Hacker Newsnew | past | comments | ask | show | jobs | submit | lost_name's commentslogin

Maybe a little off the topic, but I was thinking just the other day that Alexa/Google Home/Siri could be made significantly better if it accepted instructions the way ChatGPT does.


>Audio transcription is not currently available.

My theory on this is that it would confuse the dataset having to both transcribe and then "understand" what was asked. By reducing this single variable [which we all know is technically already possible: audio transcription], the dataset is allowing itself to be trained with less initial noise.


Your statement made me wonder if someone else had done this, and sure enough I found something -- https://www.cloudcomparisontool.com/

Look for "Object Storange" for instance and in the row will be links to all the competing services, so you could pretty easily do this to learn about competitors through the one you know... At least for the big players.


Isn't this wrong? At Google's Storage options, it says Google doesn't have Backup or Disaster Recovery options.

As long as I know, aren't those types into Cloud Storage - nearline and coldline object storage types?


> "Scalable" no idea what it means.

Generally refers to the idea that a microservice should be designed to scale horizontally (with more instances) vs. vertically (more compute power). If you can scale horizontally you're more likely to be able to meet changes demand at a lower price.


In firefox, if I put something in the search box, press enter, it will search. If I press enter a second time (taking no other action) it will display json.


Kind of a tangent, but I was traveling in Portugal last year, and one day as I was headed to a train station I felt my phone buzz. I picked it up and it had a failed Bluetooth file transfer. In the settings, the device name had changed from the default to what looked like a base64 string, if I remember correctly. Unfortunately I didn't think to screenshot anything.

The phone was literally only a couple weeks old. Nothing new had been paired. I changed the name back and figured I would look it up later. The failed file transfer was automatically cleared (just a phone thing) and I wasn't able to find information about it.


A similar thing happened to my phone while I was at Defcon several years ago. After that I put my phone on airplane mode. Then when I got home, I reset all my passwords, and wiped the phone.


Is people trying to hack the attendees a common occurrence at Defcon?


Can be, the Wall of Sheep mentioned here is from the traffic on the DefCon network. General practice is to make sure at least your bluetooth and wifi are turned off. Realistically, no one is going to use a 0-day to hack into your personal phone.


It's Defcon, so yes.


So much so there is a 'wall of shame' projector posting attendees credentials for all to see.


That's for unencrypted credentials captured going across the wire by the ops team. That's to highlight insecure comms not hack people.

There was an instance where someone used a wifi pineapple 0day to brick pineapples, which are considered script kiddie tools in many circles.

Generally nobody will waste a valuable 0day at defcon to attack a personal device. If you get popped it's probably because you're running known vulnerable software.


I think that should be "wall of sheep".


Always treat Defcon as a dangerous place


No its more of an urban legend. I'm sure there's some hijinks going on but I doubt the hotels would tolerate any kind of large scale malicious activity especially with all the unrelated people staying at the hotel


DefCon sets up its own wifi networks, it doesn't use the hotel's wifi


Do you have sources for that? It’s unlike what many people who attend claim so I’d like to know what it’s based on.


I concur. While I bring a "burner" phone and laptop, it's more so I have a scratch system I can play / experiement on than any real fear that a sensibly configured device is going to get pwned. I used my real phone and laptop during Defcon 27 last week, too. I do have bluetooth off, and I made sure I had no filesharing enabled, and the latest patches, etc.)

I've been to about 10 defcons, and I've never had a device pwned that wasn't a spare device I was playing with.


https://en.wikipedia.org/wiki/Bluesnarfing

I might be misremembering technologies, but I think in BT the incoming connection can directly execute commands on your device without any kind of identification/authorization.


For what it's worth, my banks have these features other than Daily Cash. That feature is something I don't think I've seen before.

> It just looks like an Apple branded version of what I've already had for years.

It is an Apple branded Mastercard, with some level of iPhone integration. It is something you've had for years.


Well, for what it's worth, they rent their own scooters as well as license out their platform. Perhaps some of the value comes from that.

https://www.bird.co/platform/


> It seems that everybody knows everything.

I think about this from time to time -- how people build up this sense of personality related to a forum or site. I think what tends to happen for an individual is that when you're talking to millions of people you don't have the perspective on who says what anymore, it becomes "twitter thinks" or "reddit says" instead of "these 10 people."

I think the reason everybody knows everything is that because we don't look at the individuals when we talk in a forum like this. There are always going to be some 'famous' people whose names pop up over and over, but as general responses you don't really know what a person thinks about something. We internalize a consensus of opinions and then it becomes just "well, HN said this."

This is most apparent when the forum contradicts itself. If there isn't another way to denote the opinions (like a sub-forum) then you start seeing comments like "everyone was against it yesterday and now everyone is in favor?" when in reality it's unlikely to be the same people responding anyway.


Wouldn't this be true for any open source application you don't compile from the source?


There's something called deterministic compilation: https://en.wikipedia.org/wiki/Deterministic_compilation

Debian is trying to get reproducible builds for their packages.

I don't know enough about iOS to say anything about that.


How does that help if you aren't compiling?


Because someone you trust can compile and verify that the source they audited matches the binary you got from the app store.


So how do you do this in practice? Do you just send some guy (that you trust!) hashes of all the files on your system and hope that he spots the backdoored binary soon enough?

Perhaps there's some false assumption there that the "app store" will serve everyone a backdoored binary, instead of performing almost undetectable targeted attacks.


I agree and was curious why they picked it. I guess their reasoning is as good as any.

> Steem is a form of esteem, which means to prize or value. Steem is also a homophone for steam, which is frequently associated with power, and a step further, steam powered trains gave influence to English idioms, such as ‘this conversation is picking up steam.’ The associations with prizing, language and empowerment only felt right.

https://steem.io/#faq


But there is already a very popular service called Steam, so I think I would have kept searching for another name, personally. No reason to risk confusion.


Still, Steem is an infinitely better name than Steemit.


Copycat of Reddit (lol).


Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: