Hacker News new | past | comments | ask | show | jobs | submit | jonny_eh's comments login

In other words, he wants everyone else in power to have just much to lose as him if the regime fails, so that they don't turn on him. It works like this in NK and Russia.

...or the mob, or street gangs whose initiation rituals usually involves committing a crime to bind you to the group, so you all have something to lose.

Why even claim last click attribution while the user is literally on the site?

Only a percentage of people on a site will convert. Increasing that percentage is valuable.

How does displaying a message "Honey didn't find any discounts for your order" on the cart screen, increasing that percentage?

A potential customer could leave the site, spend time searching for a coupon code, not find anything and give up, and then not return to the site to complete the purchase. Honey could keep users on the site moving through the order flow even if it didn't find anything.

What's wakatime?

It is a tool used by developers to keep track of time spent in their editor as well as related metadata like which projects were worked on, which languages were used and so on

> We have been using free, limited, zoom sessions.

How secure are those?


Signal is end-to-end encrypted.

Signal makes it very difficult to even tell what parties are talking to each other (though if you have nation-state-level internet tracking, you can probably tell.)

Signal doesn't know anything about you except your number or screenname, when you signed up, and when you were last active.

Zoom is none of those things and the grandparent commenter has no idea what they're talking about.


.

  >and the grandparent commenter has no idea what they're talking about.
What is this all about? I can't really see what you seem to disagree with?

signal may be e2e encrypted, but if i root your phone with a 0 click exploit. Which most of the state level actors we care about can and do do. Then I can just read your signal messages out of memory as soon as you open them. period. end of.

Using a public smartphone to conduct discussions about classified information is straight crazy. E2E encrypted or not.


We discuss Buddhist writings. Polite guests would be welcome, but I'm afraid that most would be bored.

Depends on which country you live in.

Very insecure.

You can be secure in the knowledge that the Chinese Communist Party can and will eavesdrop on any session.

This farmer in New Zealand also apparently invented powered flight first: https://en.wikipedia.org/wiki/Richard_Pearse


The middleware should fetch auth, not check it. Each page should check the auth provided by the middleware. Skipping middleware wouldn't bypass anything in this case.


If each page has different criteria, sure, but if not, why? Let's say I simply care if the user is a paying member. I don't see why I wouldn't just have that in the middleware.


I'll never go back to a pre-React rendering library. Newer ones, sure. jQuery was awesome in its day, but it made beautiful spaghetti.


That should be the server. Your Nextjs app should have zero access to business data without at least an auth token. And if you're relying on middleware for auth, it'll be responsible for providing that auth token to the rest of the app. And if you bypass middleware, then there's no auth token, and no vulnerability.

This is only a vulnerability if you have pages you don't want to render for some people, regardless of upstream data it would need to fetch.


Not necessarily. There is no big difference whether the business logic resides in the same node process or another one. If the first process is unsafe on that level, then the token can also be extracted.


Middleware runs server side doesn't it? tbh I haven't used nextjs middleware. But in many frameworks have used middleware that provides overarching access control.

For example having all routes under `/admin/*` automatically return an error if the user is not an admin, and then the individual routes don't need to be concerns with access control.


The issue is, everyone uses middleware because Next.js doesn't provide a primitive for a middleware like how it's done for any other framework. Just something to execute before your endpoint, that's it.

They haven't had one for years and everyone wrapped their endpoints which was error prone and also flat out annoying, it's reasonable that people then jump to middleware


> spend 2 weeks making a fix

They didn't spend 2 weeks making a fix, that took a few hours. It took them two weeks to look at the report.


It took them a week to respond about the initial report for v12.0.0, the exploit was so trivial and obvious that even that should have been a warning to go check newer versions themselves, even if they hadn't seen the follow up message that had been sent a few days prior showing that the vulnerability was present in later versions.


How do you personally define civilization?


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: