Hacker Newsnew | past | comments | ask | show | jobs | submit | johnfonesca's commentslogin

>But all projects need to have the same formatting and style.That too can be easily done with one nuget using msbuild.

That's like using a car for "traveling" 3 meters. Why not just use dotnet format + .editorconfig , they were created just for this purpose.


It doesn’t scale as well across a large org.

We have hundreds of repos, thousands of projects. It is hard to ensure consistency at scale with a local .editorconfig in every repo.

Also, with a nuget I can do a lot more than what editorconfig allows. Our package includes custom analyzers, custom spell check dictionaries, and multiple analysis packages (i.e not just the Microsoft provided analyzers). We support different levels of analysis for different projects based on project type (with automatic type detection). Not to mention that coding practices evolve with time, tastes, and new language features. And those changes also need to be consistently applied.

With a package, all we need to do to apply all of the above consistently across the whole company is to bump a single version.


It's a combination of practices, some at develop-time and some at CI-time. The general goal is to have code as clean and standardized as possible as early as possible, especially on larger teams where human enforcement doesn't scale as much.


> Why not just use dotnet format + .editorconfig

And let the IDE take care of that. Pre-commit Hook and it's all done.


They're talking about how to sync the .editorconfig if projects are not in a mono-repo.


> HDCP is already cracked

It's being 15 years already


>Agreed, they should not be using Windows in the first place

Crowdstrike borked RHEL 1 month ago https://access.redhat.com/solutions/7068083 Literally the same situation, unbootable machines.

The reality is that shitty software broke everything. Why do we have to drag the OS into this?


Dunno, I guess I naively thought the quality of Linux drivers is higher but on the other hand, if the same confused randos are writing them then you're right that it would not make a difference.


I didn't know that. So that makes this two strikes?


Twitter employees were asked to print some of their best code and bring it for review by Musk.


They didnt have to bring their finest, just print out the last 30-60 days of code and fly to SF to present it in person for review by Musk himself.


Is that true? What an absolute clown!


>Like Cthulhu

Cthulhu is definitely less evil than Meta.


How effective is TPM 2.0 compared to the original ? Are there any reports that demonstrate its effectiveness ?

If a specific version of TPM becomes required to use future versions of Windows, we will have swappable TPM chips ? Eg update your TPM chip just like you update your GPU :)


Most Supermicro mainboards are either an 8-pin or 20-pin header and you can get TPM 1.x and TPM 2.0 options for them.


The other half of the answer, for boards without a hardware swappable TPM the embedded fTPM in newer stuff may be upgradeable to the newer version, depending what exactly changed requirements wise.


Some desktops have a TPM header so yeah, you can replace the TPM chip on those.


And the JS file "weights" 4 Kb.


It's fast though because it's minified and obfuscated to fit one line!!

/s haven't even looked yet, but I like hyperbole as much as the next


eIDAS is a cartel created to protect the business interests of EU biggest certification authorities.


It is a digital certificate standard. Browser certificates is only a tiny part of it, that wasn't why it was made. Having a standard for digital certificates is a good thing, it makes it easy to switch document signer provider etc since they all are forced to implement the same interface.


I’ve read enough mozilla.dev.security.policy threads along the lines of “but we’re a qualified eIDAS CA (erm, TSP)! — but your audits, key management, and issuance controls are all crap! — but eIDAS!” that I feel that it might, in fact, be partly an attempt by CAs to ensure that they can’t be kicked out of browsers at the browsers’ discretion, or even have to obey CA/BF decisions. It certainly appeared that the fuss around QWACs got much louder as the EV UI downgrade progressed.

Maybe it wasn’t the original intention, but right now, even ignoring the surveillance angle, I feel that it would be a major downgrade to the post-Symantec state of the Web PKI. In particular, the process for getting a CA disqualified or inconvenienced in any other way seems to be so onerous as to be basically intractable, especially if you, the relying party, are not in the EU. As far as I can tell (but here I can be wrong), as a relying party you don’t even have standing to do anything about it—it’s considered to be solely the business of your country’s government, and if the government body doesn’t care (see: Facebook and the Irish DPA), tough, guess you’re a single-issue voter now.


>it makes it easy to switch document signer provider etc since they all are forced to implement the same interface.

eIDAS was introduced in 2016. Now 7 years later there still isn't a API specification for interoperability (there are drawings though https://blog.eid.as/new-apis-for-the-eidas-ecosystem/ )

In the meantime, any digital signature done in EU must be done with a certificate issued only by the "select" CA to be considered "valid".


>In the meantime, any digital signature done in EU must be done with a certificate issued only by the "select" CA to be considered "valid".

article 25 of EIDAS 1. An electronic signature shall not be denied legal effect and admissibility as evidence in legal proceedings solely on the grounds that it is in an electronic form or that it does not meet the requirements for qualified electronic signatures.


> Now 7 years later there still isn't a API specification for interoperability

The standard existed 2016, I did a short stint for a company that was implemented eIDAS back then.

They even have a test suite you can use to check how well you comply with the standard: https://ec.europa.eu/digital-building-blocks/wikis/display/D...

It is very archaic to work with though, but at least they try to have a standard.


The ETSI checker you have linked doesn't have anything to do with CA API interoperability and "switch document signer provider". That's just a basic tool which validates if a signature is PADES/ETSI compliant or not.

The real value in eIDAS would be "unlocked" if they would release a proper API specification with which a digital signatures application would integrate with any EIDAS CA to emit/sign certificates. And then enforce that any eIDAS compliant CA would implement this API.

In practice that means any company/digital signatures product could do a integration with this API once and then be able to use ANY certification authority they want/need/offer best prices for certificates.

Without this API, eIDAS is just a marketing moniker because the power belongs to the selected Certification Authorities. They set the prices, they choose WHOM can integrate with them to isse certificates and there is NO interoperability between them. This doesnt allow for a open market and makes the top players control everything while shouting "standards" and "eIDAS".....


Why is that website using a domainhack (with a non-EU ccTLD) rather than a proper .eu domain? Doesn't exactly inspire confidence that these people should have anything to do with security standards.


what's discussed here has nothing to do with the digital signatures part (which by and large already existed in the original version)


>Which is another way of saying "expensive certificates".

True, basically eIDAS is a cartel. With the help of EU legislation, some Certification Authorities banded together and are now saying that certificates emited by anyone but them are not good. And obviously they fully controll the pricing for the "good" certificates.


> True, basically eIDAS is a cartel. With the help of EU legislation, some Certification Authorities banded together and are now saying that certificates emited by anyone but them are not good

For very specific needs like electronic signatures, "seals" and an interesting one I hadn't heard before, timestamping (proving that an electronic document has existed at that timestamp), not for general computing.

Also, considering Bulgaria has 5 CAs on the official list, with 2 others as potential, the claims of a shady cartel of "big Cert" being behind this is laughable.


At bulksign.com we have this feature, it's called "Local Certificate" signature.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: