Hacker News new | past | comments | ask | show | jobs | submit | DownrightNifty's comments login

This is super cool! Now if only my ISP would give me a static IP address so I could expose port 51820 on one of these things and life would be perfect.

Oh wow, that's interesting, thanks for sharing. I was experimenting with the Pixel Recorder app, which calls into the AICore system service, which calls into the Protected Download API to download its models. Based on the URLs ("pixelai-models" vs "aicore-models") it looks like Pixel Screenshots is doing its own thing and not using AICore.

It does the same thing re: hooking, but downloads most (if not all?) of the models, only at the end does it fail with "precondition check failed" from the server which aicore just repeats.

I haven't gotten further in it to figure out what it's bailing out on, aside from the request going to google using the trusted dl service and failing. It could be the same model call and they are being oddly protective over gemini nano.


I took a brief look into it, and they use the Google Private Compute Services Protected Download API to download the Gemini Nano model, which uses remote attestation to cryptographically ensure that your device is running the stock ROM: https://github.com/google/private-compute-services/tree/mast...

I'm not sure why they do that, tbh, since Gemini Nano is now part of Chrome, and you can download it without remote attestation. If you were dedicated enough, you could probably force the AICore system app on a rooted device into using the Gemini Nano model you downloaded from Chrome. I briefly attempted this but it proved too annoying so I gave up.

Edit: It appears Pixel Screenshots works differently than Pixel Recorder, which is what I was looking into.

https://news.ycombinator.com/item?id=41373011


JS on Google Sites, Apps Script, etc. runs on *.googleusercontent.com, otherwise cookie-stealing XSS happens.


To anyone in the US who said they make their own apps for their own iPhone: do you really pay Apple $99/year for that "privilege", or do you reinstall the app every 7 days (or use workarounds like AltStore non-PAL or jailbreaking) to get around this?


I pay $99/year. With the amount of money I make, it’s a really trivial sum for the convenience. Plus I could use it to add Apple OAuth to my web apps if I wanted to.


The hacking community has already taken DIY Wii U repair to a level beyond even what Nintendo was likely providing.

For example, someone wrote a recovery menu that leverages an exploit in the USB stack and executes before the OS loads [1]. Many Wii Us also have SK Hynix NAND chips with high failure rates, which under normal circumstances would eventually result in a bricked console, but hackers found out how to replace it with an SD card and rebuild the internal storage from scratch onto it [2].

Hackers also revived the console's online service [3]. This was up and running even before the official service shut down.

All very impressive achievements from the hacking community around a somewhat niche and commercially failed console.

[1] https://github.com/GaryOderNichts/recovery_menu

[2] https://gbatemp.net/threads/how-to-upgrading-rebuilding-wii-...

[3] https://pretendo.network/


You should share this with us! If you have a blog, that'd be a really interesting post.


Instructions didn't work for me. Tried on Windows 10 and macOS 14.3 (x86) with Chrome Canary. The "On Device Model" component doesn't show up.


yea, it's a bit tricky. this came in from google team today:

> To get back on track, make sure you're using Chrome version 128.0.6545.0 or later. If you want the most up-to-date version, try using Chrome Canary or Chrome dev channel.

this document should have the latest changes from Google: https://docs.google.com/document/d/1VG8HIyz361zGduWgNG7R_R8X...


The issue you linked is more or less resolved at this point. If you find Termux processes being killed, just run this command over adb shell and you're good:

    settings put global settings_enable_monitor_phantom_procs false
Google added this setting in response to a bug report submitted by a Termux maintainer. It's also persistent, so you only have to run the command once.

The more pressing issue at this time is: https://github.com/termux/termux-app/issues/2155


Each app also has its own private storage space as well at /data/data/<package name>/ which the end user cannot access even through adb. It's owned by the Unix user representing that app and has 700 perms so the `shell` user can't access it. While you can't access the directory directly, you can clear it in Settings -> Apps -> <app> -> Storage.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: