Hacker Newsnew | past | comments | ask | show | jobs | submit | kenny11's commentslogin

If that's the case, it's surprising they keep pushing Shorts so hard on the Apple TV app, because watching vertical Shorts videos on a TV is a uniquely terrible experience.


And a variant of ACCESS.bus lives on as the extremely widely adopted DDC that is a part of HDMI, DVI, and VGA.


I thought I was the only one with this problem.

I can still remember how to play the original Doom after all these years (and where all the secrets are!) but the modern editions have so many controls and weapon modes that if I don't play it for a month I don't remember how anything works.


I think that's referring to the NT "Shell Update Release" which was an early beta of the Windows 95-style start menu that you could install on Windows NT 3.51.


This is covered in the linked article as well as Dave Plummer's video referenced therein. The Crowdstrike driver is specifically marked as critical to starting the system and so disables the last-known-good mechanisms.

Here's the section where Dave talks about it: https://youtu.be/wAzEJxOo1ts?si=aCX8pOTP0D_IRNAx&t=670


Still, if it’s that critical it should be deployed through the OS vendor, not some 3rd party. And regression/canary testing at each level (3rd party, MS, customer) seems to also be completely bypassed here, which also baffles me.


If you use a wildcard cert, then only "*.domain.net" is recorded in the logs, not the actual hostnames you're using.


ah, my mistake then. i use a wildcard dns-record but separate letsencrypt-certs for every subdomain. so to truly be stealthy i'd have to use a wildcard dns-record AND a wildcard ssl-cert.

sounds like i got myself a project for this weekend, implement a wildcard cert for my rev-proxy at home :)

EDIT: i guess the logs would still show the old certs, so my subdomains would still be exposed. huh. at least future subdomains would be hidden.

EDIT2: are there more ways for subdomains to get exposed, other than through DNS or SSL-Certs?


can't edit my previous comment anymore.

i got a wildcard-cert, implemented it on my proxy, everything works!

unfortunately, to be stealthy, i almost have to switch to a different domain. then request a new public IP, and switch.


Not just credentials - account balances, account numbers, etc. There's a big difference between your browser history recording that you opened your bank or healthcare provider's web site and Recall recording everything that appeared on the screen while you did.

People might use Incognito mode to browse porn, but I imagine it's a lot less common when looking at other sensitive sites.


If that were the case then it should have affected Intel-based MacBooks too, and that does not seem to have been widespread.


> have access to the station without getting Russia involved.

Except for the Russian engine on the Atlas V.


I had the same experience as you on a trip to the Netherlands. Ironically, the only place where it didn't work was the Apple store in Amsterdam. I don't know if that was an actual technical limitation, or they were aware that it was not yet available in the Netherlands and so didn't even let me try with my phone and its US credit card.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: