Hacker News new | past | comments | ask | show | jobs | submit | tardy_one's comments login

I won't deal with a company covering those kinds of fees or even a headhunter in the UK for a European job. There's a lot of room there for problems and anyone who is worth paying $27k on top of generous relocation has a lot of choices that are better than the UK in terms of actually delivered compensation.

5% doesn't sound like what you would get addressing the lowest hanging fruit.. Which makes sense because the Linux kernel's primary bloat is mostly in the form of drivers that never load on any specific system. So sure, a pretty good result for not a very relevant optimization but I'd be disappointed if I built this tool specifically for the kernel instead of applied it because I had it..

The complexity of a field you are leaving doesnt make it hard to drop out. A dentist is very well prepared to be a hair stylist, but I've never heard of that choice.

Dentists also don't have a lot of job related debilitating injuries, aside from depressions.


We've been fixing that over time and now no one expects a computer to be as fast as it accidentally was in 2010.

Why, by 2030, computers ought to be even slower!

They give no explanation of the estimates.. Is there a qualitative theory on why the UK would lose something like 4 times the average it lost in every other post brexit year or is that a sign of some projection artifacts from a quantitative analysis projecting from the first weeks of 2024 or something?

The government is getting rid of tax exemptions for non-domiciled individuals who up to this point did not need to pay tax on foreign source income that was not brought into the UK. The economy overall is in a dire state, Labour are projected to win the election this week in a landslide. The rich are worried about further tax raids from a left wing government.

I had to look this up [1] as it doesn't make any sense. Turns out that is true. No wonder why they are all moving out of UK. The plan was that they could tax them and generate their projected £3B tax revenue. When they are all gone, which means not only do you not get those £3B you also lose all their potential spendings in the city.

[1] https://www.bbc.com/news/business-32216346


Ah.. The UK is complying with OECD guidelines and leaving the race to the bottom.. What percentage of non domiciled have to actually become domiciled to make up for the rest, who paid flat tax and couldn't risk investing in the UK?

Well if everyone is doing it then it is certainly a good thing. I don't think the BBC article mentioned anything about OECD.

Which goes back to question one, why are they leaving UK now?


I think all countries that are similar are discussing tax reforms or expecting eventual consequences. That doesn't mean all of them are doing the reforms this year.

Russia withdrawing to 2013 borders is a pretty absurd possible diplomatic solution. If Russia withdrew to the stalemate of 2020 with no discussion would the Ukraine actually risk reopening the entire hot war again or try to find a manageable level of tit-for-tat skirmishes?

Certainly Russia would prefer to try to reachieve that stalemate than enter a discussion that arrives at 2013 borders..

Perhaps in a situation where it was actually diplomatically solved and Russia actually wanted to accept 2013 borders there's something else on the line that is far more important than anything in the conflict.

But realistically, most ends to the hot conflict probably will end in suspicion and a continued stockpiling of arms by both sides.

I don't think anything will be resolvable until Putin is politically incapacitated and a replacement possibly doesn't see the conflict as worthwhile for their own political needs.


> Certainly Russia would prefer to try to reachieve that stalemate than enter a discussion that arrives at 2013 borders..

Unlikely. Right there on the Ukraine invasion first target list was the blowing of the dam that stopped Ukraine water from going to Crimea.

Resource analysts would say that lack of water to Crimea was a major, perhaps the major, reason for invading. The gain of taking Crimea was almost reversed by Ukraine cutting off water supply for almost a decade.


Retreating to the 2019 situation is not an acceptable outcome either for Russia, yet it is several levels above the proposed diplomatic outcome. I.e. they can run a base with limited water and forcibly move civilians so 2013 and 2019 are different positions.

IMO the problem is worse if considered from the perspective of the user. There is no visual distinction that the chain of trust goes back to a local admin managed store and that the admin can arbitrarily trust certificates outside their proprietary domain.

It should be perfectly reasonable and probably required for an employee to be able to order reimbursed things like travel arraingements with a credit card on their org provided device, but that org may MITM any trust chain for some administrative convenience.

The org itself could cross sign with name constraints if they opt to be good, but would probably end up filing a lot of bugs in various software that can't handle it and their being good is the kind of selfless act that rarely happens without a regulatory requirement to pay for consequences of doing a MITM of your employees on the Internet.


To me, this seems like a solid tradeoff of authority.

In practice, complexity and customizability breeds ossification, because "safe" becomes the tiny sunset of common configuration.

I could definitely see network appliance vendors, IT network security admins, endpoint security vendors, etc. rapidly fucking up everything.

At least with delegation to browser vendors + certificate transparency logs, we have a semi standard path for a detrust like this to be forced without exploding the ecosystem.

Additionally, if there were more wiggle room, you'd alter the balance of power between browsers and CAs, which seems decently calibrated now.


The local admin means "the user's employer's IT department", which, for the sake of a work laptop, they implicitly trust way more than Mozilla/Microsoft/Google/Apple etc who managed the public root stores.

I don't think a lot of people have the ability to prioritize employer with an IT department in the top percentile over other factors like location, pay and willingness to hire.

Whether CA/B is good or bad at what it does, it puts about a thousand times more effort into the question of whether to install a CA certificate in the browser than a company that just bought the cheapest solution to one of its problems and wants to install the corresponding vendor certs.

For example: https://docs.umbrella.com/deployment-umbrella/docs/install-c...

How many things could be wrong with that system and cause user's traffic to be compromised web wide? What community is checking transparency logs and threatening Cisco to revoke their authority to sell that product? What would that even mean?


That sounds like a problem for the IT department, not the end user?

Sure, their proactive attitude is why credit card fraud is referred to as "organization theft".

I can imagine an organization wanting to run a CA for all kinds of reasons, and wanting to ignore some CA/B forum rules for all kinds of reasons. And, if that organization owns name.com and wants its employees to use ordinary web browsers (on corporate devices) to access resources protected by those certificates, then it seems entirely reasonable to have a *.name.com name constraint. The only problem is that browsers don’t support this.

If they understand that they are bound to respect this, why don't they add the name constraints to their CA certificate?

The problem as I see it is that whatever method used is optional and insufficient to protect users until the browser highlights the source is not real public trust. Google knows this and started with the claim they prioritize user security while ending with the work around to prioritizing user security. (And without the slightest warning that sending your users to a bunch of financial institutions using improper trust chains is ethically dubious and requires more consideration than the time it takes to click the settings.)


Name constraints have not been supported by browsers for very long. And they can’t solve this problem for private CA certificates that already exist. (Hmm, I wonder if issuing a new CA certificate with name constraints using an existing private key could be made to work.)

Sure, but that is the consequence of no consequences. It would be silly to be a quality fund when not voting or selling on risk analysis can't possibly cost an index fund more than they save.

> not voting or selling on risk analysis

I would be grateful if you could elaborate on this. Is this a strategy for a fund to make money that I don’t understand?


For farming on a forest floor, I would expect overly complex variance.. For farming in a field, why isn't the deviance you calculate between the needs of plant location 1 & 2 on a frequent basis not a reasonable estimate to update the predicted needs of one plant every time you pass over the other?

I can imagine that a lot of small devices becomes economically viable.. I find that unfortunate since I think it will be a lot of permanent ewaste lost in fields relative to very temporary water optimization benefits.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: