Hacker Newsnew | past | comments | ask | show | jobs | submit | more doctorshady's commentslogin

Someone set up a strange number with something like this a while ago, with a bunch of randomized recordings. Some of these appear to be inside jokes or otherwise have hidden meanings about unorthodox behavior from phone systems - +1-248-200-0008.


What on earth...

Do I recognize some of these voices?


Some of them are high profile phone people like Evan Doorbell. Others, I'm not sure.


While I love C/C++, I thought the M1 family was specifically optimized for higher level languages?


Maybe you're thinking of FJCVTZS, which is intended to accelerate a common operation in JavaScript engines? That's not unique to M1, though; rather added to a relatively recent ARM ISA revision. See https://news.ycombinator.com/item?id=25422168

I think there may be other optimizations related to Apple's reference counting and type tagging models for Objective-C and Swift.


FJCVTZS

I read that out loud, thinking I was back at the optometrist.


Hey I recognize this Strongbad song.

Everybody to the limit! The cheat is to the limit! Everybody FJCVTZS!


I'm still squinting...


That's kind of a myth and it's basically impossible to design a processor that runs high-level code faster than low-level code.


True, but it’s not impossible to design a processor that is much faster at running high level code in certain languages a lot faster than another processor that is roughly equivalent at running low level code.


A few years ago, it was normal for Panasonic DECT handsets to use the AES-based DSC2 cipher. Though a downgrade attack is likely possible; I think under normal circumstances with weak reception, they'll stop encrypting traffic.

The VTech/AT&T ones (same thing) on the other hand, I still don't think will encrypt call content.


It’s negotiated so if the base station, or the attacker pretending to be the base station, tells the handset to not use encryption, it won’t.


But other companies, like Rockwell Semiconductor, manufactured perfectly good 6502 clones. If MOS tightened the screws, Atari or Apple could've simply headed to any other number of suppliers. The same can't necessarily be said for a competitive processor today.


Archive of the original 4chan post from this morning: https://archive.is/8rQNK


I have an early nineties car like the parent describes; processor controlled fuel injection/valve timing/other core engine routines, and that's pretty much it with the exception of windshield wiper control and the radio. Practicality of making a car like that today aside, it's remarkably well built, and I have no problem believing it'll last at least another five years.


There's people who do this sort of thing in the US network regularly: https://www.twitter.com/shadytel

Some of what can be expected to be found in telco test ranges: https://pastebin.com/7KAuZmQq


A voicemail only encourages them to call further. You could forward all calls (or simply forward on busy/reject) to a disconnected phone number.

Alternatively, some people say that if you put SIT tones ( https://en.wikipedia.org/wiki/Special_information_tone ) on a voicemail greeting, that can help.


That's actually a bit more common than people know; a lot of infrastructure has access via modem over the phone network. While that's realistically not been a valid application for web browsing for a long time now, it's certainly a valid way to get a command line interface to equipment without exposing it an unending stream of free security audits.

That isn't, of course, to say that there shouldn't be precautions regardless. But it's not the internet, and it lets you transmit information at a distance.


This is indicative in how user interfaces are made as well. Every generation of Windows for example, falls further into the direction of treating users like a liability rather than a computer's owner.

If you were to throw a relatively cryptic and unabstracted machine in front of a bunch of five year olds, like a Commodore 64, they would probably both eventually figure it out and be better for it.


My dad has a favourite story about me at age 3 being able to load a floppy disk into the Apple II, turn it on, load Robot Odyssey, and get past the first level. All by failing hundreds of times, never getting frustrated, and watching my 10 year old brother doing it.

When my son was 2 I had high expectations and he still surprised me with how relentless he was at fuzzing the iPad. He doesn't understand what any words of symbols mean but he knows how to navigate it. At 3 he can mouse and keyboard his way into youtube and search for "trains" without being able to tell me whay that word means.

I'm so glad he's thriving with a mouse and keyboard. I worried a bit that he was doomed to be a touch screen computer user.


Nice! When I was really young (maybe four, five?) I wound up having to replace the disk drive/card pair on an Apple II. What should've taken most people maybe ten minutes was an ordeal, but the feeling of accomplishment doing that was still really awesome.

I'd expect the same is true of old cars, and whatever else; even if you're tinkering with things initially out of necessity, if you're determined enough to pull through, the experience may wind up being an investment in and of itself.


I don't think that's solely on developers. Companies try to "penetrate" the market as much as possible as cheaply as possible. They take away power from power users because it is just too much effort for them for too small a number of people.

Do your job of being our product and make as little fuss as possible.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: