Hacker News new | past | comments | ask | show | jobs | submit | jonathan-kosgei's comments login

I just tried a comparison of ChatGPT, Claude and Bard to write a python function I needed for work and ChatGPT (using GPT-4) whined and moaned about what a gargantuan task it was and then did the wrong thing. Claude and Bard gave me what I expected.


I actually considered starting a similar thread because I noticed this as well! Lately, it feels like GPT-4 is trying to get out of doing my work for me :D.

I've also started to notice it's been making a lot of typos eg. yesterday while converting Kelvin to Celsius, it incorrectly stated that 0C is -274.15K, despite correctly stating in the previous sentence the correct value of -273.15K.


For productivity - https://notes.andymatuschak.org/About_these_notes

For physical exercises - https://exrx.net/


What is the read latency?


It's 1-2 seconds for a 1 GB database with millions of items.

(A couple years ago this was more like minutes, and about 10 years ago it would have taken hours!)


That's impressive.


Thank you for this comment!


Yes! Send me an email at my first name at ipdata.co.


IMO VPN services that don't defeat geolocation like Apple's Private Relay, the Google One VPN service and Cloudflare Warp are a good compromise for privacy.

This is because they allow businesses to provide their services without breaking the law eg. gambling is legal in some states and illegal in others, betting services need to distinguish/target users accordingly.

Insurance providers might only be licensed in certain states and not in others and also therefore need to correctly distinguish/target users correctly.

US companies are also restricted from doing business with certain embargoed and sanctioned countries and they are expected to use technological tools like IP geolocation to be compliant.

"OFAC makes clear its expectation that companies consider Internet Protocol ("IP") address geolocation data when assessing whether online customers are located in sanctioned jurisdictions." [0]

These and other legitimate usecases are defeated by VPNs.

[0] https://www.mondaq.com/unitedstates/export-controls-trade-in...


> VPN services that don't defeat geolocation like Apple's Private Relay, the Google One VPN service

TL;DR these VPN offerings don't provide privacy since we are merely exchanging who is doing the surveillance.

Long version: The problem with these are that instead of now denying a service to privacy-conscious users, these users are being profiled big tech companies that can afford to do more sophisticated things like track you across the internet using trackers and browser fingerprinting and thus don't need to rely on IP addresses. By profiling you they are themselves able to guarantee geolocation or to kick you permanently out of their VPN if you violate their arbitrary ToS.

And that they are profiling you is totally making sense too: Otherwise how would they be able to keep any malicious activity at bay.

> legitimate reasons

Yes, these are legitimate reasons. But does the need of a number of profit-based tech companies outweigh the need of society for privacy?

I doubt it! Since it doesn't seem fair that everyone must suffer for the benefit of a few.

The entire problems is made more complicated by:

1) lawmakers that don't understand that you simply cannot perfectly replicate.

It particular the need for geoblocking shows how arbitrary laws even are, if the same thing is lawful in one state but not the next.

Thus it seems contrived to do surveillance on everyone just so that a few companies who insist on having an internet presence can emulate physical geopresence.

There should be a law that states that if it takes too much of a toll on privacy to emulate physical behavior, you should be forbidden to seek to emulate it.

2) the fact that you can put an exact number of how much money you save as a business by using such scores, but you cannot put an exact number on how detrimental privacy loss is, since thst evolves on a very slow timescale. The latter only becomes visible really late, like a silent but terminal disease that barely in the very last stages begins to show itself: For example, when you reach China-style surveillance. Only then most people ask themselves: How did we get there?

To conclude: I don't particularly blaim your service for that since you are simply acting within a web of incentives and probably your livelihood depends on it - and if that is the case you can't possibly be expected to make an obiective decision (sorry if I was a bit harsh in this entire back-and-forth). Though if I were running such a company at least I'd make sure to donate some funds to non-profits that promote privacy and the use of VPNs/Tor for everyone - somewhat similar to CO2 reduction certificates that CO2 emitters buy.


Maybe they shouldn't use a technology that is fundamentally ambiguous about identity - you know go back to paper and US mail.


"Threats" is based on static blocklists. "Trust Score" is generated by a model.

So what this means is, "even though this IP hasn't been reported anywhere we still think it's high risk".


What this means is: If a company website uses these scores, you will be blocked, even though you did nothing wrong.


> "Trust Score" is generated by a model.

Does a consumer have any insight into what the model does/doesn't like about an IP, or is it a black box?

I'm wondering how they could contextualize a score for their use case, or how I as the IP owner know what to fix to raise the score.


In all likelyhood it will be an (neural net?) AI, and then it's hard to get insight into why decisions were made.

And even if they could explain it you, it might be spurious correlations that were picked up.

There is a huge field of interpretable/fair AI and these types of questions arise in much more serious instances (e.g. where people in prison aren't given parole due an AI "assisted" decision). The state of the art seems to be that there are no easy answers as soon as you start questioning a decision by a modern AI system (or want introspection). You can only hope to not be part of the 5% of the cases where the decision is bad.


You're rating massive swaths of Verizon FIOS home internet fiber with static IP addresses as zero threat, high risk.


Oh boy this is ripe for abuse. Good luck lol


No, if your reputation is really bad you'll probably just be shown a captcha.


No, Cloudfare often just blocks you.

And if it doesn't, do you think that is a better solution, solving a captcha every 5 minutes? Just try using Google from behind a serious VPN provider, see how that works for you.

Also, what is your opinion on geoblock, do you think that is a good thing?

It seems you are one of the company's representatives that has never in his life consistently used a VPN or Tor, so you don't even know to what kind of restricted internet your company's products are leading to.


Although I am not a fan of cloudflare, cloudflare doesn't just block you. It's up to the administrator to choose what action he applies to what type of user.

https://developers.cloudflare.com/firewall/cf-firewall-rules...


To clarify, showing captchas is what a number of our customers do and I doubt they do it as aggressively as google.

Geoblocks are unfortunately often necessary to comply with the law or contractual obligations eg. media streaming.


> I doubt they do it as aggressively as google.

While I would like to believe you the problems is that until there is a law on how much you can pester people with captchas (and you basically can pester them into oblivion) , privacy-conscious people are simply at the mercy of the sysadmin deciding for them how usable the company service is made. Which is a decidedly bad state of affairs, since he could simply wake up at any day, whip up Google-style captcha-ing and as a VPN user you simply would have no option for recourse :(


Not even close. PayPal, Twitter, Facebook, Discord, etc. all insta-ban or lock your account if you come from a low reputation IP.

These services make it impossible to participate online without giving big tech your identity. IMO they’re worse than everyone else combined because they play a critical role in helping all tech companies discriminate against people that want privacy.


Pretty much this.

Actually they ban your account and want you to upload ypur ID.

The weirdest thing was that Facebook a while ago had an onion adress too (presumably so that people from repressive regimes could access it). But if you'd use Tor to access them using the regular web: insta-ban.


And then you complete the captcha, the page reloads, and you have to solve another captcha. Never actually getting to the site


This is actually proof that it works as intended. Our scores are made to be consumed by web applications.

In that context it makes sense that a cloud IP that's used to send mail would be treated with suspicion if it's seen trying to make a purchase on an e-commerce site.


Please stop making the world a worse place. Every online purchase I make comes from a datacenter IP with resistFingerprinting = true. I've got a good ISP that probably isn't selling surveillance about me, but websites themselves certainly abuse IP addresses (as you're doing here), and I see no reason to browse like some naive jamoke - datacenter IPs are easy to rotate, and fine-grained wireguard is already integrated into my setup.

When web sites increase the amount of hassling (and make no mistake about it, garbage like this, CAPTCHAs, nonconsensual "SMS 2FA" etc are all just hassles to customers), I file support tickets about their broken website. If a website continues down the path of snake oil to the point of becoming unusable, I generally end up no longer being a customer.


Fraudulent activity by bots is a problem that everyone who's managed a large enough website is familiar with.

Most bots originate from cloud IPs or hide behind proxies and VPN services. Our scores ensure that the majority of legitimate users i.e. those coming from residential IPs are left alone, with captchas and other verification mechanisms shown to "high risk" users, that is, users visiting from a cloud provider's networks or a known proxy/vpn provider. This can be verified by the number of comments on this thread by users whose home internet IPs showed a high "Trust Score".

So if anything our scores help reduce the hassle or friction that legitimate users are subjected to by the fraud-fighting tactics employed by different websites.


"Fraudulent activity by bots" is a contradiction in terms that sounds like you've just mashed distinct issues together to create an emotionally manipulative phrase. Bots are bots, fraud is fraud. "Bots" are an overstated problem - websites should want to publish their information for every type of consumption. If serving some types of consumers causes too high of a load, then the inefficient code is what needs to be fixed. And fraud is not going to be prevented by a CAPTCHA.

> our scores help reduce the hassle or friction that legitimate users are subjected to

I'm telling you right here, I am a legitimate user and when businesses fall for the garbage story you're pushing, it makes me less likely to remain their customer. Hassling customers with repeated rounds of "click on all the cars" "no you're wrong" is terrible UX. It could be understandable if it popped up after a few failed logins in a row, but putting the nagwall front and center is appalling design.

I look forward to Apple's VPN increasingly demonstrating just how wrong your marginalizing surveillance mindset is.


Bots here refers to automated traffic, and I don't think anyone on HN would be surprised by the assertion that most online fraud is automated.


I would reject that assertion, because it seems to tie a bunch of disparate issues in order to summarily "other" them. It probably makes for reassuring business metrics that are ultimately detached from reality. I'm sure my own browsing patterns are often miscatergorized into a bin of "look at how many bad guys we stopped", ultimately misleading businesses.

Please describe one specific trend/activity you're referencing, where an automated user agent specifically facilitates fraud, beyond merely facilitating users that just so happen to have fraudulent intent. Situations where augmented user agents are claimed to be prohibited via bullshit terms of service do not count.


What is the difference between the setup you describe being used for what I assume is privacy, and the same setup being used for nefarious reasons exiting from your presumably consumer level VPS?


The difference is as you just said - one is being used for privacy, and the other for "nefarious reasons".

It seems like you're trying to imply an association, while avoiding having to make the "if you have nothing to hide" argument explicitly.


Not at all.

I'm wondering why you expect the websites you're attempting to utilize to understand your intentions are "pure" when I would argue that setup is vastly more commonly used for nefarious purposes.

They do blocking for a reason. I'm sure if you contacted them they would explain they lose $$$$$$ a year due to fraud/abuse/hack/nefarious attempts coming from setups similar to yours, which dwarfs however much you might buy from them. I understand their position.

There are commercial VPN and security solutions etc that would achieve some of the goals - undoubtedly at a higher cost than what you're running. You would essentially paying for a boost in reputation that websites would recognize as being more on the "good" side than "bad".

It's quite unfortunate for you I agree but I don't blame them at all.

A suggestion - get a more premiere data center host and get a /29 network allocated to you (can be using a LLC for privacy). Essentially become a commercial entity and pass the sniff test for a lot of websites.

Or subscribe to a service that does that for you, and your frustrations will melt away.


I expect websites to use IP addresses for their purpose of routing packets back to me, and perhaps some slightly-above-L2 concerns like rate limiting.

And yes, I understand these businesses have fallen for snake oil salesmen telling them things like VPSs are indicators of "nefarious purposes". But the actual reality is why would someone with "nefarious purposes" need or want to use a VPS? Rather someone looking to do credit card fraud is going to be using a proxy service that runs through residential connections via cracked machines.

Commercial VPNs, which I also use for some types of traffic, get hassled just as much by websites. So no, that is not a solution.

Getting my own /29 would defeat the entire purpose of browsing from a rotating data center IP, which is to defeat IP-based tracking.

The only way to solve this dynamic is for enough people to start browsing from VPNs, CGNAT, etc, that the snake oil salesmen have to move on to something else.


>these businesses have fallen for snake oil salesmen telling them things like VPSs are indicators of "nefarious purposes"

They are indicators. 95% of the abuse on my VPS came from China, services like Contabo, DigitalOcean, Linode, Azure, Oracle, GCP, M247, and Tor. Some of these are no longer allowed to even reach L7 for my website. One other statistic I noticed is that some of those providers have 0% legitimate traffic.


The audacity you people are having of shoving unconsented scores down our throats!

I hope you choke on your own scores when a future-AWS-using-your-scores will deny your servers acces, because you accidentally sent an email from that server that was actually supposed to be doing something else.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: