Hacker Newsnew | past | comments | ask | show | jobs | submit | gellerb's commentslogin

One can use sourceclear.com for Composer.


One can use sourceclear.com for Python support.


Login and inspect the home page afterwards. http://imgur.com/bwUHgcT


I'm logged in. Not seeing it. Maybe it's not deployed for all accounts yet.


It's only included for browsers that support it. That's Chrome>45 and Firefox>43.


Serving different content based on the user agent? Bad site. No donut.


SRI allows one to specify multiple hashes. In other words, to prevent this particular mismatch, one could include the hash of the new resource as well as the previous valid hash.


Use Chrome Canary


It unfortunately includes carrageenan.


I don't pretend to be a chemist, doctor, or nutritionist so I assume they have a good reason for adding it. They also seem to know about the bad publicity carrageenan has by calling out that it isn't poligeenan. I do wonder what the benefit of adding it is.

It seems like they still haven't gotten over the negative press and that this might not help them get more traction if it gets sensationalized.


Would you mind explaining why that's unfortunate?


poligeenan, also known as degraded carrageenan, was shown in some studies to be carcinogenic. Some high profile foods had carrageenan and there was some bad publicity due to it.

I am not a doctor, but I do believe that carrageenan has been classified as perfectly safe by the FDA.

EDIT: http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfCFR/CFRS...


So that is probably why they specifically call out that the type of carrageenan in 1.5 is not the same type people have been complaining about.


> I am not a doctor, but I do believe that carrageenan has been classified as perfectly safe by the FDA.

I am not a doctor (nor, more to the point, a food & drug regulation expert), but I do not believe that FDA has a classification of "perfectly safe" that it applies to ingredients.


True. They do have a classification of Generally Recognized As Safe (GRAS). Not the same thing as "perfectly safe", but I'm guessing that's what they probably meant.


Could you elaborate on why that's a problem?


The HTTP 2.0 spec[1] mentions "Implementations of HTTP/2 MUST support TLS 1.2 and it appears Chrome will implement HTTP/2 via TLS only (http://volgarev.me/blog/75094931827).


Elastic Loading Balancing for AWS customers & Heroku allow for perfect forward secrecy and Akamai customers can expect ECDHE in Q3 of this year.


Is there anything you need to do to enable it on Heroku, other than setup SSL/TLS?


ssl:endpoint add-on


ds9, yes, "site certs the browser doesn't trust a CA for" is more accurate. You can find the exact details of HSTS and self-signed certs in the draft in section 11.3[1]. I've updated the post to hopefully be more clear.

[1] http://tools.ietf.org/html/draft-ietf-websec-strict-transpor...


In Safari one can delete ~/Library/Cookies/HSTS.plist


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: