Hacker News new | past | comments | ask | show | jobs | submit | winternett's comments login

>Can anybody explain how this actually works?

Every answer moving forward now will contain embedded ads for Sephora, or something completely unrelated to your prompt...

That money will go into the pockets of a small group of people that claim they own shares in the company... Then the company will pull more people in who invest in it, and they'll all get profits based on continually rising monthly membership fees, for an app that stole content from social media posts and historical documents others have written without issuing credit nor compensating them.


And they'll likely drop support/updates for it quickly after release... These out of pocket devices are sunsetted faster than mobile phones, especially so because they require completely independent development teams that companies love to roll essential staff off of.

There have been so many attempts to make VR glasses that it's really not innovation at this point, it's just gimmicky throw-away pocket tech. Something far better to invent is a phone that can project on walls, or project a full-size keyboard onto a table for an easier writing experience.

Most of these companies are gutted by investors, and turned into profit machines... There are very few visionaries leading projects now, and huge hurdles with IP theft and related lawsuits that hold up most of the typical innovation, unless these companies come up with game changing ideas that focus less on pushing out ads, they're going to fail with micro-projects like this. VR glasses have been around for ages, none of what Zuckerberg demoed was revolutionary, gotta be honest about it.


So far Meta has been great about supporting Meta Quest and Oculus products.

Most of these methodologies came from the car making industry... I think if we realize that and compare making cars to the process of managing software, it's easy to adjust and manage aspects of efficiency & output.... The problem is that humans (the actual devs and process managers) are not often accounted for in the process now, as robots have taken over most of the aspects of car making, so while Agile may look ideal in many cases, the output if often not predictable when staff can quit, rebel and burn the factory down, join unions and demand more pay, or take vacations (for example).

Making software cannot be repetitive and is always novel. Commands like cp, scp, cat, git clone... made the repetition part redundant eons ago. The first magnetic tape did.

Cloning data is so low cost. Cloning a car is high cost.

It makes sense to tame the complexity and think waterfall vs. this or that but we aint building cars or houses.


I use Drupal... Although they issue way too many security & functional updates each year, it's been conveniently 100x less expensive to maintain than microservice architecture apps, and it's open source/PHP as a bonus.

Also never forget how they constantly sunset microservices in order to make everyone scramble to refactor into the new (more expensive of course) microservice under a different name... ugh...

A lot of this model is due to the churn of VC companies toxic entry into overtaking and consuming companies... They often force out old company leadership, create & impose hostile policies and requirements on employees the make them leave so that operations will be left as bare-bones and over-stressed operations that just serve to feed investor profits... Our current IT ecosystem, especially in the contracting world is run mostly by finance experts rather than tech visionaries, and it's showing in the outcomes, this is why we don't see truly disruptive inventions like Twitter and iPhones anymore... And why monthly subscriptions are swooping their way into everything, even basic tools like calculator apps, and car starters and seat heating... Foolishness & Insanity.


I always cringe whenever someone who is well tenured on managing IT projects says on a group call that "They're not really a technical person"... It's often the result of being someone's protected buddy, but let's all be serious about it all, if these people continually manage technical programs, it's a huge failure for them to not be learning the landscape and regularly work on improving their understanding of how tech works, or at the bare minimum, leaving direction to accountable people that do know tech implications.

So many of the current apps we use now have been buried in adware and bloat due to the decisions of non-visionary minds leading as product owners... Most notably with Twitter/X, and frankly, it frustrates everyone and scuttles very mission critical operations that grow to rely on tools and services that were originally created by actual tech visionaries that learned and accelerated in the art...

Also, "learning on the fly" should not be a normal practice on mission critical operations... The ideal of under-bidding contracts and under-paying employees, and even hiring tons of junior employees for mission-critical development efforts is really destroying and undermining the entire industry.

Sometimes we need to just turn down the opportunity to work in a burning bowl of spaghetti, the resulting products & services always reflect the process applied to create them, no matter how many "smart" work-arounds are created.


I can't fathom what anyone past the age of awareness would want to spend time talking to a knowingly dead audience based off of LLM=Based ai with no potential of building any sort of meaningful reputation or profit for their work, but I guess here we are...

Most of us have spent the last 4-10 years wasting our time to do that on gerry-rigged platforms because we thought they were run by ethical people, buth they pretty much were the same exact dead/empty interaction holes, so what do I know... :/


I'd make the more believable assumption that it's basically collusion between all kinds of device makers, OS makers, and software makers to transcribe voice to text that is stored in once central location on the device, then made accessible to a wide variety of apps. This is how keywords trigger ads and various content items. The EULAS that need the most scrutiny are those with device makers and OS makers, because they can deny certain access to app makers at the root of operations on devices, which they regularly dont, and they also complicate the transparency of how apps access our data and run in the background by design.

I'd assume that at major social media and software companies, this data from individual devices is accessible in almost real time, feeding a dashboard of information that only top executives can secretly monitor world-wide conversations and user activity for people that have their specific devices.

I'd also assume that this method of bootleg monitoring has been in play legally and illegally for some time now... It's far too tempting to company execs and CEOs to not get hooked on the god complex of having access to this level of data... If you think about it, imagine being able to access any photos and conversations from anyone on the planet any time you want...

Congress does nothing about it because many of them are afraid it will destroy the economy and upset the wealthy backers to these companies that fund all of them. One day long into the future, there may be a low-key class action settlement that won't change a damn thing, and lawyers will sweep up most of the paltry settlement money.

We pay thousands of dollars now for devices that spy on us, while they barely provide any means of opportunity and extra utility to us. Use black tape and cover your front camera, and leave devices at home sometimes... We're really defenseless against corporate greed and corruption though, watch what you say around tech devices now more than ever.


Writing notes only on paper in a properly secured notebook is about to make a big comeback as more and more people realize that it's fast becoming the only way to prevent AI/ML from indexing and leaking their original IP to the corporate world. Sending an email or making a social media or discord post is fast becoming the best way to snitch out your ideas to random unknown parties and IP thieves.


> snitch out your ideas

s/ideas/canaries/

https://canarytokens.org/


I have heard it is also how NSA secure their personal passwords, they keep them in a little black book because there is no scalable attack to get access to them at rest.


And because a little black book might be carried in a pocket and potentially misplaced or stolen, some teams use a system of small self-adhesive pieces of paper, each with just a single password on it, that are attached to the front of the PC. This in turn is secured by a cable lock to the desk.


I'm not and never have been NSA, but I nonetheless have a sordid past with what is arguably a related line of work. This is how I manage my passwords.

In environments where regular rotations are required, I print off a new "biscuit" via `(date ; pwgen $PWGEN_FLAGS) | lpr`. I then append to the candidate password something of a personal identifier that only I know.


It’s legal to have one login to a top classified computer and save your lower classification passwords there.

A few coworkers identified which systems allowed us to re-use passwords, fixed passwords, non expiring reset passwords, etc. warning signs with the password on the back too.


> no scalable attack

On-demand RICO says hello, https://westworld.fandom.com/wiki/RICO


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: