Hacker Newsnew | past | comments | ask | show | jobs | submit | KyleBerezin's commentslogin

I think the protocol is actually pretty open, and can be hooked into without them. I may be wrong though, I read into how it worked years ago.

In theory it is, but as of now you can't actually use any provider other than bluesky

This makes no sense to me. Bluetooth headphones are mostly a receiver and transmit very little. I am very skeptical about these findings.

Mine have a microphone.

Maybe it's having a computer and battery next to sensitive glands that's causing the growths.


For whatever reason, gpt-5 writes java code like it is 1995. I think it was trained on decompiled code.


Yea, cost. It was supposed to be installed on the Zumwalt, with a guided 155mm cannon as an interim, also with the goal to be cheaper than missiles. Unfortunately both ended up being more expensive than missiles. Replacing the rails isn't something that can be done quickly or cheaply.

It is kinda comparable to hypersonic missiles in that it can penetrate air defense, but that is about the only overlap, the railgun is long range for a gun, but nothing compared to something like a hypersonic missile.


Only guessing here but I figure a railgun might be better suited to defense than offense given its range. Then again, it would only be useful against large, relatively slower targets (i.e. not a hypersonic missile).


It has been pitched for that, certainly, but without a guided projectile, it is fantasy.


Nothing from what I understand. The issue is material science. The rails have a very short life unless fired at far less than full power.


Well put. I think both the NYT and this blog post are stretching for conclusions.


IAEA inspections verify your claimed inventory and enrichment facilities. They are trying to detect if any nuclear materials are being skimmed/diverted. As for weapons, nuclear fuel is very low enrichment (usually under 5%). Iran surpassed 60%, which has no peaceful use, so that is why it was said they were perusing weapons.


Hey, I just decided to run a DNS server and a couple of web services on my lan from a raspberry pi over the weekend. I used Nginx for the reverse proxy so all of the services could be addressable without port numbers. It was very easy to set up, it's funny how when you learn something new, you start seeing it all over the place.


That's a great exercise in self-hosting. Nginx is definitely everywhere - probably 95%+ of SaaS and websites you hit are running it somewhere.


I find myself thinking "wow, what an obvious bug. How did Microsoft not catch that?" but then I think back to some of my own extremely obvious bugs. Thankfully my code is much lower impact.


I still think of the lessons learned from a root traverse bug I accidentally coded into one of our internal apps as a jr dev.

You could change the URL of the image, and get any file off the system to download as long as the service account had read access.

Invaluable XP, and really glad everything was behind AD authentication and internal users were trustworthy enough and operating in a network isolated context.


Yeah, having learnt very similar (if not the same) lessons myself the hard way I see great value in being able to fail badly, but with low stakes. I catch loads of bugs like these from jrs before they hit prod but I don't feel like they're learning the fundamentals of security like trust, sanitising inputs, least privilege etc.


sounds like how wordpress used to be. could explore all the folders and get any file of site with something like website.com/content/2010/


That would be an incorrectly configured http server. Not wordpress.

Things used to be distributed with .htaccess files, but only apache uses them and so that got offloaded on "blame the admin for not following documentation." Forgetting that nobody ever adds such to the docs.


> That would be an incorrectly configured http server. Not wordpress.

Nah, it's WordPress, or more specifically: the sorry state of its community plugins.


Or more likely, regardless of intentions, they will accidentally let it fall into a bad actors hands.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: