Hacker Newsnew | past | comments | ask | show | jobs | submit | kroltan's commentslogin

The internet doesn't need to be the cloud.

Security cameras are the classic example of widespread self hosted but internet-accessible.

Even the ones that have proprietary apps are often just alternative frontends to a web server running on the home network.


It does when the end user is being a NAT and a firewall and they don't know how to configure it. Legacy IPs cameras are notorious for being difficult-to-impossible for consumers to install, and when they managed to do so, they were often set up insecurely.

The typical MJPEG/ONVIF camera doesn't even remotely compete for the same customers as Ring/Nest/Blink.


If the time comes to discuss operating systems, I always suggest an exercise of downloading a Windows 11 Home ISO and installing it into a virtual machine, look at how much of it is installing an OS versus upselling into services using every dark pattern in the book. (With such hits as "the No button is hidden under a link-button called Learn More and only appears if you choose an advanced installation")

Once you're using it for >month, it's easy to see the BS as just an occasional inconvenience because saying yes is so much easier.


Also "you literally can't install without a Microsoft account unless you know the magic incantation to open the command prompt in the installer (Shift+F10) and the command MS provided for some reason to allow you to bypass connecting to the Internet ('OOBE\BypassNRO')".


And to spell it out:

- Stylesheet encoded as base64 in the Link header;

- Browsers always implicitly have at least the html and body tags;

- CSS cannot create new elements, but it does get 2 free pseudo-elements per actual element, ::before and ::after;

- CSS can set textual content for pseudo-elements;

So, it sets content to a pseudo element of an implicitly created tag, that's why the page is so minimal.

(Well, it could be up to 4 times as complicated I think, by using the other 3 pseudo-elements. Or cheat by using a big SVG as a background-image with more complex contents, but then you start running into header size limits and whatnot)


- Endpoint monitoring software may compromise more than it strictly needs to;

- If you're a contractor, risk of leaking other clients' assets (running `tree` in the wrong folder while screensharing or more subtle variations);

- Shredder policy, done with the work = destroy hardware (though I don't think companies with shredder policy would incentivise personal laptops, you never know)


If it's a personal laptop, I would assume there is no "endpoint monitoring software" installed.

When it comes to "assets", companies make a big fuss about leaking them, but in reality, it's totally irrelevant. I.e. witness Windows OS source code being leaked: Microsoft wasn't affected at all. Leaking short/mid-term plans would probably have a bigger effect (abuse on the stock market, beating a competitor to the market on their big bet...).


You would assume wrong, many (asshat) employers require them, so much that I actually have to screen that kind of sillyness when interviewing. Works a treat to filter out toxic workplaces, but exists nontheless.

As for leaking assets, maybe it does not affect the company at large, but that literally does not matter for this discussion. It will definitely affect your relationship, most often negatively.

And in any case, my usage of assets was clearly general, substitute the example for "clicking on the wrong stored tab while screensharing" can just as well lead you to leaking a plan.


> When it comes to "assets", companies make a big fuss about leaking them, but in reality, it's totally irrelevant

There’s no milder way to put this; you’re delusional.


There are certainly "milder ways" to put it, but the tone one uses is certainly on the author.

For example, please let me know of any one's company leaked source code and how someone has used that to their advantage and become amazingly successful in the same market?


What does this have to do with work device management? Are you seriously suggesting using a personal device for work, despite the asset leakage risk, and relying on "it doesn't matter" as recourse if that risk were to materialize?


Those are unrelated claims. The fact that "it doesn't matter" for a company (which you called me delusional on, yet don't support it in any way) and the fact that there are companies with more lax personal-device policy.

So nope: I am saying that not all companies have the same policies, nor the same risks, and that this is a legal liability that totally depends on the terms of engagement.


The `field` keyword also already existed in C#, to add attributes to the backing field of automatic properties, so I think the argument was easier there.

I used it in Unity projects to have serialized/inspectable values exposed through properties:

    [field: SerializeField]
    public int MyProperty { get; private set; }


I think the issue with a very long line is akin to writing without punctuation because code is usually much more information dense than prose it becomes hard to follow what it is supposed to mean than if there were pauses for you to consider points in isolation but otherwise I don't see a problem with long lines if you have for example some very long silly OOP getter chain which is essentially one expression as for tons of nested blocks the general argument is it's a hint that your single unit of base indentation is doing too much and there is possibly something to be done about it though like everything it is usually taken to a unhelpful extreme.


Yeah, I've had to explain that a couple times already, usually when dealing with customer support or in-person registrations.

And a "malicious" actor can get away with pretending to be another company by spoofing the username if they know your domain works like that. I don't think this has reached spammers' repertoire yet, but I wouldn't be surprised.

Eventually I'd like to have a way of generating random email addresses that accept mail on demand, and put everything else in quaraintine automatically.


Not just CSS, it's used to set parameters but looks like the actual rendering is done in a <canvas> element controlled by JS.


My apologies Kroltan, I accidentally replied to the wrong comment earlier! It's a shame the project disapeared I would have loved to have seen that :D

Rubber is a hard thing to get right imo, I was trying to paint it for one of the brush thumbnails of a rubber stamp (https://www.mediafire.com/view/46tten5kkzh2i99/Stamp_Diamond...) - and it was really difficult, I still don't think I got it quite right xD So I can't imagine how tough it would have been to try and create that texture using only CSS and JS back then


That's exactly the advantage of sneakernet shopping, you can ask to see the product in operation.


I don’t know that I’ve ever seen a microwave offered for sale that was plugged in at the store at any store. Ditto for any consumer electronics other than TVs and computers (and I guess stereos).

Maybe at Fry‘s they had the microwaves plugged in? I don’t remember.


Yeah I don't think I ever saw one either, but at least over here you can bring it over to a counter, or request an employee to turn it on and test.

Obviously not viable for evaluating continued operation for something like a fridge, but just turning it on for the panels is usually possible.


Did you happen to have used uBlock Origin during your stay?

It's the most common source of browser-load latency, as it by default blocks the main page request until it is able to load its blocklists, so when you open the browser afresh, or reopen a window, it takes a while until the browser gets to continue loading the thing you asked.

I think by default it comes as enabled in Firefox, go to the "uBlock settings > Filter Lists > Suspend network activity until all filter lists are loaded", though of course it is a tradeoff.

From the Wiki: https://github.com/gorhill/uBlock/wiki/Dashboard:-Filter-lis...

> In Firefox-based browsers, this setting is enabled by default. Disabling it gives the option to potentially speed up page load at browser launch, at the cost of possibly not properly filtering network requests as per filter lists or rules.

> In Chromium-based browsers, this setting is disabled by default, since Chromium-based browsers do not support natively suspending network requests.2 Enabling this setting in Chromium-based browsers may lead to negative side-effects at browser launch.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: