Hacker News new | past | comments | ask | show | jobs | submit | kkm's comments login

I can also highly recommend reading: Touching Lives: The Little Known Triumphs of the Indian Space Programme, by SK Das (2007).

Excerpt: Touching Lives is not merely a chronicle of the community outreach of the Indian Space Research Organisation (ISRO). It is the story of journeys to far corners of India meeting people whose lives have been transformed by technology.

More books about ISRO: https://forum.nasaspaceflight.com/index.php?topic=33814.0


Thank you. I'm going to add that book to my list, it sounds interesting.


I can recommend material from Donella H. Meadows. The book “Thinking in Systems” is a very good one.

https://www.goodreads.com/book/show/3828902-thinking-in-syst...


I don't want to be overly critical, but what exactly do people see in this book that eludes me?

I've read it a few months ago with high expectations, pen in hand, but… I didn't really make many notes.

Sure, if you've never heard about feedback loops (and that there is positive and negative feedback), but, is the book just way too basic for me or did I miss the point?

Is Weinberg's book maybe more practical or more advanced?

I'm still thinking that systems thinking has much to offer (and skimming the International Encyclopedia of Systems and Cybernetics confirms that hunch), but where do I continue?


Found a link on Slideshare, if someone does not want to download the PPT. https://www.slideshare.net/kfrdbs/peyton-jones


Big Big fan of mitmproxy. This is a wonderful tool, and with scripting functionality it helps achieve so much more. I have been introducing this tool to so many developers and quality assessment teams, to not just improve day to day things but also perform privacy assessments w.r.t GDPR etc.

Thank you so much for your work. What is the best way to donate to your project?


The price difference are huge, even when you compare from Germany, however, it’s important to note that iMessage and FaceTime are most likely disabled on iPhones bought from UAE. At least that was the case back in the time.

https://www.reddit.com/r/apple/comments/943iql/i_think_the_u...


I have been testing Edge on iOS for Privacy practices. I think there are lot of things to improve. Also, it would be great for Edge to make it easier way to report and have discussions. Currently it’s a black box.

- https://twitter.com/konarkmodi/status/1258163915319640071

- https://twitter.com/konarkmodi/status/1258185278168223746

- https://twitter.com/konarkmodi/status/1262019416914644994

- https://twitter.com/konarkmodi/status/1258338835722887171


Doesn't edge on iOS just use an UI only top of Safari Webview?


Yes, Apple doesn't allow 3rd party browsers on IOS.


So iOS Chrome/Firefox is just Safari wrapped in a GUI?


Yes.


I think so, but the data collection practices are governed by individual apps.


Thanks, for the article. Always good to refresh the common pitfalls.

There is a RFC which also details the best practices for JWT: - JSON Web Token Best Current Practices: https://tools.ietf.org/html/rfc8725

On the similar topic, some more interesting RFCs / Drafts from IETF on OAuth: - OAuth 2.0 Threat Model and Security Considerations https://tools.ietf.org/html/rfc6819

- OAuth 2.0 for Browser-Based Apps - https://tools.ietf.org/html/draft-ietf-oauth-browser-based-a...


Disclaimer: I work for Cliqz.

Good to hear that Mozilla changed their mind, when we proposed an open API for extensions to access the search area it was turned down

Ref: -https://bugzilla.mozilla.org/show_bug.cgi?id=1361327

https://bugzilla.mozilla.org/show_bug.cgi?id=1361327#c28


We haven't changed our mind there. We're not going to implement a webextension API that allows replacing the results popup or parts of it with an iframe as we don't believe that to be a good API.


what is not good about it. Privacy? Security? :~)


Thank you for taking the time to read the article and sharing your feedback.

Noise is added for what is called plausible deniability. Note that messages themselves do not contain any user-identifier. We take extra measures to strip request headers not needed by the server to avoid extra information that could be used for implicitly linking messages[1]. Possibility of linking messages based on network fingerprinting (ex: IP - which we do not log) still exists and is an open concern which we will solve in the next version. This at most makes it possible for us to learn that these 3 domains are visited by the same person, again - given that the list of domains are from shortlisted top-news domains, it is safe to assume that they do not contain any PII.

That said, it is not the strongest model we apply -- due to resource-constrains we have not updated to strongest models like we do on more sensitive data - via HumanWeb[2]. We will soon do the changes on a couple of dimensions: a) each domain as separate message, right now this introduces un-wanted spatial correlations, and b) send the domain through the proxy network HPN[3].

Ref: [1]: https://github.com/cliqz-oss/browser-core/blob/7679c40aec9fe... [2]: https://www.0x65.dev/blog/2019-12-03/human-web-collecting-da... [3]: https://www.0x65.dev/blog/2019-12-04/human-web-proxy-network...

Disclaimer: I work for Cliqz.


There is some similar work in the space of checking if the credentials being used by the user are compromised or not.

Example: https://arxiv.org/pdf/1905.13737.pdf


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: