Hacker News new | past | comments | ask | show | jobs | submit | dobbsbob's comments login

http://www.psmag.com/science/vancouvers-free-heroin-injectio...

They gave 322 homeless street addicts free opiates, which allowed them to sort their lives out since their day to day activities weren't entirely consumed with scoring heroin. Property theft and street violence also plummeted, saving ambulance costs for overdoses, and the police and courts millions which was all in the full SALOME study as most of the addicts used property crime to fund their addictions.

I imagine BI would do the same. Instead of being on an automatic pilot mode of desperately finding money for drugs and booze everyday there would be time to reflect and maybe seek out detox.



Bank xfers they will transfer to a cashing service, somebody willing to use fake identity to open business accounts to receive stolen funds and show up in person to a bank to withdraw it, then pay back a percentage to whoever sent the funds via bitcoins or other method. A good fraudster will ddos the bank after the transfer(s) to prevent the mark from logging into online banking and discovering the fraud.

Credit cards they make their own fake stores by the hundreds and pay themselves small amounts, or they do instore fraud which is extremely risky. In the UK they simply card Tesco and then sell the groceries half price. Can also fraud bitcoins now as services exist to buy small amounts. None of this is easy, profits aren't huge it's all very small time unless you're the guy getting and selling the data to the legions of petty hustlers worldwide.


Evolution is primarily resellers too, the majority of org fraud is on Russian forums like infraud.cc where they sell by bank identification number and entire databases of stolen financial data.


How did WhatsApp receive an A rating when it can access your mic and camera to record without confirmation?


Considering the functionality that wasn't reviewed, I don't think it should be advertised as "A".

It might be "A" for the expected permissions, but if there's extra permissions which haven't been investigated, these should be marked down until explained. This would encourage app owners to work with whoever maintains the database to get accurate ratings. If Whatsapp is an A today, there's no incentive for the developers to justify / assist with anything unexplained permissions remaining.

In it's current state, if it's awarding A scores while significant permissions are unexplained, it doesn't help the end user.


Because users expect an application used for sending audio snippets use the microphone.


they actually just rate whether the App permissions match the users expectations.


At least your media even talks about this, I'm in a 5 Eyes Alliance country and none of them have written anything except excuses why we should be under 24/7 surveillance. Our senate can't even block bills.


If you have a phone with an Intel XGOLD baseband (Samsung S3 Intl version) you can read log output https://github.com/darshakframework/darshak/blob/master/READ...


German police and intel agencies sent 440,000 sms type0/stealth attacks to trace phones last year, FBI sent an OTA to a suspects internet stick to broadcast his location, and something shady is going on at airports according to Cryptophone GSMK who's radio 'firewall' goes off whenever you get near an airport. Besides that Samsung backdoor found by Replicant Mod that has access to /data and /sdcard haven't heard of other directed attacks yet.

Of course google can install whatever they want on your device if given a NSL including a modified WhatsApp that sends in plaintext straight to the police everything you type but haven't heard of that yet either.

Since Facebook makes money harvesting data wonder if WhatsApp grabs advertising keywords first then sends via textsecure layer.


If you have a Samsung s3 International version you can use this to identify when your GSM connection has no encryption https://github.com/darshakframework/darshak

Works on Intel xgold basebands by giving access to the event log


Indeed, it works like freenet IRC where you have to make an account first then log in to it with Tor. This is solved by making a throwaway VPS or virtual desktop you ssh into with Tor, make your account, shred the VPS and then change the password when you log in directly to Fb with Tor.

You can also edit Torrc to temporarily only use your own Tor exit nodes if worried about malicious exits while setting up accounts.


Someone's WIFI connection with a modified MAC is also a good way. Just make sure it's not the neighbours WIFI.


Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: