Hacker News new | past | comments | ask | show | jobs | submit | more zeepzeep's comments login

welcome to the real world


> In reality though I probably wouldn’t think about asking half of these questions.

"How did I get here?!" "Help me! Can anyone here understand me?"


wikipedia doesn't need the money anyways (any more money)


Bug Bytes from intigriti. When you didn't spend the entire week on Twitter, they'll show you the best parts you missed.


Pay-to-win web services, right...


I mean, that's basically what freemium is for b2b - want to unlock features that get your job done faster? pay up.


What do you think adwords is?


It's weird how the hard working people that don't like their job get paid close to nothing and the software people enjoying their jobs get rich. I'm lucky that I could turn my hobby into a well paying profession, but it's kinda weird...


One of the more compelling framings for democratic socialism to me, is the idea of taking profits from companies and using it to radically raise wages of people with "undesirable" jobs: janitors, garbage-men, warehouse workers. There's no market pressure to do so (not without unions!) but can be regulated.


universal basic income addresses this problem too, but differently and with less paperwork


Malware isn't bad, like guns, it depends on the one using it. There are legit uses, e.g. governments or simulations of real attacks.


Do we actually have any cases of governments using malware for good?

Guns aren't a great comparison because the use can (and usually is) wholly defensive or acts as a deterrent -- i.e if you are known to be armed then you'd be left alone.

Malware on the other hand is almost exclusively offensive and governments around the world almost exclusively use it for nefarious reasons (i.e NSO Group's clientele and published usages).


Also, when you use a gun against someone, be it to threat or injure, you can’t do it without making the person aware that you used this weapon against them.


Well looks like it play a role in the defense strategy from the Ukraine https://www.nytimes.com/2022/03/23/us/politics/pegasus-israe...

So maybe until now we didn't see a country with cyber in their strategy being invaded by another?


Ukraine hasn't acquired NSO Group's software (based on your article) and ultimately it's a seriously corrupt country -- the most corrupt in Europe -- and globally ranks below El Salvador, Brazil, Turkey and even Cuba. Just because it's currently facing an invasion doesn't mean the malware won't be used for nefarious purposes: i.e Ukrainian elites targeting other Ukrainians or the sitting Ukrainian government targeting opposition political parties. During conflicts we often see governments and elites from those countries trying to siphon as much as they can.

Just to drive the point: at the same time that they first requested the software (2014) the country was the biggest arms dealer for the Syrian civil war[0]. A large part of the arms they received after what happened in Crimea ended up making its way to countries like Syria[1] and it's likely a driving reason behind why the country was so ill-equipped with the current conflict. There is little doubt that the physical arms will eventually be sold off after this conflict is over, and with malware that can be copied quite easily it's likely it will be sold the moment it's acquired to any bidder that puts their hand up.

[0] https://qz.com/211603/how-ukrainian-arms-dealing-connects-to...

[1] https://www.reuters.com/article/us-ukraine-crisis-arms-insig...


Ukraines military has changed drastically since the war that started in 2014. They have made many changes, moving away from the old Soviet style system and to a more western system for the military along with upping military pay and training. I also don't think that Ukraines military is overly 'ill-equipped' but its more that its fighting an army much bigger then itself, and one so incompetent that its going through ATGM's and MANPAD's so fast that its literally impossible to keep up.


> the most corrupt in Europe

As ranked by countries and institutions in countries that rank themselves lower no doubt.


> governments around the world almost exclusively use it for nefarious reasons

Oh sure, I agree. But that's bad governments not bad lines of code.


So we need good governments, with their own malware, to fight the bad ones? Is that where this logic is going?


Nope? If the reason stated is terror, that seems like a legit reason to me.

Look I see that there is more evil than good done with this stuff, but it's not the stuffs fault.


The thing is that "terror" is an extremely vaguely defined concept, in the US there are at least 8 different, and recognized, definitions for it [0]

Nor are there usually any efficient checks&balances in place to make sure these tools are actually only used for their originally declared purpose.

That's why the mass-surveillance creep, since the Patriot Act, has been very real and for the most part completely unchecked, FISA court just rubber-stamping anything that comes their way.

In that context I'd rather see resources put towards fixing vulnerabilities, instead of leaving them open so they can be exploited by intelligence and police agencies. This approach would also prevent much more "evil" than hoping how the "good Big Brother" will not abuse his power and instead solely use the same vulnerabilities to stop the "evil" guys.

[0] https://en.wikipedia.org/wiki/Definition_of_terrorism#United...


Instead of writing a malware exploiting a bug to simulate an attack to defend against the exploit, you could have just fixed the damn thing in the first place.


> There are legit uses, e.g. governments

I'm astonished that there are so many people here that are willing to defend government use of malware.

Malware is software deliberately designed to cause devices to malfunction. Since when is it legitimate for any government to deliberately break the property of a private citizen who hasn't been convicted of any offence, without at least a court order?


It's called malware, because it IS bad.


I think nukes are a better analogy than guns. There's legitimate reasons why you might want your government to develop and own them, but there's no good reason that it should be legal for private companies or individuals to sell or buy them.


[flagged]


> On a related note: I trust Google with my data more happily than I trust the German state, for only one of those two has a history of building concentration camps.

To be fair, the German state has existed quite a lot longer than Google, so they've also had more time to build them - I think it's too early to rule out Google in that race.


>On a related note: I trust Google with my data more happily than I trust the German state, for only one of those two has a history of building concentration camps.

Do you also own stuff made in China? Like the device you posted this comment from? Because that government is actively running concentration camps right now. Where's the uproar against that? Germany has paid several times of for their mistakes.


1. If these Chinese camps are really comparable to traditional concentration camps is debatable.

2. I am unlikely to ever get into a situation in which the Chinese state has jurisdiction over me.


Until you realize that states (after a more or less transparent process) have access to data stored by private companies.


Sure, but not necessarily the same states (I honestly don't care if Bhutan gets access to my emails - I have no beef with them, and I am unlikely to ever be in their sphere of influence), and not necessarily with no real oversight that something like Finfisher brings.


> I trust Google with my data

That's not true. That is, you know that Google is using your data themselves for psychological exploitation in marketing, and also passing it on / making it accessible to US intelligence agencies. So, what you're actually saying is that you don't care about the misuse of your data.


> I think the original use case was just terrorism but I'm pretty sure it's been used against other crimes as well.

As with every dystopic "anti-terror" measurement, this is correct.


This is somehow such a difficult thing for people to grasp. "Yes the government gained the power to reach into our bank accounts, but it was for a good reason. I'm sure neither this nor any future government will ever abuse that power or mislay information they now have access to."


I feel like this could run on donations.

I signup, search a product and a day/week later get a mail "Did X Help? If so, care to donate a few dollar for the info we generated for you? If not, try Y, 7 studies have shown it works better than X in some cases."


> will have to be decrypted inside those platforms.

Only on the client.

> (IP protected) algorithm.

I hope that they do not use some secret IP protected crypto algo...


Well perhaps not a super secret algo. But perhaps not something standard either. Something strong than a norm. Might have interesting SALTS, or something like that.


This is quite simply not something you can expect. If any part of it needs to remain secret, it is not strong.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: