panopticon might also need to include some protection for how the data is used.

People should be able to put whatever they want in their lawns.

Anyway I'm sceptical about this being actual footage from Ring; I'd say they recorded it with actors.


> They should have read the terms of service

A child puts on a costume and visits someone's home to trick-or-treat them. That child's image is now used by ring in adverts.

When did that child read and accept a ToS?

Where in the Ring ToS / Privacy statement does it say that they'll use Ring video for adverts? Please could you link to the page and quote the text?

I think my protection from being surveilled should not rely on my neighbour's ability to read and interpret a ToS.

> People should be able to put whatever they want in their lawns.

I tend to agree, but lots of ring cameras are installed so that they also capture stuff that happens off the installer's property. They can capture the neighbour's lawn and driveways, or they can capture the public street.


> The videos are pretty innocent, but it's creepy as hell that Ring decided to use video captured on Halloween as a PR stunt to show that, uh, Ring is always watching.


Of course Ring is always watching, that's why people buy those. I mean if I was a customer I would be pissed to know they are not watching


The product description says is for YOU (the buyer) to watch the cameras footage from anywhere, not for the company called ring or their employees; btw this stunt means they had to check a lot of cameras until they found outdoor ones (so the employees probably saw a lot of internal cameras inside childrens rooms among others)


Alex Zhu and Luyu Yang don't sound very Californian to me.


Neither do German (What you Americans call Jewish) or Russian/Ukrainian names sound English yet they are by far the biggest majority of your country way ahead of the Anglos. More likely than not a European American has its roots somewhere in Central or Eastern Europe.


Really? As both a SoCal and Bay Area resident name alone would tell me absolutely nothing about whether someone was a native to either area.


Their public LinkedIn profiles say that they went to university in China. They're Chinese.


Probably true. Of course, them being Chinese has nothing to do with where the startup was founded.


That's true, of course. However, every source I can find says that the company was founded in Shanghai, but ended up being more successful in the American than the Chinese market, and opened up offices in California. Most of the engineers are supposedly in Shanghai, though. One more detail is that the founders appear to have worked in Silicon Valley before founding the company.

Whether any of this makes any difference, as far as US law goes, I don't know.

1. https://www.businessinsider.de/what-is-musically-2016-5

2. https://www.reuters.com/article/us-bytedance-musically/china...

3. https://www.youtube.com/watch?v=wTyg2E44pBA


Is that a screenshot from iPhone where it says "5G"? I thought no iPhones supported 5G at all yet. What's going on?


It's a marketing ploy by AT&T to label some kind of slightly better (maybe?) 4G as 5G, kinda like when phones started to say 4G which didn't mean 4G LTE.


AFAIK this is deceptive marketing from AT&T: https://www.businessinsider.com/iphones-on-att-now-show-5g-e...


It's not really 5G; just an AT&T marketing gimmick. https://www.tomsguide.com/us/5ge-explained,news-29329.html


That doesn't seem to show how to install an XPI file locally? Unless I'm missing something that's some web interface from AMO


The original article only discusses a specific, non-standard (to me, at least – probably made more sense for IT departments) method that Mozilla is calling ‘sideloading’ will be disabled. Per the article, ‘sideloading’ is defined as putting an extension file in a special folder that results in all instances of Firefox on the machine automatically loading that extension.

In the page yorwba linked, it shows how to generate a signed XPI file that can be distributed and installed locally from that file in a more conventional manner (e.g. drag & drop the file onto Firefox’s Add-ons page).


> probably made more sense for IT departments

Yes, the older method of extension side-loading, supported at some point by Edge, Chrome, and Firefox, was for IT departments who created OS deployment images with software (incl. extensions) burned into them. Usually this was combined with Group Policy / Device Profile settings that made the extensions impossible to deactivate or remove ("force enabled") and potentially blocked any extensions other than those preinstalled.

I believe that all the browser makers have, at this point, reached a consensus that deploying extensions directly as on-disk files this way makes it 1. too easy for malware to just set itself up as seemingly "deployed by Group Policy"; and 2. makes it too hard for these extensions to be updated as often as they might need to be, or disabled if the browser-maker declares incompatibility with an API in them, etc.

What all the browser-makers seem to favor nowadays, for IT departments who want to do OS-image deployment, is an approach where the burned-in Group Policy will just list out a set of extension IDs that are to be force-installed and force-enabled; and then the browser itself will do the work of retrieving and installing them (but will still treat them like any other extension as it goes through the install process, vetting it for compatibility, upgrading it through its registered upgrade channel, etc.)

This means that every extension in these browsers now has to live in the browser's extension store—even if it's a private, just-for-your-own-company extension. (Which, honestly, there's not much to be said against; the "enterprise deployment" parts of app-stores don't usually force developers to go through pre-vetting before new versions are published or anything. It's just cloud hosting—with the proviso that, due to having download logs, the app-store can see if your "enterprise extension" has an install profile that looks more like that of a virus rather than an enterprise, and then blacklist it.)

Here's Google's documentation on the Group Policy settings that modern Chrome looks for, for comparison: https://support.google.com/chrome/a/answer/7532015?hl=en. Probably Firefox wants to move toward a similar model. And more power to them, honestly; right now, Firefox's extension ecosystem is far too easy a target for malware authors.


From what I know (and I've got quite a few self developed addons running), installing unsigned XPI files has not been allowed for a while. I've been uploading them to my profile in the add-ons developer portal and getting back the signed XPI file. I could be misreading this though so apologies if I jumped the gun here.


If you have to upload your addons to the internet before you can install them (even if it is to have them signed) that's hardly "local".


Signing is only required on official release and beta builds -- users on developer edition, nightly, and unbranded builds can opt-out of the signing requirement by flipping a setting in about:config.


There are no release (as in, non-Alpha) builds with updates, last I checked.

Developer edition and nighties are not release builds.

Unbranded builds don't get updates.


I worked around this with a script that patches the omni.ja zipfile to change the setting to require signing.

It needs to be unpatched for updates - I don't allow my normal day-to-day Firefox instance to write to it's own binary anyway. Firefox tells me when there is an update, and I then restart into my special script that unpatches, runs Firefox with permissions to modify itself and a profile that I don't use for day to day browsing, only for updates, and then patches it again.

Scripts to patch / unpatch it are here: https://github.com/A1kmm/enable-unsigned-firefox-addons


Developer edition definitely gets regular updates, fwiw.


Developer edition has updates but it's a beta. Unbranded builds aren't a beta but don't get updates. There is no version that's just like normal firefox except without signing enforcement.


Unsigned extensions are also not for end-users.


Developers are end users too.


> Unsigned extensions are also not for end-users.

Says who???

Part of the problem is the very delineation between developer and end user.

How about Firefox just be a powerful open platform that anyone can develop for easily with as few roadblocks as possible? We should all be one step away from being developers.

I am so glad I was on the old Firefox 12 years ago. I'm glad that I was able to quickly whip up extensions and share them with my friends. Wanting to automate bypassing my school's wifi captive portal, or wanting to change how the bookmark menu was displayed encouraged me to experiment.

The fact that Mozilla now sees only an audience of consumers that need to be protected from themselves and marketed to is the problem. Mozilla is afraid of their precious precious brand being sullied.


There's a developer edition which allows unsigned add-ons.

https://www.mozilla.org/en-US/firefox/developer/


The point of my post was that there should not be such a hard delineation between regular users and developers. A developer edition is not a helpful solution.


What’s the trade-off here? Browsers are trying to protect users against a metric ton of malware trying to exfiltrate login credentials, and the vast majority of users have no clue what an extension even is.

Last week my dad thought he had a virus, but really it was just a BS spam site that he had accidentally allowed to send him notifications. The screen in Chrome to revoke notification access was like 8 clicks deep.

Browser extensions are a powerful, beautiful, dangerous bit of tech. Is it asking too much to put some guard rails in place that really aren’t too much trouble to follow?


> Is it asking too much to put some guard rails in place that really aren’t too much trouble to follow?

No, but that's not what Mozilla is doing. A confirmation prompt is a guardrail. This is a fence.

> Last week my dad thought he had a virus, but really it was just a BS spam site that he had [...] allowed to send him notifications.

That's his own fault. Not an ideal outcome by any means but a private organization has no right to restrict people's freedom just to protect others from themselves.


This would not have protected your father from any of that. If hostile code can inject an extension into your Firefox profile, it can also install a keylogger or read your unencrypted Firefox password store. There is almost no protection against your credentials being exfiltrated. Neither would it protect you against unwanted notifications. It will however greatly reduce the functionality of Firefox.

This is security theater.

> Browser extensions are a powerful, beautiful, dangerous bit of tech. Is it asking too much to put some guard rails in place that really aren’t too much trouble to follow?

There are many layers of guard rails already. The problem is that now they want to also inspect every extension that I use, even if it is for completely private use and will never be available to the public. And Mozilla does not exactly have a good track record with trust.


Would setting up signatures have taken more than a few extra minutes?


It's not like you don't install McAfee on purpose.


Anti viruses are typical bundleware installed when installing 'free' software. If you don't look carefully, when you click, 'i agree,' you'll get a bunch of other software you don't want.

Some crazy software companies then used a dark pattern - clicking 'I don't agree,' meant you agreed to install unwanted crap.

Adobe flash, Java runtime, utorrent and any installer from cnet.com are examples. That's why I installed Unchecky to protect me from bundleware and automatically uncheck, skip 'offerings' when installing new software.

Edit: As mentioned below, the Chrome team used bundleware extensively in its early days.


Chrome also did this at a massive scale. It's one of the many reasons why I will always prefer firefox.


Sometimes your organisation installs Mcafee, you then proceed to install Firefox.


In addition to this, many products come preinstalled as bloatware. McAfee products (amongst a hoard of other programs) have come preinstalled on Windows laptops I've purchased from Dell and Lenovo.


The "Fresh Start" feature in newer builds of Windows 10 (1709-onwards if I'm not mistaken) will automatically remove these kinds of applications preinstalled on new systems.

https://www.microsoft.com/en-us/software-download/windows10s...


Excellent feature. It's important to note that it's a good idea to have a copy of all of your devices' drivers before using it.


Excellent feature in itself, but also a cludge around a broken economic system. OEMs shouldn't be prioritizing their profits at the expense of the users their business exists for.


Then it's not your computer. What I meant is "the owner of the computer installs (or uninstalls) mcafee at will".


You don't need javascript to show some paragraphs of text with hyperlinks. You don't even need css. If that does not work, this is not a case of poor design, this is simply absolute crap.


Female breasts are a sex organ, male breasts are not.


Unless you're arguing that Facebook-owned channels are more prone to security bugs, I don't see how this conversation is useful. Let's not forget that whatsapp is end-to-end encrypted by default; they literally brought end-to-end encryption to the masses.


You're arguing this in a Western, liberal website. You're fighting a losing battle. They know what you mean, they simply disagree.


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: