Hacker News new | past | comments | ask | show | jobs | submit | hlasdjlfhalwjk's comments login

> I'm always afraid I will be missing part of the text or the pictures

As for missing pictures, my argument is, either the text is referring to an image that cannot be seen in reader mode, then I'll notice and switch back to normal mode to see the image, or the image is not relevant to the text, so I just don't care for it.


An old version is available here: http://arclanguage.org/install

I assume the current version is still written in Arc (Paul Graham created the language) but differs from that version.


There is also anarki, the experimental public fork[0] of Arc and the forum. Like everything else, it differs from HN.

[0]https://github.com/arclanguage/anarki


I wasn't aware, such a list existed. Thanks for the link!


You can even submit your domain to the list [1]! This is useful when your domain has user-alloted subdomains and you want to enforce a stronger subdomain isolation. Ghost.io for example is there because the Ghost Foundation has sent a submission.

[1] https://publicsuffix.org/submit/


IIRC civil GPS chips won't work above a specific altitude or when moving above some speed limit. I think the idea was to prevent people from guiding missiles using those chips.


Seems this is an ITAR restriction and only applies to chips exported from the US: https://en.wikipedia.org/wiki/Global_Positioning_System#Rest...


If you follow security best practices, you have append-only backups that you can use to restore the encrypted data and don't need insurance at all...


If the ransomware operators follow best practices, their C2 is in those backups too. The data's not encrypted, but without good IT, not for long.

Maybe go two weeks' back and you'll get a clean instance, but that's two weeks' data loss, I've seen (non-tech) institutions hit where an hour of data loss is worth paying a ransom for.


Why is your data executable?



> https://en.wikipedia.org/wiki/Infrastructure_as_code

> "definition files"

Not executable. Text. Readable by humans. Inspectable by humans so you can root out rootkits. Not even the valuable data that cyber criminals go for anyway - they go for personal and financial data, not k8s config files.

> https://en.wikipedia.org/wiki/Virtual_machine

> https://en.wikipedia.org/wiki/Disk_image

Neither of those are relevant. You don't back up virtual machines or image disks - you take afore-mentioned plain-text, audited config files and spin up new instance from scratch.

> https://en.wikipedia.org/wiki/Shadow_IT

If those are actually shadow IT, they won't be in the backups anyway.

> https://en.wikipedia.org/wiki/Von_Neumann_architecture

This is irrelevant snark. If you back up a data file, it doesn't matter that it's stored in the memory of a Von Neumann architecture - it's only going to be used as a data file.

> Separation of code and executables is a nice idea that approximately 0% of organisations fully adhere to.

Citation needed. Also, you just said:

> If the ransomware operators follow best practices

...so are we considering the ideal case, or not?

> I'm really not sure that has a serious answer.

Being snide is bad by itself, but it's even worse when you're wrong on top of it.


> You don't back up virtual machines or image disks

> If those are actually shadow IT, they won't be in the backups anyway.

Okay whatever then. I really don't have the energy. I'm just depressed people might believe you.


Wallabag only stores links. ArchiveBox archives a snapshot of the actual content of a page at a specific point in time.


Wallabag extracts the content and stores it. Not just the links.


Didn't know that. Thanks for clarifying.


That's kinda the point. Most drugs are not bad/evil in themselves. They can be used irresponsibly.

Many classic drugs (as opposed to research chemicals which introduce small molecular changes to circumvent banns on another substance) are pretty safe or at least have a well known safety profile.


Switzerland started a program in 1995 where they give medical grade heroin to people suffering from addiction. From the people taking part in this program, none have died from heroin overdoses or due to toxic contamination in the drug.

So heroin is actually pretty safe if used correctly.


Indeed. If one reads the adverse effects of heroin (e.g. in Wikipedia) and ignores the ones caused by dirty injection, lacing and overdose, you are left with no long term effects other than a blurry "brain impairment to make decissions". On the short term, respiratory depression. That's it.

Not many legal drugs has such short list of side effects.


Doesn't GDPR require opt-in for tracking?

So as long as you didn't interact with the banner, _every_ page load should take ~60s?


Of course they have to track that they aren’t tracking you, or else you would get the consent banner repeatedly on every page load.


The actual way this should be implemented, if they wanted to be morally irreproachable, would be this: a consent popup always available, tucked down somewhere in the corner of the site. It defaults to opt-out from everything, you can click on it to expand it if you want to opt into something.

An acceptable option is to pop up a consent form as needed, and set a cookie recording whether user made a consent decision. That can be classified as essential cookie to fulfill a legal obligation.


A little bit more than 100 LoC (`cloc lib bin` gives me 147 lines of Ruby) but still nice work.


That should be `cloc exe lib`. `bin` has distribution-related auto generated scripts. The actual entry point script is in `lib`.

From the sloc count on GitHub just the server file alone is listed as 149.

This also uses WEBrick to do the HTTP parsing. The webrick gem is no longer bundled with Ruby as of 3.0.0.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: