Hacker Newsnew | past | comments | ask | show | jobs | submit | genbugenbu's commentslogin

Take a look at ZSAs oryx configurator for Voyager (52 keys) - you'll see some general configs and development ones etc.

In general, for my moonlander I would have the first layer with all the normal alpha numerics and a few symbols like <>?

But the second layer would contain most symbols, arranged/grouped in a manner which was natural for programming - e.g. grouping keys together like (), [], {},


I've got a moonlander as well (typing on it this very message), and while typing 'clicked' for me in general, I still miss the additional keys of a normal keyboard. I customized mine as well to match my needs, but I don't have a good spot left for '[' and ']'. Have them mapped next to 5 (right) and 6 (left) but that's just as awkward to hit as the normal position they have on the keyboard. Same with "F" keys. Having to press a modifier instead of having just another row on top is a bit meh.

Hitting ALT+F1 in intellij is gymnastics for my hands. alt is super low, modifier for F keys is on the left edge of the right keyboard, and then I need to hit "1" as well.

And there's lots of other little cuts like the ones above with the moonlander. I still enjoy coming back to my MX Master mechanical from logitech for that reason every now and then.


Wicked - had a skim through and there's some great content in here!

As a security engineer/reverse engineer I'm absolutely subscribing to this and sharing among colleagues.


Thank you! :)


That's a pretty naive take imo ; divulging such information leads to change in behaviour of nefarious actors.

I totally get the viewpoint, but there are other perspectives to consider


I don't disagree that it can change behavior, but surely many or most of these nefarious actors must already assume that uploading illegal materials to Apple or Google, whether they claim E2EE or not, is a risk? See for example Apple's ditched efforts to scan and flag CSAM material on-device.

My assumption has been that the real bad guys use their own infrastructure attached to anonymous access methods like Tor, or using anonymous file sharing accounts that can't be tied to an iPhone's serial number. Maybe that's not true?

Offering transparency in these areas may help to understand whether the government is really doing this to arrest criminals, or just to have unfettered access to everyone's data.


Literally any bad actor with half a brain cell assumes every large american tech company has been served a NSL. Disallowing them from disclosing they received one seems pretty pointless and only done to prevent bad optics and public opinion


It's not naive. I can definitely see value in a two-tier warrant system. The first (and normal one), just like a physical warrant: you know you're being searched. The second, and it is much harder to get: a covert warrant, more like a wiretap.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: