Hacker News new | past | comments | ask | show | jobs | submit | libdjml's comments login

This entire piece and author lost me within the first paragraph.

“and soon Google” links to a complete unsupported fluff piece from November, drawing a loose connection to an activist investors letter.


That would be a terrible business strategy.

If someone comes forward with legitimate good security vulnerabilities and you don’t pay out, you’re massively encouraging them to go to shady brokers next time.


The twice-linked brief article states that basebands have full OS memory access, which is not true in 2018. And the article is completely uncited.


Fortunately, Australia doesn’t make any phones or popular e2e software.


It wouldn't have to be the e2e software as the delivery app for the payload or tooling. Regardless it was more about the fact that governments and other actors have options. Phones are just like any other software platform.


Agreed. If anyone thinks it’s a legitimately bad book, feel free to discuss why.


It is a self-help book rooted in Jungian theory, widely discredited in modern psychology. His understanding of modern and postmodern philosophy is only deep enough to convince readers with no knowledge of those topics that he knows something about them.


Also here's a great video that might help Peterson fans understand some of the problems with his positions: https://www.youtube.com/watch?v=4LqZdkkBDas


I urge everyone to look at this video. If this is the best the left can do, they are in big trouble. JP is much more convincing than this video is.

Also - I see this a lot - he is attacked on ideological grounds, while his entire argument is that the discourse should be grounded in science, not ideology.

Here's an example: many people seem to think that if you give men and women equal rights and opportunities, that this will automatically lead to 50-50 in STEM, health, politics etc. The problem here is that extensive research shows that in the societies where the most equal opportunities exist (Scandinavia) the differences between men an women in those areas actually increase. This research has not been refuted by anyone.

Apparently when men and women are free to choose the life they want to lead, they make different choices.

Which leads to the question: should we really push for equity in the sense of equal representation or is that just another form of oppression?

Again: if this video is the best the left can do, they are in big trouble.


If the right is arguing against the belief that ratios will be 50-50 automatically given equal opportunities, they aren't arguing against the left.

In fact the video states that the assertion there are biological differences between men and women is uncontraversial.


There are a load of criticisms you could call out about google, but suggesting that their “one primary platform and single focus (social media)” is about to collapse is not valid; they’re far too broadly invested (from mobile phones to search to email) to claim they’re about to become irrelevant.


If you look at where their revenue is, it it probably not broad at all (just search advertisement and AdSense).

And if you look solely at the US and Canada their adaption is probably petering out as well.

And heart what is their core business other than a massive invasion of privacy and data mining of personal information?

What about all these stories that has push management on the defence? (Google China, that right-wing guy and so on.)

The point is. What this article is saying about Facebook could just as easily had been said about Google with just about the same validity.

Why does Facebook get bad press whereas Google does not?


> Just go sit somewhere and turn your attention inwards

Perhaps you were born with a natural instinct for what meditation is, what to do when thoughts arise and you go off track, how to sit comfortably, what you’re aiming for and what you’re not.

But I didn’t, I needed to read books to start my development. I absolutely don’t think children should know this.


Given the posted article is about the poor security posture of most home routers, has anyone inspected ubiquiti?

I gather they have a bug bounty which is a good start, but so do Netgear and their routers are still full of bad vulns.


It is worth remember that unlike those home routers, Ubiquiti's EdgeOS is based on a production major network os, Vyatta, (as is VyOs), and therefor has a lot more scrutiny and bug fixing than those other things, which are often even more complicated by the lack of foss hardware or standardized ways to do things (many routers are stuck on whatever the manufacturer put on it in the factory). I'm sure Ubiquiti's code is probably ripe for fuzzing, etc, but a well configured EdgeOS device I would put against any cisco, cumulus , extremeos, routeros, junos, pfsense, ipfire, etc device any day. The main benefit of something like Ubiquiti being asic offload that wouldn't exist if you did something like pfsense on cots x86.

The real irony of how vulnerable these devices are, is that often they are based on tech that is foss that has updates to fix those issues but has been carefully packaged up inside a blackbox the consumer doesn't get to control and therefor doesnt get those updates.

Once again, why we need a "right to root".

For national security!


Yes, nice advertisement and before I read this article I'd have agreed but the bad news is I just verified that my 2 EdgeOS products don't have NX support. Heck, one of them uses the Cavium processor mentioned in the PDFs.


> Ubiquiti's EdgeOS is based on a production major network os, Vyatta, (as is VyOs), and therefor has a lot more scrutiny and bug fixing than those other things

Apparently you’ve not really looked at EdgeOS. https://www.theregister.co.uk/2017/03/16/ubiquiti_networking...

Vyatta was acquired by Brocade in 2012. Ubiquiti forked after that.


EdgeOS was really based on VyOS... which was based on Vyatta, which was still being used on major production systems even before the brocade acquisition. I have used it in prod myself. I should have said VyOs but still, the point gets across to those not looking to nitpick.


Remote implies it can be accessed remotely, is that true, or did they mean “remote if an attacker can remotely send data to SQLite”?


Sounds like they mean “remote” because chromium uses SQLite and JavaScript loaded into your machine comes from a remote source. So because a website can run JS that can exploit chromium they’re calling it an RCE.


Yeah it seems like RCE in the context of Chromium, but not SQLite? I know it’s pedantic but if this is RCE in SQLite because it’s exposed to the network via other software, every vulnerability is “remote” because you may expose it via other software.


Good question, to which I don’t know the full answer. But if you look at their motto “move fast and break things”, insistence on pushing new features as fast as possible, and the recent clash and resignation of their CSO, I’d say google are just more mature about security, and understand their products are entirely reliant on trust of their users.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: