Hacker News new | past | comments | ask | show | jobs | submit | TowerTall's comments login

As far as I know the iCloud backup are unencrypted so law enforcement can just request a backup of those instead.

You're not up-to-date and your language is not exact:

1. Your backups are encrypted in transit and at rest. You have a key, Apple also has one.

2. You can optionally ask Apple to get rid of its key to your backup. (https://support.apple.com/en-us/108756)


In other words, the parent is correct: by default it's not encrypted against Apple (no e2ee).

It's encrypted, period. Apple having the key doesn't make it plain text.

It depends on your threat model. Against Apple (forced to give the info) it is effectively plain text.

off topic, but has anyone succesfully registered their Workstation Pro single user license with broadcom? I followed the instructions they send to my email like a month ago, but it still says on the broadcom portal that i am not eligible to download latest version despite me having a valid license.

context: Broadcom has made Pro free for private users but you still need to register with them to download it.


Sign up on their portal with a new burner email account and use that to request the license. Their site is totally broken for existing users and you’ll just end up going in circles with their support.

I didn't have any trouble, although I have owned full versions of Workstation and Fusion in the past. Having said that, their licensing portal is awful and i wouldnt be surprised at all if things were getting lost somewhere in the back end.

Broadcom licensing site is a disaster. The usability is terrible; took me an hour going in circles, but eventually I was able to find where to click. It was something completely unintuitive. But it works. Maybe. Sometimes.

Gigatransfers per second (GT/s) measures the rate of data transfers rather than the data rate itself. Each "transfer" represents one unit of data moved across a data bus per clock cycle, which can be thought of as one signal transition on the bus.

I am using the GUI version on windows https://oleksis.github.io/youtube-dl-gui/

and why are there hardly any in South America and Africa?


A bank will never call you regarding this. They will send you a letter asking you to call them. In my case when the bank want to get in contact with me they send me a message through their online banking app.


My bank now sends alerts and verification codes via SMS. SMS should be assumed to be completely compromised given that it runs over SS7. 2FA using SMS is worse than an uncompromised password. I am disappointed that more and more banks and websites forcibly allow password recovery using nothing but SMS, but it seems like I'm just tilting at windmills.


It's quite possible that they do this for their online customers— it's a reputed bank here. I'm just using the bank's credit card and don't have a bank account with them, so I don't have access to their banking app.


That seems strange. There should be a portal for the credit card somewhere.

Anyways. Remember, you are in charge. You can always say you need to hang up and call the branch. If the service issue is serious, it can be handled at the branch or via an officially published bank phone number.

Trust no inbound call.


I've been contacted by my clinic before, by a nurse who's following up from labs or something. And it's tricky, because they need to be cagey for HIPAA reasons. A lot of times, a clinic leaving voice mail to confirm an appointment won't actually say what the appointment is for or who it's with, because that's giving away too much info. The nurse calling me needs to confirm that she's got the right person, so she asks for my name and DOB right off the bat.

I call it "authentication détente", because both sides of a phone conversation are no longer trustworthy enough to bootstrap a trusted connection. I say, just use some authenticated messaging on the Internet instead.

It is not uncommon for the fraud department to reach out to you when their heuristics have flagged possible fraud on your account or card. They will quiz you about your most recent transactions. They already know who you are. They shouldn't need to ask you about PII, just transaction details.

But it's helpful if you can recall what you've been doing with that card. You will always have the option to contact them via the number published on your card, but time is of the essence in catching fraud, or helping to clear a legitimate transaction.


> It is not uncommon for the fraud department to reach out to you when their heuristics have flagged possible fraud on your account or card.

Which is something they should do but if they do that through a phone call the wise action is for you to hang up and call them back using their main switchboard number.


>That seems strange. There should be a portal for the credit card somewhere.

Yeah, they don't. The bank seriously needs to up their game.

> Trust no inbound call

This needs to get on their website :)


This was posted yesterday: Local TypeScript Super SDK to Call 200 LLMs

https://news.ycombinator.com/item?id=41844517


You can also download the iso using powershell

https://github.com/pbatard/Fido


> under-the-LED-display cameras

If people laugh with their mouths open, wouldn’t a camera placed below the LED display capture the inside of their mouths, and the rest of the time just point straight up their noses?


I meant the camera will be invisible and BEHIND the screen .... just not visible as a punch hole/notch.

I think some mobile phones have already done this...where they are able to put a camera behind the pixels.


That is how they build the tank in Formula One Racing (and probably many other race cars, I guess)


Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: