Hacker Newsnew | past | comments | ask | show | jobs | submit | flux_w42's commentslogin


Yeah... because Honeywell produced a product that everyone was talking about with their friends and family? Nope. They've been sitting in a dominant market position for decades without any real innovation. Innovator came along and produced a great product; Honeywell went into full patent troll mode.


It seems to be related to the user names. Just received a 'Howdy' alert box :)


That logo is a lawsuit waiting to happen.


Just the logo?


Does it depend on jurisdiction? Site operated by Chinese person in compliance with Chinese law, then what could rest of the world do?


Hmm, just browsing to http://pictureswap.org/success gives you the other side's image without uploading one yourself :/ That's probably not what it's supposed to do?


You can also accidentally forget to browse for an image, just click the 'Upload Picture' button, and get taken to the same page :)


It's sad that someone would hack a site like this. The only thing they could possibly want are the email and password combinations. I hope they are stored in a secure way.


There are plenty of other motivations. It could be:

1) a novice hacker looking for experience 2) an automated bot that scanned IPs for some vulnerability and acted on its own when it found one 3) someone looking to extort the owner for money 4) someone with a personal vendetta against the owner 5) someone looking to secretly plant bitcoin mining software on the servers (who got caught) 6) someone looking to alter their own score to help them get some sort of math job

I could probably go on for a while, but you get the point. It's hard to ascribe intent to this sort of thing without more information.


5) The Bitcoin mining thing is a bit of a historic artifact, today you could barely achieve a cent per month on even the very fastest of cpus


Or 7) someone who did it for teh lulz. While rare, this also happens. But I agree; it's hard to guess motivations behind the attack without more info.


8) Waterholing targeting a user or group that frequents the site?

I like #2 though, or as I'd put it: flotsam of the internet, like how slammer ended up at davis besse.


As Project Euler is completely free and has a positive impact on the programming community, it would be very sad if the reasons for the hacking were 3) or 4).


I would discard 1) cause a real hacker, even if novice, would enter without damaging or stopping the service. He/She would maybe report to the owner the vulnerability or even would keep it secret.


It was posted elsewhere that visiting the hacked site triggered downloads of "flash_updater.exe" type trojans, so maybe one reason for the hack was to spread malware.


Think about agencies, not private actors — then this site makes a perfect target. Recruit and subvert are basic tasks for these agenices, and to do so you need information about the candidates. This website had probably a significantly higher proportion of interesting prospects.


But what information was even held on the website. Wasn't it just a public listing of usernames with the score.

According to this https://news.ycombinator.com/item?id=8181773 then don't even store emails anymore.


You're talking about a cryptographically secure random. Normal random can really contain any sequence, including a repeating string of 1's or 0's. The infinite monkey theorem proves it :)


I'm of the opinion that any definition of random string that says the same string S is random or not depending on how we got it is just silly.

IMHO random string = string that has Kolmogorov complexity = length of this string.

Almost all strings we got from random variables with uniform distribution are random, but not all.


A Dutch tech news site [1] published the news on their site and got in contact with the ISP Snel:

The ISP told Tweakers that the account of Thomas White was blocked due to a security policy of the company. The customer let a deadline for verification accidentally expire and logged in through KVM. "Some KVM's generate a USB event when you use it to set up a connection to the server, this is what the customer just notified." - according to the ISP Snel. Meanwhile, the man's account is released.

[1] https://tweakers.net/nieuws/100388/beheerder-verliest-contro...


The article also links to an update Thomas White has posted:

https://lists.torproject.org/pipermail/tor-talk/2014-Decembe...

Few quick points (that I found most interesting, click link to read everything):

"The likelihood of this being the work of law enforcement seems to be lower than originally anticipated. This is good in many ways but asks more questions than it solves right now."

"Support staff at the ISP have confirmed to me there has been unauthorised access to my account. This could be down to the fact I access the control panel often via Tor (yes, using TLS before anybody asks), however it does raise the prospect of a non-LE person(s) being behind this but does not explain why a chassis intrusion was detected for example or anything else to do with on-board sensors."

"Again, at this moment in time I am under no gagging orders or unreasonably withholding information under orders."


I don't really buy it. This doesn't explain why a chassis intrusion alarm was triggered, nor why a large chunk of logs are now missing.


So much about ISP <> customer confidentiality then!?


Especially when the media has better information than the customer.


I need closure, and that wasn't it. I'm hoping this wasn't the last we hear about this incident.


For me personally, the sweet spot between readability and compactness would be one of the first examples:

  for(var i = 0; i <= 100; i++){  
    var out = ''
    if (i % 3 == 0) out += 'fizz'
    if (i % 5 == 0) out += 'buzz'
    if (out.length == 0) out = i 
    console.log(out)
  }


Can you do it in js without using conditionals.


Same for me: Running on Firefox 31.0 (Windows 7) and i can crash it every time ...


Do you guys happen to be using Intel graphics?


Not on my PC where the crash occurred. I'm using Intel graphics on my Ubuntu laptop, and there it's working perfectly. Disabling AddblockPlus seems to solve the problem though.


Exactly! I learned what a BIOS is and does the first time in my life the moment my parents put a BIOS password on the PC. My first rough workaround was to open the case, remove the CMOS battery and reset a pin. Then I found an easier workaround using the DOS debug tool to trigger a BIOS reset with the IO ports 70 and 71 :)


I used to write my BIOS password on a piece of paper and stick it inside the case. It was only there to prevent casual snooping.


Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: