Hacker Newsnew | past | comments | ask | show | jobs | submit | roddux's commentslogin

The stupid dancing fuzz filter across the entire website renders the content almost completely illegible, and is a struggle to read. Shame.

Adding 'https://www.surveillancewatch.io/noise-anim.gif' to your favourite rule-based adblocker fixes this.

Rather than seeking an impossible ideal (>2 people who agree on what 'good' code is)-- instead read ALL sorts of code. This will then help you learn to distinguish between what is good and not good, and what makes it so. Simplicity, clarity, and lack of surprise come to mind as concepts for 'good'. Others will have different ideas.


Looking at a local privilege escalation (on some systems) that works due to a logic bug in readline, when used with SUID programs.


Find a new provider that won't randomly shaft you for spurious reasons.


For example…?


Solana really seems like the most interesting Layer-1 chain outside of Ethereum... lots of cool tech.


The real question is, why is anything written in Solana better off being run in a blockchain rather than a 'web2' client server architecture.


And so much overengineered.

Developing for Solana vs other EVM-based blockchains is enormously more expensive both in time and talent.



Archive/no paywall: https://archive.ph/Uxssq


I love the look of this, but haven't been able to find any information about latency... It seems to be a local network solution? Light on details about how it works, short of reading source.


Synergy (off which this was forked) experience: On a hardwired pair of computers, no perceptible latency at all. On wifi connected computers, I'd see the occasional latency spikes where things stop moving, but effectively imperceptible the rest of the time.


You don't strictly need a local network, you could probably get it to work across a VPN. As long as you can get a TLS connection directly between the two devices.

In my experience the protocol is quite light on the network, because this directly influences where the cursor is on your screen you probably want to keep latency down as much as possible.


I've been using synergy, literally, since the year 2000. I used to play a lot of first person shooters and over that time I never had a latency issue with using a mouse/keyboard on my old computer to play games on my new computers (over ethernet). No perceptible difference.


I've had issues running it over wireless so instead I connect the computers with an ethernet cable directly and configure static IP's. Haven't had any issues. Luckily my PC has two NICs and the laptop uses wifi anyway so the ethernet port is unused.


LaTeX for music? nice!


I came to LaTeX the other way around: Lilypond for text? Sign me up!


Nobody is arguing that users having a 1-2 week patch window is a bad thing. However, this frankly seems incompatible with open-source projects. Silently patching issues does not work in practice; it frequently leads to missed fixes, misapplied patches and other incompatibility woes. The situation with backports and LTS releases showcases this well— the only truly well-supported kernel is latest. Everything else is a patchwork of best-effort fixes, not all of which may have been applied correctly. Brad Spengler of grsecurity fame talks frequently about this (primarily via Twitter): https://twitter.com/spendergrsec


Not really. As you say there's an extremely difficult balance with opensource and not exposing everyone at once. You can't get a fix deployed everywhere without it being public first or it ends up in a total unfixable mess. But if the fix is public and gives too many info (exploit procedure) then you put everyone in danger until the fix flows to users.

Thus the only solution is to have a public fix describing the bug and not necessarily all the details, while distros prepare their update, and everyone discloses the trouble at the same time. Those who need early notification MUST ABSOLUTELY BE on linux-distros. There's no other way around. As soon as the patch is published, the risk is non-nul and a race is started between those who look for candidate fixes and those who have to distribute fixes to end users.

This is not about silently patching or hiding bugs, quite the opposite, it's about making them public as quickly as possible so that the fix can be picked, but without the unneeded elements that help vandals damage shared systems before these systems have a chance to be updated. Then it is useful that the reporter communicates about their finding, this often helps improve general security by documenting how certain classes of bugs turn to security issues (Max did an awesome job here, probably the best such bug report in the last few years). And distros need to publish more details as well in their advisories, so details are not "hidden", they're just delayed during tha embargo. Those who are not notified AND who do not follow stable are simply irresponsible. But I don't think there are that many doing that nowadays, possibly just a few hero admins in small companies trying to impress their boss with their collection of carefully selected patches (that render their machine even more vulnerable and tend to make them vocal when such issues happen).

In addition it's important to keep in mind that some bugs are discovered as being exploitable long after being fixed. That's why one MUST ABSOLUTELY NOT rely on the commit message alone to decide whether they are vulnerable or not, since it's quite common not to know upfront. I remember a year or two ago someone from Google's security team reported a bug on haproxy that could cause a crash in the HPACK decoder. That was extremely embarrassing as it could allow anyone to remotely crash haproxy. We had to release the fix indicating that the bug was critical and that the risk of crashing when facing bad data was real, without explaining how to crash it (since like a kernel it's a components many people tend to forget to upgrade). Then after the fix was merged, I was still discussing with the reporter and asked "do you think it could further be abused for RCE?". He said "let me check". A week later he came back saying "good news, I succeeded". No way to get that info in the commit message even if we wanted to, since that was too late. Yet the issue was important.

Speaking of Brad, I personally think that grsec ought to be on linux-distros, but maybe they prefer not to appear as "tainted" by early notifications, or maybe they're having some fun finding other issues themselves. We even proposed Brad to be on the security list, because he has the skills to help a lot and improve the security there. He could have interesting writeups for some of the bugs, and it would probably change his perception of what happens there. Maybe one day he'll accept (still keeping hope :-)).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: