Hacker Newsnew | past | comments | ask | show | jobs | submit | coderatlarge's commentslogin

one use-case is if you need to be able to stream the data.

One use-case of what? Whether a format is "streamable" is entirely orthogonal to whether it is text or binary. Streamability depends on other things such as if it has a header or checksum at the end, et cetera.

i can live without discord but I’m required by law to interact with irs and therefore idme and their mess…


at least with physical drugs you know how many grams you bought, with cc it’s all hidden behind the curtain.


why not pets?


They work best for things that a human has to move, and since a good chunk of humans (at least in US/CA) have iPhones, the movement of the physical thing will be tracked by an iPhone fairly reliably. Any time the critter is outside the range of an i-device picking it up the location will be stale. There isn't really a way around that, since GPS/5G radios are a lot more power hungry than the occasional bluetooth pings an airtag broadcasts.


1. they way the network works, it works better for inanimate objects that don't move around

2. they contain small parts that pets might inadvertently eat, and some of the collars that exist for them have been known to snag on things and entrap pets.


I think mostly it's a chew risk for dogs and won't help if the dog is far from the AirTag network. I still have one on my dog anyway (he's not a chewer) and my daughter puts one on her cat occasionally. (Both pets are microchipped too, of course.)


I bought one for my cat, never did help with finding him, just the general area.

They're not great for tracking things that move on their own, or things that avoid people.


We use them on our cats and have found the trouble-maker cat 3 times out of 3 when needed (in an urban apartment area; most recently the cat was scared by a noise which may have kept her hidden out all night in the cold, unless we had found her/shooed her back to the house)


we have them for our cats, they're great. Sometimes they're hiding in bushes and we don't realize they're 10 ft away. Other times they're down by the neighbor's house. It's not perfect but it tells us which direction more or less. And definitely more peace of mind if they ever got lost. They

They make breakaway collars so if they get caught on something it won't trap them.


Can't compete with a Tractive, though.


user notification is another major litmus test.


i propose the following benchmark task that i think can serve as a baseline of whether these local automation systems can really save time:

starting with a bare ubuntu desktop system with plenty of RAM and CPU, setup three ubuntu VMs for secure development and networking skills learning (wireshark, protocol analysis, etc etc):

one ubuntu “virtual” desktop to simulate a working desktop that an end-user or developer would use. its networking should initially be completely isolated.

one ubuntu server to simulate a bastion machine. route all “virtual desktop” traffic through this “bastion”. it will serve as a tap.

one ubuntu server to serve as edge node. this one can share internet access with the host. route all bastion traffic through the edge node.

use this three vm setup to perform ordinary tasks in the “virtual desktop “ and observe the resulting traffic in the “bastion”. verify that no other traffic is generated on or from the host outside of the expected path virtual desktop -> bastion -> edge.

i claim this is a minimal “network clean” development setup for anyone wanting to do security-conscious development.

extra credit: setup another isolated vm sever to act as the package manager ; ie mirror anything to be installed on the “virtual desktop” onto this package server and configure this server as the install point for apt on the “virtual desktop”.

i doubt an AI can set this up right now. (i’ve tried)


from the piece:

“ the median age of the latest Y Combinator cohort is only 24, down from 30 just three years ago “

does yc publish stats to validate?


Quoted as 24 vs 30 in 2022 from one of the partners here: https://www.businessinsider.com/yc-founders-younger-under-mo...


Didn’t we just have a front page article about the average founder age increasing well beyond 30 this year? Is it a non-normal distribution or what?


Tunguz shows early 40s as the median

https://tomtunguz.com/founder-age-median-trend/

YC trends younger given what they’re looking for


Lots of explanations with power here:

- There's a hard edge to the distribution that isn't far from 24 (I'd expect relatively few sub-18-year-old YC founders, but more 31+-year-olds)

- Older founders (with more experience, larger networks and less life flexibility) aren't a good fit for incubators.


tying this data to a login instead of a pure cookie model like hn seems dangerous.


This feature doesn't require a login; you just put in the book/author you love, and it returns matches.

If you want to vote, you'll need to log in. We needed substantial protection around the votes, and this was the easiest way to do so.

Would you want a magic link that sends you a url to vote to your email or something like that?


well hn allows voting without email


Ah, I see, you want to be able to create an account without an email?

Can you confirm that is what you prefer?

We have to screen very carefully for fraud from overzealous authors, unfortunately. Email is a nice tool in that.


no ties to my other accounts would be ideal from my perspective

i understand that it’s easier to get a stronger “trust” signal by being more invasive

but hopefully the product will be so valuable that users will value their accounts as assets (like on hn) that they won’t want to compromise with bad behavior


The problem is authors will sign up for fake accounts to vote for their own books, so having an email with each account is a big trust factor that helps us a bit.

I'll think on it :)


maybe an account has to build up cred or investment to be more trusted like on hn


i love that meme which shows three identical paper clips in a row but one is upside down relative to the others which is a minute difference. the caption reads “chaos German style”


this carrier approval to move esim problem is more generalized on modern “smartphones”. unless you opt in to cloud providers holding your data there is no easy way afaik to migrate your authenticator apps to another phone. and a host of other authentication/authorization data is tied to the device in an opaque way. don’t get me started on apple’s unpredictable model of sending 2fa to some other “trusted” device which means tou never know what tou need to bring with you.


> unless you opt in to cloud providers holding your data there is no easy way afaik to migrate your authenticator apps to another phone.

You could self-host Bitwarden/Vaultwarden, or something like that.

> don’t get me started on apple’s unpredictable model of sending 2fa to some other “trusted” device which means tou never know what tou need to bring with you.

I think they send 2FA to all supported devices on one's Apple account?


i just ran into a situation activating a new device in which apple were trying to send to a device i had forgotten to “properly” remove from that icloud account.

and also another situation in which the 2fa code would flash on the remote device and disappear in a fraction of a second. i eventually captured it with screen recording but every time i did it the code was not accepted.

my conclusion: apple had silently ruled that i would not be allowed to activate using that particular icloud account. no idea why. i tried a different one and things went through ok.

arbitrary power in practice.


Google authenticator lets you move accounts easily using a QR code + phone camera.


But no way to backup to cold storage last time I checked. Took a picture of the QR code with another phone and printed it.


> Took a picture of the QR code with another phone and printed it.

Why? Decode the QR code and store the text however you prefer to store text.


i wish there were a straightforward way to export a file of some sort that i can backup without creating yet another special case to manage.


that’s good to know thanks but creates more special cases to manage if i just want to backup my stuff so i can manually recover when i need to (on lost device say).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: