Hacker Newsnew | comments | show | ask | jobs | submit | driverdan's commentslogin

Which is, of course, absolutely ridiculous if true. Not everyone has the same size and shape hands as Jobs did. I hate all of Apple's mice because they're far too small for me.

reply


A lot of native clients suppress cert errors by default making them vulnerable to MITM attacks.

reply


Good luck. When I tried TextSecure about a week ago I couldn't get it to work with Voice. I never received a confirmation.

reply


I just set up TextSecure with my Google Voice number. The SMS failed, but after a couple minutes it went to a fallback verification by phone call that worked. I'm on Lollipop, not sure if that's important.

reply


I tried that, didn't work either. I'm also on Lollipop. I'll give it another try incase it's working now.

reply


If their company isn't folding they need to refund 100% of the money they raised from Kickstarter. There is a clear expectation of Kickstarter being a pre-order system no matter what the fine print says. I bet if the backers sued them they'd get a judgement in their favor.

reply


PayPal continues to show how shitty they are. Stop using them!

To people who work there, why? How can you continue to work for an organization that does things like this?

reply


> PayPal continues to show how shitty they are. Stop using them!

I really wish I could...

When I created my SaaS a few years back, I went all out with payment providers.

I registered and implemented every single form of online payment I could find. PayPal, AlertPay, PayPay, MoneyBookers, LibertyReserve, Bitcoin. You name it, I made that form of payment available. I even accepted money orders via snail mail.

In the ~2 years I gave all of the "other guys" a chance, 99.9% of my payments came via PayPal.

I received 1 money order. Perhaps 3 people paid via LibertyReserve. 0 payments from all of the other providers mentioned. And over 5,000 payments via PayPal.

Unfortunately, there is no other option if you want to sell stuff online.

And this is coming from one of Bitcoins biggest proponents.

reply


Stripe?

reply


They weren't available in my country when I started up.

They're probably somewhat of an option today, sure. But I suspect they'd still only garner 10-20% of sales at best. First mover advantage and all that...

reply


Dunno - Kim Dotcom is a convicted fraudster with a long track record of enabling illegal copying. Paypal are a private company. Why shouldn't they be able to chose not to work with unsavoury clients?

reply


I've already done that once, and I'm still doing it as hard as I can.

reply


> I'm pretty sure the idea behind publishing this free book was gathering leads and potential customer-data for future marketing.

This is exactly why the direct link should be shared. I'd bet that most HN users aren't interested in "future marketing."

reply


I've had the following ASCII art in the source of my personal site (driverdan.com) for a few years. There are a lot of tools to convert images to ASCII so it's pretty easy to do.

    <!--
    HTML5 Boilerplate! AAAAAAAAAAWWWWWW YYYYYYEEEEEEEEAAAAAAAA!
                                                               ;;;:.;G@@H@s                                     
                                                           ;i:;;;2     .:i@@#:                                  
                                                        ;@@#.   :.         sM@@:                                
                                                      .sH:,i@;    .5SGH@G    r@@3.                              
                                                     5s.  :,,,    ,r:. 5@@H   ,@#@2                             
                                                    r@,:9@   ,;,.   ,r,  r#    r&;@A                            
                                                    3:  @@  rHAS;i   .;;        @;2@B                           
                                                   i;  .39, : :  5             @HS#s@9                          
                                                  &S H@,,si;#29;  ;           :@MiG@SB                          
                                                 Br r@  ;;r.  :B@:#.          S@.@@H@@9                         
                                                Xs  , ;5@HMB@.; ;@B;           #.,@@G@H                         
                                               ,Bi,  ,@H.   ;i9h  H: .         ;rrrH@@@                         
                                               #.; ir3;s     .i#@ @  S       ,@@; Xr;X@:                        
                                              r#.i @XXriB#@hXri3r : ;A       r@hB9G@2.i                         
                                              @.,,5@  .sirr;r:   2  9           :;;;r@                          
                                              @  r&             G; s; .        .@; ,29                          
                                              @   ,,:         ;3, 2A Ss       r@@s.rAh                          
                                              @ r  ::  .i2i5.    G: 2G         ,@S A#i                          
                                              @ S.            :9i .B:       s9r.;:,i                            
                                              A .3;,    ,,::X5:  3i           ;,.s:                             
                                            ,#    ,;Si39r,:;:  i2               h,                              
                                           .3;r:         2r:;Ss:    ..,.       h:                               
                                          :s   ;@@H:       rS;,...,., ,..hr   @s                                
                                        :@A  rA   ;GM@#SAA#A         .si222i;Gr                                 
                                      ,sA# ;;:SA      ,,.  SM      r3s:     @s                                  
                          ,;;:...  :S&; s5;    ;H.,;::.  X9 rS   iHr         :93HX;,:rs,                        
                       .:@h:.   ,rX2:   ;      2@ .r@i. .  sr& .Bs              ,#; .:S&BHh:.                   
              .::;ri5&hr,.   ,S&;,     A      H@    r ;X;,., :@S                 :#.     .::SAX:,:,.            
           :9@i;;:,,.     .rA;.      .#.     @M     s        M;             :;2hr:            ,.:rrsGM&r;.      
          ;@:           rB5.         X      A@      9,      ;S             rBG                        .:3X5s    
         ;@             :ir,        2;     hS       5H      #.               ,H,                           rM.  
         B@               s3.      .@     &;         @:    :G                  B:                           :@  
          .             ;:         S:   .@;           H    :.                   A;                           r, 
                                        ,;
    http://html5boilerplate.com
    -->

reply


If a company can't take criticism then why would you want to work there? That sounds like an awful place to work.

reply


If your personality needs beer to work then it has a problem. LinkedIn is for business, not partying.

reply


Nice writeup. I did something much like this in 2002 or 2003. The main difference was that I was malicious, trying to steal money from other students.

I went to Rochester Institute of Tech. The number shown on your card and encoded on the mag stripe were your ID number.

I had plastic card printers and an encoder so making a fake was no problem. The design was simple so it didn't take me long to make one that looked exactly like the real thing.

How did I get numbers to encode? At that time they distributed grades to students in folders outside each department's office. These grade sheets had your full ID number on them. All I had to do was dig through the folders and take grade sheets from people who hadn't bothered picking theirs up.

I think I only used one or two numbers to buy some stuff from The Corner Store. I was mainly doing it to see if I could, credit card fraud was far more profitable.

One of the worst parts about it was that the student IDs were your social security number. Had I wanted to I could have easily used the data and fake IDs for identity theft.

reply

More

Applications are open for YC Summer 2015

Guidelines | FAQ | Support | Lists | Bookmarklet | DMCA | Y Combinator | Apply | Contact

Search: