For context, there is a completely different plant affectionately known as "bushman's toilet paper" (an example: https://en.wikipedia.org/wiki/Brachyglottis_repanda). It grows more or less in the same places as the Gympie Gympie (the plant referred to in this article).
An easy mistake to make, and a very, very dangerous one.
Airbus seems to use ADA mainly for drone software. Everything else is MISRA C, or MISRA C with a layer of abstraction overlaid that allows for generation of assembly from the same codebase as well.
The bank I'm using has 2FA for all actions performed in the website, so that's my guess as to why they don't prioritize fixing the lame password requirement.
Exactly. 2FA is much more important than complicated password (not that I'm advocating to have a guessable one here), altogether providing acceptable level of security.
They're being rightly trashed because it's a SEO tactic and nothing more. Between the preamble ranking them higher and Adsense requiring "substance" in order to monetise the page, there is a systematic issue that's leading to what is essentially useless information to what I would say is the majority of people.
They're very welcome to write their life story, but I bet if google changed their algorithm slightly you'd see it disappear - and I'd say that would be a good thing.
HNers writhing over each other to be the most cynical and dismissive.
For fun, can you link me to a highly ranked recipe page with a bullshit SEO story on it in line with "the camping trip in North Dakota when Susan's husband first discovered his love of homemade sour cream"?
But just to prove your point and make you happy, and also because I'm hungry, I googled "sushi recipe idea" and clicked the first link that, without fail, talks about the very special valentine's day Tom^Wthe author and her husband spent years ago and how sushi is now a tradition.
You have to scroll halfway down to get your ingredients list after learning that her husband is a vegetarian, getting a history of the author cooking mostly plants before anyway, getting a lesson on what egg noodles are and, finally, the ingredients.
"When I woke up that Sunday morning, it was a crisp 68°. I opened every window in the house (the first time we’d aired it out since April) and put on a pair of jeans and a light long-sleeved shirt. While Scott was busy appraising his fantasy football rosters, I was searing beef and taking pictures."
No. That's my exact point. The CIA can't just get control of a company because they want to. Not that it's impossible, but there isn't a reliable mechanism for doing so.
They would need to somehow subvert key executives and subvert key employees to convince them to add back doors and keep quiet about it.
Their levers on such people (carrots and sticks, threats and bribes) aren't that easy to deploy either, especially en mass and in the US. There are a lot of legal hurdles. (The CIA has a lot more legal latitude outside the US than in -- that's very likely an important reason AG Crypto is a Swiss company and not an American one.) Not that the CIA always scrupulously follows the law -- they don't -- but they have to be careful about it.
I suppose you can just believe the CIA hits the "pwn" button anytime they like. But that doesn't have anything to do with the way things work.
Interesting list. Besides Palantir, I know these: GitLab, Databricks, MemSQL and mongoDB. I don't think "they" are using these to exfiltrate data "Crypto AG" style - I'd be surprised if "big data"/data science wasn't part of their operations, hence it makes sense to invest into some of their core tools. This ensures sustained development and maybe catering to CIA-specific edge cases.
Judging by the company names: Investments into RF companies also are more likely on the "tools we use" instead of the "rigged" side of things. The amount of Biotech makes me assume the decision-makers think this is an emerging market which will make a good investment.
So answering to GP: No, not compromised. I wouldn't be surprised if there were one or maybe even two hiding in plain sight, but I think for each individual company on that list, it is very, very, very unlikely that this specific company is compromised. If you don't trust them, make your sensitive GitLab and MongoDB instances accessible via Intranet/VPN only - but I suppose that's good practice anyway?
There is a space shuttle lego set in existence that is big enough for that. It is absolutely massive - and at that scale, I think the ISS would be absolutely unwieldy.
An easy mistake to make, and a very, very dangerous one.