Hacker Newsnew | past | comments | ask | show | jobs | submit | bhtru's commentslogin

I too eagerly await _rm's response


Someone needs to tell me what word could there be with TCAAN?

What dictionary are you using OP?

edit: IT'S CATAN.

Smh


Or double type ‘-‘ and in many apps it’ll auto transform the two dashes to emdash. However, the method you’re describing is far more reliable, thanks!


And the character design not just for Dragon Quest, but Blue Dragon and more notably Chrono Trigger!

Chrono Trigger is one game I'd love to see remade.


Likely a typo, I don't see it on the wiki page anymore


That's a strawman and you know it. I'm not going to necessarily concur's OP's point, but it's inarguable given MSFT's last half decade the positive stewardship Nadella has done.


Interesting, I always saw this as a deliberate feature aligned with what I first came across Signal for (sensitive communications between trusted parties that may need wiping at a moment's notice). If a journo reporting in a less than hospitable regime had their phone confiscated then they need not worry about their chat logs compromising them.


Sorry, how is this any safer for the journalist? If their phone is compromised in a way such that someone can login and control their Signal app, their chat logs are already compromised. I’m just saying there should be the ability to export those logs once you’ve logged in.

But if they don’t want to provide that, then:

1) Why does the Android app support this?

2) They should warn users of this BEFORE holding their data hostage, and not market Signal like it’s the right solution for everyone.


Wouldn't it be more damaging if the authorities are able to sync and recover the chat logs (they had time wipe the logs)?

If they are able to take the journalist's sim card which is linked to their Signal account and then are able to recover the chat logs the journalist would be done for.

Of course the supposed journalist we're speaking of is already in a bad spot if they're interred. However, they might have plausible deniability with respect to their phone if there's no compromising chat logs to recover.

To your point about exporting, it would be nice. Ultimately, why can't we have both worlds by way of toggling the function?


I’m certainly not proposing that access to your SIM card should allow authorities to sync your messages! They should be stored encrypted on-device, and only exportable if you have login access to that device.

If authorities do acquire login access to the device, they can scroll through your chats and make screenshots, with or without an export feature. It’s true that exports make it slightly more convenient for them, but if you’re a serious target they’ll do it the hard way.

If Signal wants to provide some opt-in to disable exports, which can’t be retroactively reversed for old chats (otherwise it’s pointless), I have no problem with that. But if you’re worried about authorities with login access to your device, you shouldn’t be storing logs at all.


Do you know of other fonts with the same goal as Atkinson Hyperlegible? It's gorgeous.


Nitter is dead no?


It worked for me.


Believe this refers to per person. Otherwise this would be quite the robust program to only move 6 deadstock rifles a year.


Yes, sorry, it's clear in context that it's per person: https://thecmp.org/sales-and-service/m1-garand/


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: