Hacker Newsnew | past | comments | ask | show | jobs | submit | sepposade's commentslogin

Note that if you're an Emacs user and you execute commands from inside Emacs, there is already a framework for colorization in the fontify-* or highlight-* functions.


Each phone could have a built in key for signing. You could tell operators to not allow any other phone except for yours (which has this key) to access your account. Not a problem.


What happens here - is the phone itself becomes the sim card. That is troublesome on a number of levels. I'd rather push those functions to a little piece of plastic that is easy to move between handsets.

"You could tell operators"... How and where? When I'm in Thailand on vacation, I want data but I don't want to have to worry about registering my phone - I just go to kiosk and get a sim.

When I was in Ethiopia a few weeks ago getting a sim took a bit of work. I had to give them photos and some other documentation. A lot of governments are moving this way. Once it was done though, I had the sims I needed and the phone choices were wide open.

Maybe I'm missing a piece of the puzzle but in my experience the sim is what makes me free. The idea that the existence of a sim == being locked down comes from a broken telecom system not a technical limitation of the format.


There are some countries you do have to give extra documentation, and often providers will rip you off by giving you more airtime only if you register.

Funny you mention Ethiopia, the telecom there is completely state controlled, and it has been used to thwart opposition (listen in on calls, shut down complete SMS, etc). It's one of the many "remnants" of the communist regime. Supposedly Orange was coming in to manage and change that however...


SIM cards are exactly this, with the added benefit of (almost) two factor authentication. If I have my SIM card, I can be reasonably confident that you can't pretend to be me. If phones managed keys, I'd be more worried that you've managed to copy my key somehow.


Especially give the sheer number of apps out there and reports of apps doing more than they should, as well as users blindly installing apps with higher permissions than they actually require. This would get exploited very quickly no doubt.


Though, going to a store and proving who you are just to change a phone would be annoying. Maybe we could automate this. For extra security, we could use something besides a username and password. Maybe, the phone company could give us something, and we could use that to identify ourselves. Something we have. Maybe we could get the manufacturers allow us to store the identifier in the phone itself, and the phone could read the id card, and tell the phone company "Hey, this guy is good people!" that way, the entire process is all automated.

Good idea!


But you will pay outrageous roaming charges. Why should you? Would you accept roaming charges on Wi-Fi access when abroad?


Why would you pay roaming charges when you swap sim card for a local one?

Besides it's not that bad in EU with roaming anymore http://ec.europa.eu/information_society/activities/roaming/t...

Also, some operators allow to purchase "european data" - ie. unlimited european data roaming for cheap.


They wont pay roaming because they swap sims - 4th sentence.


Eshell (The Emacs Shell) is a lot of what the original post already describes in terms of power: http://www.gnu.org/software/emacs/manual/html_mono/eshell.ht.... Too bad it isn't being very actively developed anymore.


Option-click on the Time Machine menu to verify backups. Sleep well.


Tried most of the non-Apple Terminal alternatives, but personally I have always kept returning to Terminal because there is something about its finishing touches that add up.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: