Hacker Newsnew | past | comments | ask | show | jobs | submit | stogot's commentslogin

Consulting (good consulting anyways) requires the skill of teaching, so this doesn’t ring true. The adage is “those that can’t do, manage” which isn’t factual either

Wikipedia does the same to those who contribute

StackOverflow intimidated me for reasons you say. What is it with the power trip that some of these forum mods have?


Basic human nature. Many folks that are hard on others, have been the recipient of bullying, themselves. It’s a self-perpetuating thing.

“Breaking the chain” is quite difficult, because it means not behaving in the manner that every cell in your body demands.


Why not? If the region is in country, encrypted, and with proven security attestations validated by third parties, a backup to a cloud storage would be incredibly wise. Otherwise we might end up reading an article about a fire burning down a single data center

Microsoft has already testified that the American government maintains access to their data centres, in all regions. It likely applies to all American cloud companies.

America is not a stable ally, and has a history of spying on friends.

So unless the whole of your backup is encrypted offline, and you trust the NSA to never break the encryption you chose, its a national security risk.


> France spies on the US just as the US spies on France, the former head of France’s counter-espionage and counter-terrorism agency said Friday, commenting on reports that the US National Security Agency (NSA) recorded millions of French telephone calls.

> Bernard Squarcini, head of the Direction Centrale du Renseignement Intérieur (DCRI) intelligence service until last year, told French daily Le Figaro he was “astonished” when Prime Minister Jean-Marc Ayrault said he was "deeply shocked" by the claims.

> “I am amazed by such disconcerting naiveté,” he said in the interview. “You’d almost think our politicians don’t bother to read the reports they get from the intelligence services.”

> “The French intelligence services know full well that all countries, whether or not they are allies in the fight against terrorism, spy on each other all the time,” he said.

> “The Americans spy on French commercial and industrial interests, and we do the same to them because it’s in the national interest to protect our companies.”

> “There was nothing of any real surprise in this report,” he added. “No one is fooled.”


France has had a reputation for being especially active in industrial espionage since at least the 1990s. Here's an article from 2011 https://www.france24.com/en/20110104-france-industrial-espio...

I always thought it was a little unusual that the state of France owns over 25% of the defense and cyber security company Thales.


> I always thought it was a little unusual that the state of France owns over 25% of the defense and cyber security company Thales.

Unusual from an American perspective, maybe. The French state has stakes in many companies, particularly in critical markets that affect national sovereignty and security, such as defence or energy. There is a government agency to manage this: https://en.wikipedia.org/wiki/Agence_des_participations_de_l... .


> America is not a stable ally, and has a history of spying on friends

America is a shitty ally for many reasons. But spying on allies isn’t one of them. Allies spy on allies to verify they’re still allies. This has been done throughout history and is basic competency in statecraft.


That doesn’t capture the full truth. Since Snowden, we have hard evidence the NSA has been snooping on foreign governments and citizens alike with the purpose of harvesting data and gathering intelligence, not just to verify their loyalty.

No nation should trust the USA, especially not with their state secrets, if they can help it. Not that other countries are inherently more trustworthy, but the US is a known bad actor.


> Since Snowden, we have hard evidence the NSA has been snooping on foreign governments and citizens alike

We also know this is also true for Russia, China and India. Being spied on is part of the cost of relying on external security guarantees.

> Not that other countries are inherently more trustworthy, but the US is a known bad actor

All regional and global powers are known bad actors. That said, Seoul is already in bed with Washington. Sending encrypted back-ups to an American company probably doesn't increase its threat cross section materially.


> All regional and global powers are known bad actors.

That they are. Americans tend to view themselves as "the good guys" however, which is a wrong observation and thus needs pointing out in particular.

> That said, Seoul is already in bed with Washington. Sending encrypted back-ups to an American company probably doesn't increase its threat cross section materially.

If they have any secrets they attempt to keep even from Washington, they are contained in these backups. If that is the case, storing them (even encrypted) with an American company absolutely compromises security, even if there is no known threat vector at this time. The moment you give up control of your data, it will forever be subject to new threats discovered afterward. And that may just be something like observing the data volume after an event occurs that might give something away.


Being "in bed with Washington" doesn't really seem any kind of protection right now.

Case in point: https://en.wikipedia.org/wiki/2025_Georgia_Hyundai_plant_imm...

> The raid led to a diplomatic dispute between the United States and South Korea, with over 300 Koreans detained, and increased concerns about foreign companies investing in the United States.


There is no such thing as good or trustworthy actors when it comes to state affairs. Each and every one attempt to spy on the others. Perhaps US have more resources to do so than some others.

You really have no evidence to back up your assertion, because you’d have to be an insider.


> There is no such thing as good or trustworthy actors when it comes to state affairs. Each and every one attempt to spy on the others. Perhaps US have more resources to do so than some others.

Perhaps is doing a lot of work here. They do, and they are. That is what the Snowden leaks proved.

> You really have no evidence to back up your assertion, because you’d have to be an insider.

I don't, because the possibility alone warrants the additional caution.


Didn't mean to imply one followed from the other. Rather that both combined creates a risk.

Not only does the NSA break encryption but they actually sabotage algorithms to make them easier to break when used.

DES is an example of where people were sure that NSA persuaded IBM to weaken it but, to quote Bruce Schneier, "It took the academic community two decades to figure out that the NSA 'tweaks' actually improved the security of DES". <https://www.cnet.com/news/privacy/saluting-the-data-encrypti...>

Can the NSA break the Ed25519 stuff? Like the crypto_box from libsodium?

ed25519 (and ec25519) are generally understood not to be backdoored by the NSA, or weak in any known sense.

The lack of a backdoor can be proven by choosing parameters according to straightforward reasons that do not allow the possibility for the chooser to insert a backdoor. The curve25519 parameters have good reasons why they are chosen. By contrast, Dual_EC_DRBG contains two random-looking numbers, which the NSA pinky-swears were completely random, but actually they generated them using a private key that only the NSA knows. Since the NSA got to choose any numbers to fit there, they could do that. When something is, like, "the greatest prime number less than 2^255" you can't just insert the public key of your private key into that slot because the chance the NSA can generate a private key whose public key just happens to match the greatest prime number less than 2^255 is zero. These are called "nothing up my sleeve numbers".

This doesn't prove the algorithm isn't just plain old weak, but nobody's been able to break it, either. Or find any reason why it would be breakable. Elliptic curves being unbreakable rests on the discrete logarithm of a random-looking permutation being impossible to efficiently solve, in a similar way to how RSA being unbreakable relies on nobody being able to efficiently factorize very big numbers. The best known algorithms for solving discrete logarithm require O(sqrt(n)) time, so you get half the bits of security as the length of the numbers involved; a 256-bit curve offers 128 bits of security, which is generally considered sufficient.

(Unlike RSA, you can't just arbitrarily increase the bit length but have to choose a completely new curve for each bit length, unfortunately. ed25519 will always be 255 bits, and if a different length is needed, it'll be similar but called something else. On the other hand, that makes it very easy to standardize.)


> but nobody's been able to break it, either.

Absence of evidence is not evidence of absence. It could well be that someone has been able to break it but that they or that organization did not publish.


How could you not!? Think of the bragging rights. Or, perhaps the havoc. That persons could sit on this secret for long periods of time seem... difficult to maintain. If you know it's broken and you've discovered it; surely someone else could too. And they've also kept the secret?

I agree on the evidence/absence of conjecture. However, the impact of the secret feels impossible to keep.

Time will, of course, tell; it wouldn't be the first occasion where that has embarrassed me.


Some people are able to shut the hell up. If you're not one of them, you're not getting told. Some people can keep a secret. Some people can't. Others get shot. Warframe is a hilarious example where people can't shut the hell up about things they know they should keep quiet about.

There are a large number mathematicians gainfully employed in breaking such things without talking about it.

It is, actually. A correct statement would be “absence of proof is not proof of absence”, but “evidence” and “proof” are not synonyms.

Large amounts of data, like backups, are encrypted using a symmetric algorithm. Which makes the strength of Ed25519 somewhat unimportant in this context.

There are no stable allies. No country spies on its friends because countries don't have friends, they have allies. And everybody spies on their allies.

Spies play one of the most important roles in global security.

People who don’t know history think spying on allies is bad.


Exactly.

Like, don't store it in the cloud of an enemy country of course.

But if it's encrypted and you're keeping a live backup in a second country with a second company, ideally with a different geopolitical alignment, I don't see the problem.


The problem is money,

you are seeing the local storage decision under the lens of security, that is not the real reason for this type of decision.

While it may have been sold that way, reality is more likely the local DC companies just lobbied for it to be kept local and cut as many corners as they needed. Both the fire and architecture show they did cut deeply.

Now why would a local company voluntary cut down its share of the pie by suggesting to backup store in a foreign country. They are going to suggest keep in country or worse as was done here literally the same facility and save/make even more !

The civil service would also prefer everything local either for nationalistic /economic reasons or if corrupt then for all kick backs each step of the way, first for the contract, next for the building permits, utilities and so on.


Enemy country in the current geopolitical climate is an interesting take. Doesn't sound like a great idea to me tbh.

There are a lot of gray relations out there, but there’s almost no way you could morph the current US/SK relations to one of hostility; beyond a negligible minority of citizens in either being super vocal for some perceived slights.

One could have said the exact same thing about US-EU relations just a couple of years ago. And yet, here we are.

You think when ICE arrested over 300 South Korean citizens who were setting up a Georgia Hyundai plant and subjected them to alleged human rights abuses, it was only a perceived slight?

https://www.huffpost.com/entry/south-korea-human-rights-inve...

How Trump’s ICE Raid Triggered Nationwide Outrage in South Korea

https://www.newsweek.com/trump-ice-raid-hyundai-outrage-sout...

'The raid "will do lasting damage to America's credibility," John Delury, a senior fellow at the Asia Society think tank, told Bloomberg. "How can a government that treats Koreans this way be relied upon as an 'ironclad' ally in a crisis?"'


Yes.

A year ago, I would have easily claimed the same thing about Denmark.

I don't follow. Can you share more context?

The US is threatening to invade Greenland, what means active war with Denmark.

Great point! I forgot that Greenland is not (yet) an independent nation. It is still a part of Denmark.

The current US admin's threats to annex Greenland, an autonomous territory of Denmark.

Trump will find a way, just as he did with Canada for example (i mean, Canada of all places). Things are way more in flux than they used to be. There’s no stability anymore.

From the perspective of securing your data, what's the practical difference between a second country and an enemy country? None. Even if it's encrypted data, all encryption can be broken, and so we must assume it will be broken. Sensitive data shouldn't touch outside systems, period, no matter what encryption.

A statement like "all encryption can be broken" is about as useful as "all systems can be hacked" in which case, not putting data in the cloud isn't really a useful argument.

Any even remotely proper symmetric encryption scheme "can be broken" but only if you have a theoretical adversary with nearly infinite power and time, which is in practice absolutely utterly impossible.

I'm sure cryptographers would love to know what makes it possible for you to assume that say AES-256 or AES-512 can be broken in practice for you to include it in your risk assessment.


The risk that the key leaks through an implementation bug or a human intelligence source.

Exfiltrating terabytes of data is difficult, exfiltrating 32 bytes is much less so.


That's very far from the encryption itself being broken though. If that were the claim, I would have had no complaints.

You’re assuming we don’t get better at building faster computers and decryption techniques. If an adversary gets hold of your encrypted data now, they can just shelf it until cracking becomes eventually possible in a few decades. And as we’re talking about literal state secrets here, they may very well still be valuable by then.

Barring any theoretical breakthroughs, AES can't be broken any time soon even if you turned every atom in the universe into a computer and had them all cracking all the time. There was a paper that does the math.

You make an incorrect assumption about my assumptions. Faster computers or decryption techniques will never fundamentally "break" symmetric encryption. There's no discrete logarithm or factorization problem to speed up. Someone might find ways to make for example AES key recovery somewhat faster, but the margin of safety in those cases is still incredibly vast. In the end there's such an unfathomably vast key space to search through.

You're also assuming nobody finds a fundamental flaw in AES that allows data to be decrypted without knowing the key and much faster than brute force. It's pretty likely there isn't one, but a tiny probability multiplied by a massive impact can still land on the side of "don't do it".

I'm not. It's just that the math behind AES is very fundamental and incredibly solid compared to a lot of other (asymmetric) cryptographic schemes in use today. Calling the chances of it tiny instead of nearly nonexistent sabotages almost all risk assessments. Especially if it then overshadows other parts of that assessment (like data loss). Even if someone found "new math" and it takes very optimistically 60 years, of what value is that data then? It's not an useful risk assessment if you assess it over infinite time.

But you could also go with something like OTP and then it's actually fundamentally unbreakable. If the data truly is that important, surely double the storage cost would also be worth it.


> From the perspective of securing your data, what's the practical difference between a second country and an enemy country? None.

Huh? An enemy country will shut off your access. Friendly countries don't.

> Even if it's encrypted data, all encryption can be broken, and so we must assume it will be broken.

This is a very, very hot take.


A country can become an adversary faster than a government can migrate away from it.

Hence a backup country. I already covered that.

But while countries go from unfriendly to attacking you overnight, they don't generally go from friendly to attacking you overnight.


Overnight, Canada went from being an ally of the US to being threatened by annexation (and target #1 of an economic war).

If the US wants its state-puppet corporations to be used for integral infrastructure by foreign governments, it's going to need to provide some better legal assurances than 'trust me bro'.

(Some laws on the books, and a congress and a SCOTUS that has demonstrated a willingness to enforce those laws against a rogue executive would be a good start.)


And which organization has every file, from each of their applications using the cloud, encrypted *before* it is sent to the cloud?

They're talking about backups. you can absolutely send an updated copy every night.

True, the user I was replying to only mentioned backups.

For those there's sure no problem


This looks fascinating, and really well done! but I’m not sure I want to store it on your server. I’d be willing to pay an annual license for it, to be able to host locally. Bookmarking this!

That is great to know; thank you! Would you be willing to pay a bit extra for higher security tiers/privacy?

I’m not sure what you mean. A local app that I run myself would be the right level of security/privacy for me. Otherwise I have to trust your ability to write secure software, which is hard to prove

Yes, that's true. I think it is analogous to paying higher to Cursor for their no data retention policy, so its definitely trusting the provider further. It is of course possible that's also not acceptable, which is what I was wondering if it is..

And replace rightsholders with “maybe we will try to revenue share… maybe”

They also said at one point they'll share their profits with the world as UBI

What profits if no one has a job to pay for it

Yeah, I don’t want my mortgage recommendations to come from a prompt injection

Since when have to install Gemini? I’ve been using it via the web

A surprisingly large number of people use only installable apps. It's a crazy world out there.

Most people in the world only have a phone, no computer. Their window to software is the App Store or Play Store.

So 50/50 odds on completely destroying the company (and jobs) or generating some minor wealth for a handful of investors?

Try to think clearly for a second. Why would there be a trillion dollar PE ecosystem if this always completely destroyed the company?

The PE firms strip the assets, aka have them take on huge amounts of debt, sell assets, and then pay them dividends etc. before they collapse.

Why would banks keep giving PE firms loans for these kinds of deals if the companies inevitably collapse and default on those loans?

Not trying to defend PE here, but this narrative doesn't make sense to me.


First of all, investment banks are awash in capital thanks to 14 years of ZIRP and massive profitability. They don't like keeping cash on hand, so that means they dole it out into investments, some of which will flop.

Second, banks are the primary creditor in these deals, meaning they get paid first. They don't do these deals without ensuring that the company has enough saleable assets to ensure they get their pound of flesh. Lots of companies have billions in pension-earmarked reserves they don't have to pay out on if they declare bankruptcy. Guess who gets first dibs on that cash.

Third, they can shift the risk by selling their interest in these companies to another party. They are not stuck with it forever.


Image you have a goose that lays golden eggs. You could just keep selling the eggs every year but somebody comes up to you and offers you 2 billion dollars now and the public market values your golden egg business at 1.5 billion dollars so it seems fair.

It turns out that if you kill the goose there's a cache of 3 billion dollars worth of eggs within it.

The goose is gone and everybody made money off of it's demise.

---

PE (not always) is effective at finding under-valued companies and ensuring that they record the value on the PE's books.


Because it sometimes works. But it also sometimes destroys the companies.

But the “works” here is to just make PE richer in the short term, not to actually improve the company in the long term. That short term thinking leads to many impractical decisions that have caused bankruptcies


Because the goal is short term profit, not long term business success. It makes absolutely no difference if the company survives the process or not, what matters is that the PE firms extract their money from the process.

I think if you actually reflect on the matter you would realize that PE firms need to be able to sell the business in order to make money, and that they do in fact sell the business for a profit in the majority of cases. The extremely rare cases of yore where you could buy a business for less than the value of its assets and simply sell off the assets and leave the carcass for bankruptcy are long gone.

What pressures are there on PE firms do things with more long term "good for the USA" type of thinking?

Since when is 50/50 an odds of “completely”? Think clearly for a second

Imagine if PE took over Circuit City

The “far right” has become just a schoolyard name calling label to brand anyone the left disagrees with

More like a nice way of saying fascist

Calling today’s „far“ right fascists/nazis/etc is just a disgrace to victims of the real thing.

Why do you think so? Would it not be better to recognize fascism/nazism as early as possible? Hitler was in power for several years, doing various increasingly bad stuff, before he started the holocaust.

Nowadays this label is overused so much that it pretty much lost it's meaning. It's not fascism-nazism to be against mass migration. Nor it's fascism-nazism to not fully support whatever letter comes next to join LGBTQAZ+ or whatever it is now.

Just like it's not communism to advocate for better welfare, labor rights, affordable housing and so on.


All of these phrases are euphemisms for what is actually on the table.

And what is on the table according to you?

I’ve heard people making this up to. Yet their instagram and twitter is full of people praising assassinations, but then when they are attempted they claim “hoax”.

Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: