Hacker News new | past | comments | ask | show | jobs | submit | zaidmo's comments login

A projector based Virtual Reality solution for home use that doesn't require headsets.

I've also just launched www.immersiveauthority.com - an Immersive Tech / VR site. Whatever I learn I transcribe on the site.


Check out the Mythbusters 360 degree video here: https://www.youtube.com/watch?v=3WIS6N_9gjA


Floppy disk and cd/dvd drives! When you need to recover files from an old pc and need a Windows XP startup disk.... it's no fun in 2015.

Worse, it was on an IDE Hard drive and I couldn't find an external hard drive case for it so I had to take it to a PC repair store that had an IDE adaptor. Charges $40 to copy any amount of data above 20 Gigabytes.


I'll kinda miss the portability there of those. Not the multiplicity. Too many "standards", especially as you piled on the megabytes. 50MG Optical disk? Yea, where do I get a drive for that?


Hi. I'd like to get in on the VR / AR bandwagon and I'm looking at where I could fit in on the value chain. Potentially from a consultancy perspective...

I've started drawing up list of what services I think each role player in the ecosystem can offer to specific target segments


After researching the topic for a few weeks I've just published an article that answers: What components make up smart luggage? Is it worth it? How to hack your own?

Let me know if you need any clarification (I'll try my best).

I was a bit afraid to post my article on Hacker News as BlueSmart is a Y-Combinator backed project. Please note that I fully respect their efforts.


I'm not sure how this works on a PC with IE/FF/Chrome/Opera used as a desktop browser to access Twitter. Will a private key sit on my PC? I would assume that more account hacks originate from a desktop pc (using brute force attack methods, etc) rather than from a phone, hence a PC requires further security?


When you are designing a two-factor security system, you have to select two of the following three sources of information to authenticate you: something you know; something you have; something you are. In twitter's case, they've chosen 'know' (password) and 'have' (phone).

The private key in on your phone. The two factors are: your password, and the private key on your phone. You have to have a phone with the twitter app installed.


> ...you have to have a phone...

And that's a problem if you live in some cities of the so called third world where phones are stolen at the same rate bananas are picked from trees in Congo by monkeys. I don't feel comfortable at all about the "having a phone" part of my authentication process simply because the device can be stolen at any moment. My attorney had 16 phones stolen in the past 5 years. Virtually all the people I know had their phone stolen at least once. And if the idea of regaining access to your account without the phone is "hard" as claimed by Twitter's sec guys... ufff, I won't even bother to install the app thing. I think biometrics is the only security measure that will work in our violent cities here, not only for web services access, but for device usage itself.


Someone compromising my twitter account does not compared to having my phone stolen! If your twitter account is a significant asset, you could keep a cheap smart phone on your desk as a smart card substitute, or practice strict password hygiene & not enable 2-factor authentication?


Biometrics is not fundamentally different from using a password lock, just stronger. It's virtually impossible to break iOS' encryption with today's technology.

Or you know, just don't use a phone... there are plenty of companies offering password management solutions using browser extensions or desktop software.


Do you really need to break iOS encryption? I'm not a big pro in iOS but I heard there are many forensic companies which specialize on extracting data from iOS devices, and from their pages[1] it looks like you can extract quite a lot of stuff from somebody else's phone.

[1] http://www.cellebrite.com/forensic-solutions/ios-forensics.h... http://www.elcomsoft.com/eift.html


Doesn't appear to be the case: http://news.cnet.com/8301-13578_3-57583843-38/apple-deluged-...

Their 'physical analyzer' doesn't work from the iPhone4S or iPad 2 onwards (under Click here to view all supported iOS devices).


Wait, so there's a backdoor, but police doesn't own it? Then I'm pretty sure NSA either has it or has a way to make Apple tell them how to use it, and it is done is some "security letter" manner that doesn't need a warrant and permissions from any non-kangaroo court. This is how these things are done these days. In any case, this confirms the backdoor exists and Apple has official queue for police to use it. One can only guess who else can access it and with which procedure...


Strictly speaking, Twitter does not check what you "have" - it only checks that you "know" the secret key. If I stole your phone, dumped all info there and then returned the phone to you - I still could use the private key to fool Twitter into thinking I'm you, couldn't I?

The key is just harder to steal because it is big and is not sent out. But this doesn't seem to have much to do with phones...


You've just described a physical token duplication attack. A consumer phone certainly is easier to attack than a SecurID or smartcard, but it's a far sight from a really really long password. For starters, the challenge response is calculated by the phone's hardware, so that the private key is not exposed.

The "what you know"-type authentication is literally what you know, not "I don't know it but it's written down on my phone, hang on a sec". You're supposed to be able to provide it without reference to notes (or Post-Its stuck to the bottom of keyboards).


I assume you could run the app in an Android virtual machine on the PC, if you don't mind being restricted to that single PC for logins.

Regarding security, I'd say just the opposite, I'd expect a random PC to be more secure than a random Android phone.


I was wondering if the word "open source" is being used correctly in the context of aeroplane parts.

Dictionary.com has 2 definitions:

1. Computers. pertaining to or denoting software whose source code is available free of charge to the public to use, copy, modify, sublicense, or distribute.

2. pertaining to or denoting a product or system whose origins, formula, design, etc., are freely accessible to the public.

I guess the latter definition could apply, where the components can be produced (e.g. 3D printed) from detailed "open source" blueprints? However, I dont think the plane will be built from 100% "open source" rendered components. Generic or branded components may need to be purchased as well.


I dont understand how you stream content from your device to the Chromecast. My PC has Windows Media Player, my Windows 8 phone has XBox SmartGlass. Would these applications allow you to stream to the tv. I am abit lost...


No. There are 4 applications that know what a Chromecast is and can send video to it: Netflix for Android, YouTube for Android, Google Play for Android, and Chrome for Android/Windows/Mac/ChromeOS.

* ed: and ChromeOS.


Correction: Netflix for Android/iOS, YouTube for Android/iOS, Google Play for Android, and Chrome browser for Android/Windows/Mac/iOS/ChromeOS.

iOS support is a major factor here.


> There are 4 applications that know what a Chromecast is and can send video to it: Netflix for Android, YouTube for Android, Google Play for Android, and Chrome for Android/Windows/Mac.

Clearly, ChromeOS does too, since it works on the Chromebook Pixel.


Well, there are 4 now. But there's a public API (more precisely, 3 public APIs), so more'll start popping up soon enough.

https://developers.google.com/cast/


This makes me too sad. When will the detainees be treated like humans? Will Obama eventually keep his word and shut down this facility?

This is INHUMANE!


Hope it passes. Edward is almost like a refugee (Palestinian or Syrian) - forced to leave his country, can't go back home, and no other country will accept him. Perhaps he should head for and remain on a vessel in International Waters?


Where the US could take him by force without violating another nation's sovereignty? I don't think that would be a very good plan.


Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: