Hacker Newsnew | past | comments | ask | show | jobs | submit | anonomousename's commentslogin

Legitamate technological improvements include thread, which allows local control of devices with no cloud servers involved, which lets you use home assistant or an equivalent


Fun story: I’ve had a speaker which would connect to a Bluetooth device as soon as it was turned on, and only enter pairing mode if a paired device wasn’t in range. I couldn’t figure out what device it was connecting to, so I put it in the microwave (while it was off!) briefly to trigger the pairing timeout.


Glasses do not require a prescription - you can enter arbitrary values. Contacts on the other hand, require a prescription within the last year and is verified with your optometrist.


Note: article states the restaurant is not Disney affiliated. Disney claims this is the reason why they filed to dismiss.


They should probably tell their website.

https://disneyworld.disney.go.com/dining/disney-springs/ragl...

Disney's filing is available at https://cdn.arstechnica.net/wp-content/uploads/2024/08/2024-... - I trust that more than a PR flack's attempts to smooth things over.


The safer way is to disable the app execution aliases.



I remember seeing this a bit ago when it was crackpipe! Glad the name got changed haha


If true, that seems like some solid evidence. Do you have any links/sources I can read up on? I wasn’t able to find anything.


This type of analysis quickly starts to wade into “intelligence” in the CIA sense of the word. It’s possible to do some of this digging on your own, but for the most part this type of information ends up requiring a lot of inference and synthesis across different sources and collection mechanisms to build a coherent story.

If there’s one thing I learned from working in this space, it’s how there’s just massive amounts of “history” playing out every day that will never be written down or acknowledged. In particular, cyber/electronic warfare is a very active space, and quite a few nation states regularly commit what many of us would imagine would be considered acts of war against each other, without a word said to the public.


It's not evidence at all, just data (intelligence) that makes me reconsider what I thought I knew about the situation and what else might be related that I didn't consider before.

We have a "special" relationship with Israel so I can't go too much into detail, but suffice to say it was password spraying attacks that originated from domestic residential IPs that dropped off. Normally foreign agencies use datacenters and a known set of VPN ASNs. Israel happens to have their own onion routing network in the form of Hola/Luminati, but that isn't a discrete ASN-- it's a botnet of residential proxies.

https://news.ycombinator.com/item?id=18161706

I don't know if Luminati is even still a thing but this is the sort of footprint I'd expect from it. They'd find residential proxies useful for their astroturfing campaigns so I assume it's still up. Attribution is a game of educated guesses.

Now, I'm not implying the Israeli government is the actor here. For all I know it's some bored teenager fucking with us. The timing is what's suspect. Either the operator was compelled to stop when war broke out or the infrastructure they were using was somehow impacted by the Gaza offensive.


Yes - I believe the shift is coming. For inference especially, check out Groq’s chip design and its simplicity and speed compared to general purpose GPUs.


Excellent explanation! Although 1 lb * 32.2 ft/sec^2 = 32.2lbf.


Some of my passwords weren’t found on that tool but I was able to find them on but scatteredsecrets.com - I searched because I was getting 2fa emails from services with that password. Just keep in mind it isn’t a definitive list


I love that password breaches are so common that everyone is perfectly fine just typing all their passwords into various sites.


I feel there ought to be some much-more-secure option, but it probably involves a level of client-side computation that the average person won't do on their own.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: