Hacker Newsnew | past | comments | ask | show | jobs | submit | apexalpha's commentslogin

A very large part of the people on this planet have (almost) no winters.

We could start with those ~3 billion people.

Also wind has proven to be a very good supplement to pv.


Those people already use almost no energy compared to everybody else.

Great we should be done relatively quickly then. ;)

Done with what, they don't matter here.

It’s somewhat humbling that this is essentially entirely done by one country.

For all their faults, I am in awe of the scale and success of their industrial policy.


Yes. It's amazing, isn't it.

Too put the facts crudely, the world would be fucked climate change wise without China. The oft heard "why do anything while China is the problem" would be hilarious, if people repeating bald-faced bullshit didn't grate so much.


They have a new kind of R&D organization that may be worth emulating.

https://www.noahpinion.blog/p/china-has-invented-a-whole-new...

(partially behind paywall, sorry)


It's amazing what you can achieve when you control everything in a nation and can execute anyone who disagrees.

If it was a real reason of their success we would see amazing results in russia and their friends: Iran, Korea and other countries.

Of "control everything" and "execute anyone who disagrees", only the former is useful; the latter is kinda why Russia (and the USSR before it) are failing despite also having a government that could control everything.

You only achieve greatness when your control gets you to do the correct thing. Strong governments make decisions faster, not better. Freedom to debate, to speak out against bad governance, to speak truth to power, democracy, all that's a system to keep a government pointing in the right direction, it slows down decision making but (generally) also increases the accuracy of that decision making.

Same deal with free markets in capitalism: its a feedback mechanism, Tim Cook can announce the Vision Pro and Zuckerberg the Metaverse, direct their teams to spend whatever number of billions was necessary to develop them, market says no.


Name checks out.

I thought this was about the new base tunnel under the Alps and was very confused for a bit.

The Brenner base tunnel is still under construction.

>The report puts the threshold for being in the top 10% of income earners at €65.5K. I suspect many HN users would fall into this category.

Per person or per household?

In any case this does change the conversation a bit...


>It would be misleading to suggest that a single person with zero wealth has more wealth than 100k people’s wealth combined

Using a word exactly as you should is not misleading.

People simply have a bad conception of wealth in their head.

But in reality saying that a single person just born is indeed wealthier than someone in debt: that's how it works.


single person just born is indeed wealthier than someone in debt is exactly right. based on my Pre-K Math 0 is greater than -X :)

The poorest 1% have more wealth than the poorest 5%. But they would never write that in an article since they have an agenda.

poorest 1% have $10 while poorest 5% have $9? not newsworthy :)

I run these on a 48gb Mac because of the universal ram.

Yes, at least in the Netherlands it is generally accepted that employees can use your device personally, too.

Using a device owned by your company to access your personal GMail account does NOT void your legal right to privacy.


So does nobody in Europe use an EDR or intercepting proxy since GDPR went into force?

I have found a definite answer from the Dutch Protection Agency (although it could be out of date).

https://english.ncsc.nl/binaries/ncsc-en/documenten/factshee...


What’s the definitive answer? From what I can tell that document is mostly about security risks and only mentions privacy compliance in a single paragraph (with no specific guidance). It definitely doesn’t say you can or can’t use one.

That's probably because there is no answer. Many laws apply to the total thing you are creating end-to-end.

Even the most basic law like "do not murder" is not "do not pull gun triggers" and a gun's technical reference manual would only be able to give you a vague statement like "Be aware of local laws before activating the device."

Legal privacy is not about whether you intercept TLS or not; it's about whether someone is spying on you, which is an end-to-end operation. Should someone be found to be spying on you, then you can go to court and they will decide who has to pay the price for that. And that decision can be based on things like whether some intermediary network has made poor security decisions.

This is why corporations do bullshit security by the way. When we on HN say "it's for liability reasons" this is what it means - it means when a court is looking at who caused a data breach, your company will have plausible deniability. "Your Honour, we use the latest security system from CrowdStrike" sounds better than "Your Honour, we run an unpatched Unix system from 1995 and don't connect it to the Internet" even though us engineers know the latter is probably more secure against today's most common attacks.


Okay, thanks for explaining the general concept of law to me, but this provides literally no information to figure out the conditions under which an employer using a TLS intercepting proxy to snoop on the internet traffic a work laptop violates GDPR. I never asked for a definitive answer just, you know, an answer that is remotely relevant to the question.

I don’t really need to know, but a bunch of people seemed really confident they knew the answer and then provided no actual information except vague gesticulation about PII.


Are they using it to snoop on the traffic, or are they merely using it to block viruses? Lack of encryption is not a guarantee of snooping. I know in the USA it can be assumed that you can do whatever you want with unencrypted traffic, which guarantees that if your traffic is unencrypted, someone is snooping on it. In Europe, this might not fly outside of three-letter agencies (who you should still be scared of, but they are not your employer).

Your question So does nobody in Europe use an EDR or intercepting proxy since GDPR went into force?

Given that a regulator publishes a document with guidelines about DPI I think it rules out the impossibility of implementing it. If that were the case it would simply say "it's not legal". It's true that it doesn't explicitly say all the conditions you should met, but that wasn't your question.


You can do it but you'd have to have a good case for it to trump the right to privacy.

It's not as simple as in the US where companies consider everything on company device their property even if employees use it privately.


I'm not sure if you're serious but in case you are (or other people):

TLS inspection is for EVERYTHING in your network, not just your publicly reachable URLs.

Putting Cloudflare anti-DDoS in front of your website is not the same as breaking all encryption on your internal networks.

Google can already see the content of this site since it's hosted... on the internet.


> Putting Cloudflare anti-DDoS in front of your website is not the same as breaking all encryption on your internal networks.

You misunderstood, they're complaining about it as a user. If your website uses Cloudflare then our conversation gets terminated by Cloudflare, so they get to see our unencrypted traffic and share it with whomever they want, compromising my privacy.

Which wouldn't be such a problem if it was just an odd website here or there, but Cloudflare is now essentially a TLS middle box for the entire internet with most of the problems that the article complains about, while behind hosted behind Cloudflare.


Given that 50-70% of the critical services I use in my daily life (healthcare, government, banking, insurance) all go through Cloudflare this practically means everything that is important to me as an individual is being actively intercepted by a US entity that falls under NSA's control.

So for all intents and purposes it's equivalent.

My point is: it's very hypocritical that we as industry professionals are complaining about poor cooperates being MITM'd whilst we're perfectly fine enabling the enfringement of fundamental human right to privacy of billions of people by all fronting the shit that we build by Cloudflare in the name of "security".

I find the lack of ethical compass in this regard very disturbing personally


Having an organization install custom root certificates onto your work or personal computer and hosting a public blog on Cloudflare are two entirely different topics.

That your healthcare, government, bank, etc. are using Cloudflare, is a third. In an ideal world I guess I'd agree with you, but asking any of these institutions to deploy proper DDoS protection may just be too much of an ask.


...do you send private messages using services hosted on publicly reachable URLs?

I largely agree with the author. When our SOC wanted to implement TLS inspection I blocked it. Mostly because we not nearly at the security level for this, but also because it just fucks with so many things.

That said, we are not a business dealing with highly sensitive data or legal responsibilities surrounding data loss prevention.

If you are a business like that, say a bank or a hospital, you want to be able to block patient / customer data leaving your systems. You can do this by setting up a regex for a known format like patient numbers or bank account numbers.

This requires TLS inspection obviously.

Though this makes it harder to steal this data, not impossible.

It does however allow the C-suite to say they did everything they could to prevent it.


Oh and the software (Netskope) was only able to decrypt our traffic in the cloud.

Lmao not in a million fucking years will I upload our data to an American company in fucking plaintext.


Netskope and the other DLP tools at my last gig would completely lock up my network connection for around 30 seconds every hour or two while maxing out 100% of a core. Fun times. The issue was still there a year after I first encountered it so I have grave doubts about the competence of those vendors.

On the other hand I am sympathetic to the needs of big regulated orgs to show they're doing something to avoid data loss. It's a painful situation.


The problem is that it is also applied to disabilities that are not objectively measurable and therefor extremely prone to abuse.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: