Hacker Newsnew | past | comments | ask | show | jobs | submit | omani's commentslogin

you probably mean "stochastics".


I would translate to: "from a stochastic perspective one can win - from a statistic perspective, its very unlikely"


this has to be a joke, right?


only downside to LE is the attack surface presented by CTLs (Certificate Transparency Logs). as soon as you request a cert, you will get attacks on the endpoint/subdomain you have registered by countless IPs trying to login etc.


too slow man. come on. you make phind worse and worse. unusable. no need to wait a minute for an answer.

seriously, just use https://chat.mistral.ai/chat folks.


hey michael, long term phind user here. phind became absolute sh*t. almost every answer is wrong. web search should be on by default to get accurate info. but even then is ends up hallucinating a lot.

if every response starts with "You're absolutely right -- ..." you know phind is hallucinating and you can immediately close the tab.


hey, sorry to hear that. web search is on by default, but we had some teething issues with it in the last hour. it should be fully fixed now. can you send some links that failed?


people often can't share their searches due to privacy concerns, maybe you should at least provide an email address so they can share it privately? rather than posting on HN (going forward, does you app have a feedback button in each search? if not it should)

anyway I think you need better QA processes


one way to mitigate DDoS is to enforce source IP checks on the way OUT of a datacenter (egress).

sure there are botnets, infected devices, etc that would conform to this but where does the sheer power of a big ddos attack come from? including those who sell it as a service. they have to have some infrastructure in some datacenter right?

make a law that forces every edge router of a datacenter to check for source IP and you would eliminate a very big portion of DDoS as we know it.

until then, the only real and effective method of mitigating a DDoS attack is with even more bandwidth. you are basically a black hole to the attack, which cloudflare basically is.


alright, what you are proposing is kind of hard to do. Source routing is not easy, and source validations is even harder.

and what prevents me, as a abuse hoster or "bad guy" from just announcing my own IP space directly on a transit or IXP?

You might say, the IXP should do source checking aswell, but what if ipspace is distributed/anycasted across multiple ASN's/ on the IXP?

Also, if you add multiple egress points distributed across different routing domains, it gets complicated fast.

Does my transit upstream need to do source validation of my IP space? What about their upstream? Also, how would he know which IPspace belongs to which ASN's considering the allocation of ASN numbers and IP space is distributed across different organisations across the globe. (some of which are more malicious/non function than others[0]). Source routing becomes extremly complex because there is no single, universal mapping between IP space and ASN's they belong too.

[0]https://afrinic.net/notice-for-termination-of-the-receiversh...


The biggest attacks literally come from botnets. There’s not a lot coming from infrastructure services precisely because these services are incentivized to shut that shit down. At most it would be used as the control plane which is how people attempt to shut down the botnets.


one way to mitigate DDoS is to enforce source IP checks on the way OUT of a datacenter (egress).

sure there are botnets, infected devices, etc that would conform to this but where does the sheer power of a big ddos attack come from? including those who sell it as a service. they have to have some infrastructure in some datacenter right?

make a law that forces every edge router of a datacenter to check for source IP and you would eliminate a very big portion of DDoS as we know it.

until then, the only real and effective method of mitigating a DDoS attack is with even more bandwidth. you are basically a black hole to the attack, which cloudflare basically is.


am using gitea. but thinking of switching to serve (charm).


I'm also using gitea, running on RPI5. Setup took like 15 mins, highly recommend.


mine is running on an rpi zero w (v1). super low power consumption.


A wifi-enabled high precision load cell for industrial environments.


> This project was driven by the personal need of having to manage several dotfiles for different machines/targets.

the functionality OP is searching for is already provided by chezmoi. and many more features.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: