Hacker Newsnew | past | comments | ask | show | jobs | submit | RajT88's commentslogin

WPF looks much nicer. Personally I find it hard as hell to debug.

Winforms just work, and have a well defined set of behaviors. It does not matter that they do not look as nice for most people.


butwhy.gif

People keep being amazed that Turing-complete mechanisms can run any program. ;)

Why climb Mount Everest? Because it's there.

>butwhy.gif

comment.svg


Yes, there is how things are said to work, and how they actually work.

It reminded me of this one:

https://wtfmitchel.medium.com/how-to-get-fired-from-microsof...

A lot of similarities, except the medium author was not part of PG but support. He also had recently suffered a brain injury.


"While some may see this as a dick move and I wasn’t exactly proud of it, but I actually waited for Daniel’s wife, Katie, to go into labor before bringing all of this up with his management."

Holy cow! Now I've unfortunately witnessed some ugly office behavior too, but this is quite another level.


Before or after publishing his article?

It was the genesis of the events in the article.

like 5 minutes after.

And then it looks very bad?

The amount of each incident is fairly low, and probably goes a long way to funding the local community.

But the number of incidents is nuts - well over 1000 per year.


"Around 100,000 people hike to Everest Base Camp every year"

I have no idea how many of those people have to buy insurance.

Source: https://everestcamptrek.com/how-many-people-hike-to-everest-...


TFA explains it is looking for installed browser extensions (which sites are allowed to do)

"allowed" by the web browser, but almost certainly not by the end user. The law is pretty clear on this in the US:

> 'the term “exceeds authorized access” means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter;'

The problem, of course, is that by clicking on a LinkedIn link, you agree to a non-negotiated contract that can change at any time, and that you have never seen. If that weren't allowed, then this sort of crap would correctly be considered "unauthorized access":

https://www.law.cornell.edu/uscode/text/18/1030


Allowed to do? Not prevented from by technical measures, but certainly not allowed to do.

Considering the goal is to identify people, this is undeniably PII. As the article demonstrates, it also pertains sensitive information.


https://browsergate.eu/how-it-works/: “Every time you open LinkedIn in a Chrome-based browser, LinkedIn’s JavaScript executes a silent scan of your installed browser extensions”

⇒ which Chrome allows sites to do.


TFA goes into a lot of detail explaining why they "allegedly" aren't actually allowed to do so in the EU.

Can you build a version of chromium where this will just return false always?

Well, they're able to do it; “allowed” to do it is an ambiguous enough phrasing that it's practically begging to have an argument whose crux is fundamentally about a differing interpretation.

The author suggests a legal remedy instead of a technical one.

Which is weird, because that is undeniably the hard way. Lobby Google to add protections to Chromium.


Putting bars on the windows is fine, but the bad actors still need to be punished.

Totally wild factoid: Bull sharks have been caught in tributaries of the Mississippi River in Illinois. (Back before they built all the dams)

Yeah, bull sharks are the most common and wide-ranging of the sharks that are adapted to survive in a wide range of salinity levels.

That's the kind of rare and highly luck based curiosity they ought to give you a plaque for. "From this shore in 1973 local angler..." Slap it on the same sign post as the flood high water markers they put up.

Bull sharks are often found in rivers tens of kilometres from the ocean in Queensland.

He is likely wrong (most sharks cannot live long in fresh water). But given the show, he has to conclude it is a fish of some sort, and it is not going to be 10k arctic char in a dinosaur suit.

ooni.org has been tracking the many ways countries have been censoring and blocking internet.

The articles I've read about this blocking, and people trying to find ways around it echoes what I started seeing a few years ago - with TLS handshake packets being dropped to certain hosts which obviously were thought to have questionable content (CDN endpoints, where a lot of different sites host content on those IP's).


Every company is a bit different. There's IC's where I work making more than some managers.

The author suggests that nobody is going to come tap you on the shoulder and let you know it's time. Well, that's what happened to me where I am at now - hired at bottom level, regularly promoted, now at top level. Took 6 years to get to principal. Granted, my group is not SWE's, it's more like an Architect role.

What I learned having made principal is that the yearly bonuses can be lower, because expectations are so high. I got bigger bonuses at a lower title, because I was exceeding the expectations of that role by so much. Apparently principal's have such high expectations you almost never get beyond the target bonus for your role. Then there's the stress from all the layoffs across tech - a lot of Principal level people where I work got cut over the last ~2 years, presumably to save on costs. I almost wish I'd stayed at the lower level to get bigger bonuses, lower salary and higher job security. YMMV.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: