Hacker Newsnew | past | comments | ask | show | jobs | submit | stenius's commentslogin

There is competition, they took over the contract from Deleware North in 2014 IIRC.

Here's some stats that kagi publishes on how people are using their blocking and a great place to great started with it as well.

https://kagi.com/stats?stat=leaderboard


I know lots of people that have their 2 factor auth setups on the same computer they are using to login. If you can compromise that computer, there's no additional "2fa" needed.

All it takes is some engineer that needs admin access for their job installing something.


It's incredible to see how much stuff has been added over the last couple of years.

I've missed a lot of these that I'm going to take advantage of!


The prop on the hat acts as a para-shoot slowing down the hat via auto rotation.

It's the same behavior that a helicopter would have if it was doing an emergency landing as well.


Well, I think it's as simple as you say. Phones have completely taken over the market. The majority of people don't find any value in having another device that's only differentiating factor is that it isn't their phone. (You didn't mention headphone jacks).

It's just like portable GPS devices, electronic organizers (https://www.youtube.com/watch?v=qdeE_kiG5Co), electronic translators/dictionaries, calculators, alarm clocks, ...


Your point is good but I do want to mention that I still use a garmin inReach when I'm going to places that are outside of cell service range. It's basically meant to be used with a phone anyway, but I get some peace of mind from having a specialized device to do things like call for help.


> You didn't mention headphone jacks

Oh, I did in a side comment :-) There is nothing like the

> Earphone remote support[2]

with its tap codes to control the playback. See https://github.com/advplyr/audiobookshelf-app/issues/847 for details


I don't know if I was that attuned to my system, but I really miss having an audible way of knowing when a process was blocked by disk access.



I was actually thinking about MQTT after I posted this.

I'm leaning towards just allowing the mqtt server you connect to to be changed, so that you can point it at whatever in the future, and all messages are plain text and documented.


How do you use this in practice?

Do you plug your phone in via USB-C and then use the WIFI off of that instead of the hotspot on your device?

Or do you go to hotels and use this to connect to their wifi and then use your own AP?


I have a cheapo Android phone I had laying around, used developer mode to make it always select tether instead of mass storage and I've got a (prepaid) data SIM in there.

When we travel the Beryl AX is our own hotspot, all devices can connect to its network. Then I just pick the best way to get the Beryl to the internet. Sometimes it's wired, sometimes it's connected to a WiFi, sometimes I need to plug in the phone and we use that.

And the best thing is that it can do failover, so I can have the hotel WiFi as the primary connection, but it'll fall back to the 4G phone connection if something goes wrong.


I used mine with the same SSID as my home network!

So when I travel I can either tether a phone and all the family devices just connect, or bridge it to the destination network and again let all the devices connect as if at home!


So could you explain the process by which you ‘tether a phone’? Is that don’t by plugging the phone in via usb? Is it paired via Bluetooth? Do you wifi the phone to it and spread the internet like that? I think some of us are quite curious about the specifics on that point :)

Sounds great!

P.s. I love (and am horrified) at how easy it is to ‘hijack’ a devices wifi just by making a network with the same name (and no password). I’ve done it myself over the years to make it easier for family or friends while travelling. But I always felt a bit ick about it working.


Hi,

I tether via a cable.

Because it's my work (Dev/Tech/Nerd) I have multiple phones with SIM cards.

So I physically tether a phone to the device.

I don't believe the device OP linked can a bridged WiFi network as such.

You can do a similar thing with a Mac:

Plug in your iPhone via a cable, then share the iPhone's tethered data connection over the Macs WiFi or ethernet port.

It's actually a good way to get around restrictions on some mobile SIM plans that don't allow them to be used as Data SIMs!


It shouldn't work if the security setup is different; if the home network is WPA2 then another open network with the same SSID should be ignored.


I have small case with this router, ethernet cable and usb cable for phone.

So it really depends where I am, so I can choose between USB, ethernet or wifi.

But I think most use for me have been USB tethering in my home country (unlimited mobile data).

I just like how router does adblocking (Adguard Home DNS) and VPN with wireguard/tailscale.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: