Hacker Newsnew | past | comments | ask | show | jobs | submit | hsbauauvhabzb's commentslogin

I would have thought modern devices would complain about unencrypted enough that putting even the password 123456 would be less painful

Which is even more absurd. You can watch illegal things on TV too. Both are a gross breach of monopolistic power.

you can directly hurt more people with a car than a TV though

A car phoning your analytics home is not an immediate preventative measure though. It’s a grotesque overstep.

Pre-roll trailers are ads.

A rose by any other name…

It sure is a pretty good indicator, and if you underestimate human laziness you’re gonna have a bad time regardless.

Also looking at how much they’ve released and how fast and how they blog like they own the world (or design the website)

I used to look up to Posthog as I thought, wow this is a really good startup. They’re achieving a lot fast actually.

But turns out a lot was sloppy. I don’t trust them no more and would opt for another platform now.


Virtual machines are treated as a security boundary despite the fact that with enough R&D they are not. Hosting minecraft servers in virtual machines is fine, but not a great idea if they’re cohosted on a machine that has billions of dollars in crypto or military secrets.

Docker is pretty much the same but supposedly more flimsy.

Both have non-obvious configuration weaknesses that can lead to escapes.


> Virtual machines are treated as a security boundary despite the fact that with enough R&D they are not. Hosting minecraft servers in virtual machines is fine, but not a great idea if they’re cohosted on a machine that has billions of dollars in crypto or military secrets.

While I generally agree with the technical argument, I fail to see the threat model here. Is it that some external threat would have prior knowledge that an important target is in close proximity to a less hardened one? It doesn't seem viable to me for nation states to spend the expensive R&D to compromise hobbyist-adjacent services in a hope that they can discover more valuable data on the host hypervisor.

Once such expensive malware is deployed, there's a huge risk that all the R&D money is spent on potentially just reconnaissance.


Yes. Docker too.

Yeah but why would somebody co-host military secrets or billions of dollars? Its a bit of a stretch

I think you’re missing the point, which was that high value targets adjacent to soft targets make escapes a legitimate target, but in low value scenarios vm escapes aren’t worth the R&D

but if you can do it at scale it might still be worth it, like owning thousands of machines

I’m not sure why you think it’s the researchers responsibility to verify patches. It would be nice, especially if they’re knowledgeable in the code, but Microsoft have the resources to put someone else in that position too.

The researchers in this case literally checked the patch after release. It costs nothing to send them a pre-release and ask the question

That’s different. I’m not here to mark your work but if you publish your work, I’m happy to publicly point out that you’re wrong, especially if you’re Microsoft size and should have work checkers internally and are continually doing the wrong think and putting people at risk as a result.

What’s the expectation for responsible disclosure when it comes to ineffective patches? Does that normally reset the counter to 90 days, or only if the patch was reasonable and in good faith?

More people are looking. Microsoft products have been large attack surface, poorly coded and heavily researched for a very long time.

I’d happily pay $100 a year for Firefox WITH an adblocker as long as part of the money is put towards ongoing internet freedom and preventing attestation

As with all the comments about "I'd pay X dollars to not be the product", it's been shown over and over again that paying money is not going to void corporate desire to simply double dip by raising prices while also showing ads.

Or for a similar point, it's been shown over and over that attempting to crowdsource the revenue is a staggeringly unrealistic response with no real world precedent in the history either of browsers or online crowdsourced funding. You would think that would matter to people who point to that as a possible panacea.

Actual attempts to get users to pay for the browser itself, like what Opera did, simply didn't work and led to the insolvency of the browser and having to sell it off to someone harvesting its users as data.


You might want to look up Thunderbird crowd funding over the past couple of years. Spoiler: it's been very successful.

Check Firefox's annual budget compared to Thunderbird's annual budget and get back to me.

Orion browser is a thing

A closed source thing.

There are operating systems other than macOS.


I'm aware. What does it change?

It directly addresses your complaint, a confusing complaint to make if you were already aware that Linux and Windows versions are coming soon.

Unless, of course, you're holding out for, I don't know, a BeOS version.


I just don't think one can seriously say "Orion browser is a thing" if it is definitely not a thing for 95% desktops out there (the exact % may be different depending on the source of data, etc.). And Windows (around 70% of the market share) version is not expected until late 2026.

Depending on your hardware architecture and security needs, fiddling with ciphers in mainline might improve speed.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: