Hacker News new | past | comments | ask | show | jobs | submit | ryanlol's comments login

It’s important to understand that “middle class” has a very different meaning in the UK than the US. In the UK “middle class” generally means “posh”, you could see it as a shorthand for “upper middle class”.


> In the UK “middle class” generally means “posh”

I think it's probably very contextual. For example, The Telegraph reported that 'Seven out of 10 people view themselves as [middle class]'[0].

That's probably a result both of lower wage people feeling aspirational (and associating "working class" with manual labour) and many people with traditionally upper class traits feeling embarrassed to publicly suggest they are superior.

As the BBC notes, 'David Cameron - educated at Eton - has described himself and his wife - the daughter of a baronet - as part of the "sharp-elbowed middle classes".'[1]

[0] https://www.telegraph.co.uk/finance/personalfinance/8393834/...

[1] https://www.bbc.co.uk/news/magazine-25744526


> I know a Korean asylum seeker who has had a pending case for literally years

I’m curious, what do Koreans need to seek asylum from? Doesn’t South Korea have a pretty good human rights record? Presumably those coming from the North have a very easy time in the South?


But why would you care if the pizza place gets your name right? My name is difficult too, but I just don’t give restaurants my real name.


True, I go by Mike in Starbucks. I guess I can do the same there. I guess it hasn't occurred to me because I never actually called a pizza place :)

My point about the accent is still valid in my opinion. It's difficult to call someone in a loud restaurant and and try to get a point across.


Oh yeah, I’d assume that most people hate calling restaurants :)

It’s been a loong time since I last phoned in a pizza order, but for restaurant reservations it’s a daily thing (lots of places do have tables even though online booking says “full”).


Did “woke” actually originate in AAVE instead of whatever the technical term for twitter-speak is?


I saw it used a bunch in early 2000s to reference hip hop that strongly focused on class struggles, race issues, etc.

It was also used in stoner / party culture around that time to describe being in on the secret that the government was bad, capitalism was bad, etc.

Maybe directly influenced by the movie “waking life” but not sure on that. I was a stoner party kid and my memories of that time are pretty hazy. The culture was super accepting, early advocates for lgbtq before it was an acronym, etc. I also remember that group being very very accepting of everyone who had good intentions regardless of views. “___ is good people” was what we used to say. Probably why I dislike the modern version of woke so much.


Given that the early uses predate Twitter by a few decades: yes, unless you argue that it has shifted enough to be a "new word" now.


Wouldn’t that be the other way around if anything?


Of course not, the situation is already far better than it was 5 or 10 years ago. If anything, we’re slowly exiting the 0-click era, not entering it.


It's not obvious to me. As phones get new features, it stands to reason that the attack surface would also increase.

Note that I'm specifically referring to the mobile phone industry (people in at-risk countries rarely have computers).


I can't remember any recent good news about 0click mitigation


Nobody reports this stuff, but exploit kits like blackhole have completely disappeared. (Sure, maybe technically not “0click” even if delivered via an ad on nytimes.com)

The situation has dramatically improved during the past 30 years, but so has reporting. It’s the improved reporting that makes it sound like as if the world is on fire.


But you’re just playing games with meanings of words.

> "We did not have concrete evidence that data was exfiltrated from the DNC"

They did not have pcaps of exfil traffic but did recover the compressed files that had been prepared for exfiltration. Without pcaps there can be no “concrete evidence” that those files were exfiltrated, but we do know that the intruders did prepare data for exfiltration and had nothing stopping them from doing so.

This is basically as good as it ever gets. How about you name examples of some better investigations?


> They did not have pcaps of exfil traffic

You are playing into Crowdstrike's own Motte and Baily argument in restricting the words "proof" and "evidence" by substitting their meaning to what amounts to a recording of the attack. That is an impossibly high threshold, but it can more easily defended if you do. They kind of had to considering their actual technical arguments were weak.

"We did not have a sensor in place", as said by Shawn Henry. Yes, Crowdstrike didn't have them, and said they relied on "circumstential evidence", but it seems the DNC did have "sensors" in place, and Crowdstrike had access to them:

From the Mueller report, p. 40 [1], "On April 25, 2016, the GRU collected and compressed PDF and Microsoft documents from folders on the DCCC’s shared file server that pertained to the 2016 election. The GRU appears to have compressed and exfiltrated over 70 gigabytes of data from this file server (See SM-2589105-GJ, serial 649. As part of its investigation, the FBI later received images of DNC servers and copies of relevant traffic logs)" - btw all of this info originally comes from Crowdstrike.

While not pcaps per se, most varieties of such logs would show a different profile for downloading 70Gb "thousands of emails", zip/compressed files, etc, than much shorter instrumentation data for their Malware.

You can't have caught one but not having had the other, X-Tunnel + VPN or not. I mean, there are ways for that to be, but you'd have to have been inept on purpose. I have some trouble believing the DNC IT would considering the general environment back then.

So it followed concerning these point that S. Henry, when pressed for what the circumstantial evidence was for 70Gb to have been exfiltrated, S. Henry said "And there might not be evidence of it being exfiltrated, but they would have knowledge of what was in the email. … There would be ways to copy it. You could take screenshots.".

I mean, c'mon man... "screenshots" ??? You basically got VNC but you "sceenshot" ??? Either Mr. Henry is a fool or takes his House Commitee for one - which the latter may very well be.

IMHO, either of us would have to look at the source code for X-Agent (available) or the Sea Daddy implant (no idea) to see if

1. not having logs of large transfers makes sense in this context, at least in its known variant and

2. are the Crowdstrike declarations coherent in that regard.

Until we do, we're kind of stuck to see whose stretching the argument between you and me.

---

On a related note, but not directly involving Crowdstrike, the Dutch cyberdefense org and the NSA seemingly did have such real-time evidence from 2015-2018.

As far as is publicly known, those particular intercepts weren't shared with the Mueller team, nor the House Commitee inquiry.

It would be interesting to know why if it was not on natsec "ways and means" grounds. If it wasn't, the FBI wouldn't have had to rely on Crowdstrike.

> games with meanings of words.

I don't believe I am.

The context I'm using in both my references above is what is understandable by the layman, not mixing technical "in-knowledge" and what said layman reading the NYT can understand :

- D.A. said to the NYT "the Russians would enter the network, “exfiltrate” documents of interest and stockpile them for intelligence purposes. Once they got into the D.N.C., they found the data valuable and decided to continue the operation". I understand "the operation" is refering to "phishing, exfiltrating, stockpiling".

- Later D.A. says to the commission "We did not have concrete evidence that data was exfiltrated from the DNC". That implies no traffic logs, at all.

But then, we're back, again, to the technical problem outlined earlier.

IMHO, a correct and honest wording to the NYT would have been "We have strong indications Russian hackers may have entered DNC servers, but nothing in logs we do have indicates they did anything with it.

[1] https://www.justice.gov/archives/sco/file/1373816/download

[2] https://www.volkskrant.nl/wetenschap/dutch-agencies-provide-... and https://nos.nl/nieuwsuur/artikel/2213767-dutch-intelligence-...


As if grindr doesn’t collect any payments in Europe or have executives who enjoy their ability to travel.


>The link between [redacted], the Israeli state intelligence services and the Israeli Defence Force is not a tenuous one

>One of the directors of Carbyne is [redacted]. The chairman of the board of directors is Ehud Barak, the 10th Prime Minister of Israel

She’s a director of a company with a former PM on the board, pretty sure this is exactly the kind of a link that normal sane people would consider “tenuous”.


None of your sources support the claims you made regarding Crowdstrike.


I gave the specifics in another answer at https://news.ycombinator.com/item?id=29671485 .


Yeah a variety of clowns keep posting this same conspiracy theory over and over, but the fact is that the House testimony does not in any way support your claim

> His company's top officers lied to the public during the campaign in 2016 (and ever since) that the DNC servers was hacked by the Russian Government

The only real takeaway from your links is that crowdstrike does not have pcaps showing data exfiltration.


I gave you an answer on your other comment on what my opinion is on asking for pcaps.


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: