Hacker News new | past | comments | ask | show | jobs | submit | mikehotel's comments login

Most likely they are trying to degoogle.

https://en.m.wikipedia.org/wiki/DeGoogle


How can the use of a switch damage your installation?


inrush current, mechanical wear, thermal stress on some components (mosfets, transformers, etc)...


This has been the case for a long time, and has not changed even in 2024. Please use a Primary Password if you are storing passwords in Firefox.

https://support.mozilla.org/en-US/kb/where-are-my-logins-sto...



True hacker spirit embodied in this project. Very well done!

“So there was a whole study to make the LEDs simulate the glow of the original lamps. And then we found out that different lamps from different years had a different glow time. Measurements were done, math was applied, but we added lamp glow. More CPU time is spent on simulating that than on simulating the original CPU!”


Tailscale [0] says the private keys never leave the device.

“Security

Tailscale and WireGuard offer identical point-to-point traffic encryption.

Using Tailscale introduces a dependency on Tailscale’s security. Using WireGuard directly does not. It is important to note that a device’s private key never leaves the device and thus Tailscale cannot decrypt network traffic. Our client code is open source, so you can confirm that yourself.”

0. https://tailscale.com/compare/wireguard


That is true as far as it goes, but how does your node learn the public keys of the other nodes in your tailnet? My understanding is that they are provided by the coordination server, so you have to trust that the public key the coordination server gives you is actually the one for your peer device.

Tailnet lock helps mitigate this by requiring that node public keys are signed by a trusted signing node, but it isn't bulletproof.


Public key cryptography doesn’t work like that. If you were given wrong public keys you wouldn’t be able to connect to start with.


> Public key cryptography doesn’t work like that

Like what? I'm saying both sides of the connection would be given the wrong public keys by the coordination server. The private keys of which would be held by a MITM.


To add to that, they also provides Tailnet lock [0], which protects from the only way the coordination server can mess with the tailnets, by connecting unauthorized nodes.

[0] https://tailscale.com/kb/1226/tailnet-lock



Apparently an indirect association. From [0]:

Fall 2021

Holden Karnofsky resigns from the Board, citing a potential conflict because his wife, Daniela Amodei, is helping start Anthropic, a major OpenAI competitor, with her brother Dario Amodei. (They all live(d) together.) The exact date of Holden’s resignation is unknown; there was no contemporaneous press release.

Between October and November 2021, Holden was quietly removed from the list of Board Directors on the OpenAI website, and Helen was added (Discussion Source [1]).

0. https://loeber.substack.com/p/a-timeline-of-the-openai-board

1. https://forum.effectivealtruism.org/posts/fmDFytmxwX9qBgcaX/...


Don't tell me there is another polycule in there somewhere.


It doesn’t look like the moved away from gVisor due to security reasons. “We were able to achieve these improvements because the second generation execution environment is based on a micro VM. This means that unlike the first generation execution environment, which uses gVisor, a container running in the second generation execution environment has access to a full Linux kernel.”


The reason you go with process isolation over VM isolation is performance. If you share a kernel, you share memory managers and pages, scheduler, limits, groups, etc. If you get better performance running VMs vs running processes, then what was even your isolation layer for?

But at the end of the day, there is a line in the sand around hypervisors vs proc/kernel isolation models. I challenge you to go to a financial or medical institute and tell their CTO "yeah, we have this super bullet proof shared-kernel-inproc isolation model"

The first question you'd get is "Why is this not just part of upstream linux?" Answer that question and realize why you should just use a hypervisor.


You may want to check out iocage for managing jails. It has not had a release in a few years but it is maintained.

https://www.freshports.org/sysutils/iocage/


I have been looking to migrate to something else but my fear with iocage is that I'm going to be in the same situation a few years from now.

What's the current hotness? Bastille?


Where is it maintained? The port is, but the upstream?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: