Hacker Newsnew | comments | show | ask | jobs | submit | deno's commentslogin

You can make it look like this: https://i.imgur.com/jMucQvl.png

I‘m not entirely satisfied with startpage either though. What we really need is a local search proxy that goes via Google/Bing however you like, e.g. 1) using clearnet without cookies and cleaning up links (Google, Startpage, Bing) 2) via Tor automatically falling back if you get captcha (with option to do the captcha if you don’t like results) 3) Like 1) except via some VPN/Proxy

The results from each source (or multiple) could be normalized and the local app can offer any kind of interface you like.

I’ll write it at some point, but if anyone wants to steal that idea — please do.

-----

deno 175 days ago | link | parent | on: Blackphone

1) Buy prepaid card with data plan.

2) Access Internet (and VOIP) only via VPN or better yet TOR.

3) Only give out your VOIP number. No one must know your direct number, it’s only for emergencies.

This severs all the important connections to make any use of that data, assuming you don’t have any leaks.

-----

thrwwyusr543 175 days ago | link

To expand on this, does anyone know of a reliable service provider (accepting bitcoins is a bonus) for SIP Trunking[0]? Or any VoIP workflow that can perform calls to PSTN[1] (the regular landline/mobile telephone network). Or even any VoIP provider that offers a basic answering service, where the voice mail box can be checked over the internet a la google voice/skype voicemail?

[0] https://en.wikipedia.org/wiki/SIP_Trunking

[1] https://en.wikipedia.org/wiki/Pstn

Edit: A quick search gave me this[2] by Plivo. Does any one know of any other options?

[2] http://plivo.com/blog/sip-trunking-to-replace-my-landline-ph...

-----

deno 175 days ago | link

Don’t have any recommendations here, just thought I’d mention that for the stated purpose—​preventing the tracking of the cellphone location (i.e. where you go)—​running your own VoIP to PSTN/​ISDN/​GSM bridge at home would be sufficient.

Completely anonymous hosted PSTN bridge would be very open to abuse, so I imagine not many of them are/will remain accessible via Tor. But for completely secure and/or anonymous communication you don’t need or want PSTN, all you need is (encrypted) VoIP–VoIP that you control, and can optionally expose via Tor (as a hidden service).

Bonus points: GSM bridge at home raises less flags. You could even “take it for a walk” from time to time to make it appear even less suspicious.

-----

dobbsbob 175 days ago | link

build your own ostel or asterisk server, I think asterisk does voicemail.

-----


> "transaction" my arse

That’s not something that can be made reliable with either rpm or apt. The only options for reliable upgrades are 1) nix model or 2) filesystem transactions/snapshots. Especially, yum has official plugin for making LVM/Btrfs/ZFS(?) snapshot before committing each transaction. I imagine there’s something similar for Debian/Ubuntu.

-----


I think the standard for friendly hardware should be open firmware support (Coreboot), rather than what’s preinstalled on HDD.

-----

pedrocr 183 days ago | link

Knowing that you're not also paying for a windows license and inflating the Windows market share numbers is also nice.

-----


It can be even more seamless and convenient than that with Systemd.

https://fedoraproject.org/wiki/Features/SystemdLightweightCo...

I’m not sure what Systemd version they’ll end up shipping though.

The best part about Systemd is that the default framework for launching and monitoring services is essentially LXC without the padding (extra PID0 etc). This means every service can benefit and there’s no need for the unnecessary abstraction (the container) and all the (mental not necessary performance) overhead that goes with it.

Needless to say, I’m quite excited about what is happening on Linux nowadays :)

-----

andor 210 days ago | link

systemd-nspawn isn't recommended for production use. I can't tell you why that is, but if you search for it, you'll find a few places where Lennart Poettering recommends libvirt-lxc for deployment (which is completely unrelated to the other "LXC" project).

This means every service can benefit and there’s no need for the unnecessary abstraction

Of course you could run software on bare metal ;-) But containers are a nice way to ship whole projects including the dependencies. Especially if you deploy to lots of machines.

-----

rwmj 210 days ago | link

Looks like systemd 207.

-----


Firefox already supports native context menus[1][2][3] so it shouldn’t be that difficult to extend this to top level menu bar.

Of course they should fix them first: 1) don’t show the browser options otherwise it’s completely useless 2) (optionally) if you want the browser options/extensions etc. use something like the clipboard/dnd api to set the application specific mime type on right click and connect that to web intents.

[1] http://davidwalsh.name/html5-context-menu

[2] http://www.whatwg.org/specs/web-apps/current-work/multipage/...

[3] http://caniuse.com/#search=menu

-----


With SPF and DKIM you cannot spoof the envelope address and the “From:” header email address. If SPF would actually be required instead of optional (or even ignored), we could be free of 99% of SPAM and phising emails maybe as soon as 2009!

Anyway the point of the post is that if you just add the badge thing you will end up with two different badges, which the user would obviously find suspicious. Instead, the way LinkedIn rewrites messages is exploited to get only a single badge but manipulate its content (and/or the message content). Since the message looks authentic (it’s been filtered by LinkedIn) it gives the user a false sense of security, which makes a naïve phising attempt into a very effective one. After all the point of the message rewriting was to give the impression that LinkedIn Intro is an extension to the actual email client.

-----

deno 261 days ago | link | parent | on: Google Cloud Datastore

Still not standalone: “You should be aware that Cloud Datastore has a serving component that runs on Google App Engine, so there will be instance hour costs.”

https://cloud.google.com/pricing/datastore

-----

proppy 260 days ago | link

Even if the serving component runs on Google App Engine, you don't have to deploy or manage it yourself. Once you activate Cloud Datastore you can access it like an other Google APIs: https://developers.google.com/datastore/docs/apis/v1beta2/

-----

deno 255 days ago | link

But then what I don’t get is why is it advertised as a separate product. If it’s just a managed App Engine application then it shouldn’t be called “Cloud Datastore” and have a top link on your Cloud products page. However if it’s a standalone product then Google should eat the instance costs. It would be crazy if Maps API started charging for instances suddenly…

If you want to charge for instances then the way to do it is the DynamoDB’s way — charge for throughput. The actual number of instances should be an implementation detail. At least that way it’s deterministic and you can feature it prominently on your pricing page with an appropriate calculator.

Until then the advertising is completely misleading if not dishonest, since I’m pretty sure the instance costs would be quite significant for any use case that tries to use “Cloud Datastore” as a standalone db solution for GCE ecosystem, rather than to just run some Map Reduce for an App Engine app.

-----

deno 344 days ago | link | parent | on: They're using Windows RT

I’ve published an entire dictionary with Libre Office + Python alone. Didn’t find anything missing. Please provide specific examples.

http://medipage.pl/pl/p/Medyczny-slownik-kolokacji.-Polsko-A...

https://s3-eu-west-1.amazonaws.com/deno/S%C5%82ownik+Kolokac...

-----


It’s hard to tell how big of an advantage this is, if any, without some actual data.

-----

More

Guidelines | FAQ | Lists | Bookmarklet | DMCA | News News | Bugs and Feature Requests | Y Combinator | Apply | Library | Contact

Search: