Hacker Newsnew | past | comments | ask | show | jobs | submit | 2013-10-30login
Stories from October 30, 2013
Go back a day, month, or year. Go forward a day, month, or year.
1.Announcing The Dark Mail Alliance – Founded by Silent Circle and Lavabit (silentcircle.wordpress.com)
565 points by cylo on Oct 30, 2013 | 209 comments
2.Does life end after 35? (kzhu.net)
530 points by hakkasan on Oct 30, 2013 | 220 comments

It's hard not to come to the conclusion that these activities were essentially criminal. I don't see how the administration can fail to disavow them, investigate them fully, and hold their instigators accountable. It feels like Special Prosecutor time.

That aside, let me re-make a point I keep making:

Google had no knowledge of NSA's physical compromise of their data centers. But still, they pushed harder than anyone on the whole Internet for the adoption of modern TLS with forward-secrecy; they are the world's foremost deployers of ephemeral-keyed elliptic curve cryptography and of certificate pinning, both of which ensure not only the security of the traffic running over the network cables into their data centers, but also minimize the impact of a compromised long-term encryption key or the compromise of the CA system by a state actor.

Not only that, but Google launched a high-profile effort to encrypt the communications inside and between their data centers.

I hope a couple years hindsight will put the importance of Adam Langley's work (and that of the rest of his team; he's just the best-known member of that team) at Google into sharper relief.

4.Cisco to release BSD-licensed H.264 stack (brendaneich.com)
327 points by padenot on Oct 30, 2013 | 175 comments
5.Users complain their Dell 6430u laptops smell like cat piss (dell.com)
307 points by kmfrk on Oct 30, 2013 | 159 comments
6.Java Virtual Machine in pure Node.js (github.com/yaroslavgaponov)
286 points by binarymax on Oct 30, 2013 | 138 comments
7.Let’s Build a Compiler (1995) (iecc.com)
247 points by _virtu on Oct 30, 2013 | 56 comments
8.Why Meteor will kill Ruby on Rails (differential.io)
247 points by joshowens on Oct 30, 2013 | 323 comments
9.The Battle for Power on the Internet (schneier.com)
238 points by hatchan on Oct 30, 2013 | 30 comments
10.Mozilla will add H.264 to Firefox as Cisco makes push for WebRTC’s future (gigaom.com)
218 points by gz5 on Oct 30, 2013 | 62 comments
11.George Orwell: Politics and the English Language (1946) (alexgolec.github.io)
206 points by yk on Oct 30, 2013 | 62 comments
12.The Impossible Music of Black MIDI (rhizome.org)
183 points by wodow on Oct 30, 2013 | 175 comments
13.Mac Pros, Ara, and Modularity (jjcm.org)
179 points by jjcm on Oct 30, 2013 | 112 comments
14.Comments on Cisco, Mozilla, and H.264 (xiphmont.livejournal.com)
182 points by 0x006A on Oct 30, 2013 | 19 comments
15.California woman ticketed for wearing Google Glass while driving (plus.google.com)
180 points by tga on Oct 30, 2013 | 295 comments
16.Hacker News was down
172 points by daraosn on Oct 30, 2013 | 94 comments
17.Insect-inspired flying robot handles collisions, goes where other robots can’t (robohub.org)
165 points by robotgal on Oct 30, 2013 | 41 comments
18.Microsoft Research uses Kinect to translate between spoken and sign languages (thenextweb.com)
156 points by hackhackhack on Oct 30, 2013 | 25 comments
19.Stalin's Rope Roads (theatlantic.com)
152 points by v4us on Oct 30, 2013 | 32 comments
20.Startup Idea: Solve Personal Analytics (kirigin.com)
155 points by socmoth on Oct 30, 2013 | 97 comments
21.Principal Component Analysis for Dummies (georgemdallas.wordpress.com)
147 points by jackkinsella on Oct 30, 2013 | 31 comments
22.Show HN: Popcorn Messaging – Anonymously chat with people within 1 mile (appsto.re)
126 points by drum on Oct 30, 2013 | 130 comments
23.iPad Air Review (anandtech.com)
122 points by wittyphrasehere on Oct 30, 2013 | 100 comments

> It's hard not to come to the conclusion that these activities were essentially criminal. I don't see how the administration can fail to disavow them, investigate them fully, and hold their instigators accountable. It feels like Special Prosecutor time.

The government takes the position that their agents are almost completely unconstrained by law when it comes to actions taken abroad aimed at non-US persons.

Even were a court somewhere to find that this interpretation is incorrect, there are numerous "good faith reliance" doctrines that prevent any prosecution or even civil consequences.

The government outright tortured people for years, and nothing has come of it. No prosecutions. No damages for victims. No cases dismissed for outrageous government conduct. Not even very many harsh words from judges. The only people for whom there were any consequences were the low level regular army people who got in on the torture train without first getting official blessing.

It'll be the same thing here. If some low level employee went out on his own to hack into Google servers, something might come of it. But by all appearances these programs were deliberate, planned, and vetted. In those circumstances the bad actors have long since learned to cover their own asses. There will be no consequences for them.

25.HealthCare.gov deferred final security check, could leak personal data (arstechnica.com)
118 points by Cbasedlifeform on Oct 30, 2013 | 101 comments
26.Pakistani family of drone strike victim gives harrowing testimony to Congress (theguardian.com)
112 points by labinder on Oct 30, 2013 | 84 comments

Why do people put so much effort in comparing tool A to tool B when either of those tools only cover 5% of all the work that goes into any serious application, and the time saved by any advantage tool A has over tool B is pretty much negligible?

I mean cool, so Meteor is maybe better for prototyping. Because that's all we're talking about here, prototypes and ultra-simple websites.

It's always the same story, a shiny new tools that make the first weeks a little smoother, and after that it's business as usually for entire life cycle of the application.

Except of course you now have to deal with a tool that still has years to go before it's really mature and stable, and any advantage you gained in the first few weeks is completely lost.

This has nothing to do with software development, this is just about fashion.


I appreciate the cheekiness of calling it the "Dark Mail Alliance", but from a purely PR perspective, it would make sense to reconsider your name if you are taking the position that encrypted end-to-end email is not solely an interest of those pursuing shady or deviant activities.
29.Andrew Kim: Minimal to the max (microsoft.com)
103 points by sheikhimran01 on Oct 30, 2013 | 58 comments
30.CircleCI security incident (circleci.com)
108 points by markhelo on Oct 30, 2013 | 45 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: