Hacker News new | past | comments | ask | show | jobs | submit | kwentine's comments login

> It arrived smoothly at Lagrange point 2, focussed its telescope mirror and captured its first mesmerising test images. It soon became clear, however, that the mission was experiencing some hiccups.

Did anyone else wonder if Advent of Code had begun early this year ? ;)


I can highly recommend "Rita" (Danish) and "Bonus Family" (Swedish), truly scandinavian takes on the modern family theme.


Centre de Données Socio Politiques | Sciences Po Paris | Web developer | Python JavaScript | On location, full time

In the context of the European SSHOC project [1] starting January 1st 2019, CDSP is hiring a web developer for a 31 months contract. The successful candidate will be joining our Software Projects team to work on the design and implementation of a Sample Management System: an application capable of managing an international set of respondent panels to which web-based research surveys are periodically delivered.

Our toolbelt of choice, integrated in a GNU/Linux working environment, consists of Python for the backend (Django foundation, spiced-up with Celery and Tornado) and JavaScript at front (VueJS taking momentum).

The team is coordinated by a project manager affiliated to the CNRS, and presently counts 4 web developers and a system administrator.

Our workflows are built around GitLab with increasing dominance of continuous integration and Docker for deployment. We care very much about maintaining a cheerful and healthy daily atmosphere, where polyvalence, learning and sharing are always encouraged.

If you are interested, shoot us an email: genevieve.michaud@sciencespo.fr

[1] https://cdsp.sciences-po.fr/en/le-cdsp/news/actualite/le-cds...


I would suspect that, as the article hints, the art of enjoying sushi varies to some extent depending on the chef. For example, I was once taught that you should dip your fish slice (and not the rice underneath) in the soy sauce, put it back, and then be careful about making the fish side landing on your tongue first when you put it to your mouth. A - litteraly- twisted exercise.

But maybe the chef was just having quite a bit of fun watching customers handle three dimensional rotations with chopsticks :)


Use your fingers instead of sticks and use quick movements to prevent disaster. You can get good at it with sticks but it is totally okay to use fingers.

Other tips: never ever stick your sticks standing up in a bowl. Slurp your broth/noodles. And finish every grain of rice or noodle you order. (If you're in japan, anyway)


> He told Childs via translator that not only was it was his first time writing Native Client code but it was his first time dealing with a kernel exploit.

Well, I guess Lee has found a new lucrative hobby for rainy weekends.

More seriously, how can someone possibly own three major browser in two days and on a first try at this kind of sport ? A pretty loud way to shout "Hello World"...


These exploits are all created well in advance. People hold them for the whole year just to use them here. They're usually made by teams, with one person chosen to run it at the event.

At the event, each person brings their exploit and the browser is run against it.

Somehow this gets changed to "browser hacked in seconds!" because the media is great like that.

That said, it is quite impressive for a newcomer to clean house like this, even if he did have a year to prepare, assuming he wasn't working with a team.


"People hold them for the whole year just to use them here"

But does this mean that they will leave the vulnerability alive for a year, half-year (or whenever before the conference they found it) by not reporting it to the vendors till the conference? Because from the description it looks like it has to work on the latest versions of the browser (for example Chrome 42).


There is another perverse incentive. It has been suggested that in previous years the browser vendors were sitting on fixes and waited till the week before pwn2own to release them.


Who suggested that and what reason do they have to believe it?


Correct. On the other hand, if this contest did not exist they may not be looking in the first place.


This was one of Google's stated motivations for recently changing Pwnium from an in-person event similar to Pwn2Own (and held at the same conference 3/4 times, IIRC) to a more traditional year-round bug bounty.

Me, I'm going to miss the experience of sitting at the little dinky hotel cafe with bad Wi-Fi and frantically trying to finish up the exploit before the contest ends. And the press coverage was a bonus...


Of course, with $225,000 on the line, who on earth wouldn't leave the vulnerability alive.


I am a friend of a friend of lokihardt, and yes it was a solo effort. Very impressive.


I don't think it's supposed to be read as being hacked in two days. I'm sure he's worked on them before attending the conference, but only presented them on the second day due to the format of the conference.


Location: Lyon (France)

  Remote: No

  Willing to relocate: Yes 

  Technologies: JavaScript (Backbone), PHP (Symfony), Python

  Résumé/CV: https://www.dropbox.com/s/942eid881f4i5mj/cv-quentin-agren-2015.pdf?dl=0

  Email: quentin.agren@gmail.com


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: