Hacker Newsnew | comments | show | ask | jobs | submit | pain_perdu's comments login

This is a fantastic company. I've had interactions with many members of their team and used a few of their products and they rock.

-----


Glad you loved us and thanks for your endorsement! =D

-----


Thanks so much for posting this! I just sent a package from Toronto to New York (a short direct flight) so was curious why it was showing Memphis as the current location. Perfect timing. In case anyone is curious: https://www.fedex.com/apps/fedextrack/?tracknumbers=77323599...

-----


And when you order things direct from China, they usually come through Alaska.

-----


Used to - the one I got yesterday came to Memphis directly from H.K.

-----


Alaska is mostly in between China and North America, though.

-----


I don't understand what's missing. It was updated March 6th.

-----


The actual declaration seems to be missing. Although it does not appear to have been there in December, either: http://web.archive.org/web/20141226030217/https://canary.sil...

-----


If it wasn't there before, it is now.

-----


The headlines are there, but the statement that they have not been served any warrants isn't.

-----


That's what the canary is there for; safe to assume that they have been served a warrant.

-----


The part where they say "We haven't been served a warrant up until March 6 2015".

In case of receiving a warrant, that's exactly the part that would be missing, and they wouldn't be able to post it anymore.

So if Silent Circle doesn't update this over the next few days explicitly saying they haven't received a warrant until that date, then it's safe to assume that they have received one.

-----


This is not accurate.

In a fully hypothetical situation.

The US government has obtained secret warrants and a mandate to ensure that the secret warrants stay secret.

The warrants are served and whatever agencies are involved start doing their penetration / searches / seizures.

SilentCircle does not update their canary as is their policy.

The US government realizes that this action has compromised their secret warrants and take steps to mitigate the situation. They do this by coercing the person or persons at SilentCircle that can post an update to post an update stating that everything is just peachy now. Followed up by another post on their blog, or here on hacker news (as happened the last time they did not update the canary) stating that it was a misunderstanding or a simple error and no to worry everything is fine.

The value of the SilentCircle has in my opinion been nil since the last incident occurred when it was not updated.

I would like to believe that our government will act transparently in accordance with democratic principles and in accordance with the public courts but this is not always the case. It may be the case in most cases.

I would also like to believe that SilentCircle employees would not agree to "fake" their canary under any circumstances, and this is probably 90% certain. If the government arrested a high level employee for not cooperating, it would certainly leak out at some point. I do not know what methods are available to secretly force an American to do the bidding of the government in a case like this but they may have means of being persuasive.

I fully agree that this is a hypothetical situation and maybe very unlikely.

-----


I can verify that they do pay very close attention to HN posts and when I previously disclosed some internal info they attempted to stomp it down very rapidly.

-----


You're hinting at an abuse of the site that we should probably look into, so I'd appreciate it if you'd email hn@ycombinator.com with details.

-----


I posted negative stories about them in r/Montreal, where they're trying to break into, and they got downvoted instantly

-----


Would love to hear everyone's thoughts on this: http://www.crowdmurder.com - Gamifying the investigation of the case from the Serial Podcast.

"Use Real Court Evidence to Solve the Murder of Hae Min Lee Access Courtroom Audio, Build Time-lines, Maps & Suspect Bios. Team up with fans of the Serial Podcast from around the world to help solve a murder.

Every Court Document and Recording We're Publishing Every Piece of Publicly-Available Evidence from Adnan's Trial and building powerful annotation tools"

-----


This is not going to end well.

Ethical quandaries aside (of which there are several) for a moment, I think this strategy speaks poorly of the startup. What type of signal does it send to prospective investors that you feel it's necessary to pull illegal stunts in order to gain attention for your round? A quality YC startup shouldn't need to go to such lengths to raise a round if the substance of your project/team is of sufficient quality as to warrant investment.

-----


This is not going to end well.

Ethical quandaries aside (of which there are several) for a moment, I think this strategy speaks poorly of the startup. What type of signal does it send to prospective investors that you feel it's necessary to pull illegal stunts in order to gain attention for your round? A quality YC startup shouldn't need to go to such lengths to raise a round if the substance of your project/team is of sufficient quality as to warrant investment.

-----


It should be noted that the OP is a fan of "growth hacking" unironically: https://twitter.com/AviZolty/status/468882462610034689

-----


If your theory is correct, would we not expect to see the account names be a bit more random? That is to say, these are in alphabetical order and clearly coming from a large list because the letters in each progressive account are similar:

Bille97... Billel... Billen... Billet... Billew...

Isn't it unlikely that so many alphabetically-similar accounts from the third-party site would use the same password for dropbox?

-----


Using http://thepiratebay.se/torrent/7803135/1_million_email_list to give the relative frequency of email addresses I'd estimate they have a total of around 30k addresses

    -> % cat 1000000\ email\ list.txt | sed 's/, */\n/g' | grep "@"| sort | uniq | wc -l
    835694
    -> % cat 1000000\ email\ list.txt | sed 's/, */\n/g' | grep "@"| sort | uniq | grep -i "^b[e-i]" | wc -l
    11160
    irb(main):001:0> (835694.0 / 11160) * 400
    => 29953.189964157707

-----


It is very likely that they have X million passwords leaked from other sites, and they only chose to release emails that begin with "bi-".

-----


What if the guy created accounts so that people can check those are "real" and collect free bitcoins? Picking similar emails is to try to trick us into believing that he has 7 million of those.

-----


Well-put sir, thank you for this.

-----


This is the band with the most sociopathhic manager since Peter Grant, who has been trying to push DRM before: http://devrandom.net/~zeruch/wordpress/?page_id=507 (disclosure, the link is my own write up of a speech by Paul McGuinness at a Medem conf)

-----


The folks who recently poured millions into connect.com are NOT going to be happy about this.

-----

More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: