Hacker Newsnew | past | comments | ask | show | jobs | submit | artemisbot's commentslogin

If you actually sat and read it, you'd see that it's a piece of software that sits on each device connected to the USB switch and detects the USB disconnect/reconnect events which trigger when the USB switch is triggered and uses them to detect that the device should try to take control of the display devices.


> If you actually sat and read it, you'd see that

Without this phrase, your comment would be far friendlier and also not break the HN guidelines.


I sat and read it and I had the same confusion. I've used a KVM before, but never knew that was some version of a KVM without the "V" called a USB switch. It seems like that peripheral must be less common than both USB hubs and real KVMs.


The “$30 switch” part lead me into thinking it’ll be about controlling some specific hardware in undocumented ways.

A project about cooperatively switching display inputs to get rid of a video switcher should say so in the title.


Not being able to figure out what it does is reasonable if they have no idea what KVM or a USB switch is.


They have a playlist on Amazon Music called +44 for “the best” in British music (I beg to differ) but it seems that’s what the trademark covers[1].

- [1] https://uspto.report/TM/88838455


+44 Curated by Amazon's Music Experts

No Beatles, no floyd, no spice girls.


British copyright law states that books enter the public domain 70 years after the author's death, in this case, 1954. So hopefully in a few years it'll be accessible.


Oh. In Canada it’s only 50 years.

Well, I guess we’ll have to wait until 2024 then. Unless maybe it was published locally in one of those countries like Canada with a shorter term.... but that seems doubtful given the limited availability in public libraries.


I'd be careful trusting anything being piped from Andy Ngo, he has a history of being affiliated with, and giving preferential coverage to some pretty nasty far-right groups [1].

[1]: https://www.rollingstone.com/culture/culture-features/andy-n...


>I'd be careful trusting anything being piped from Andy Ngo

This is supposed to prove that hundreds of videos posted there (many of which are sourced and attributed) are all fake? This sort of ad-hominem nonsense is getting beyond ridiculous.


I've been contributing on and off to the project since it went open source (#4 on that page), it's an interesting experience communicating with blank faces that you can't know or find anything about.

Unrelated: About a year in they sent me an award[0] for continued contributions, but there's a puzzle on it I'm yet to solve; if anyone runs across this I'd appreciate any input!

[0] https://twitter.com/mattnotmitt/status/1031456040385236992


Nope, they all use gmail addresses - I contribute a bit to this project so I've sent a few emails back and forth.


I've been on a bit of a Michael Lewis binge myself recently, just finishing his book "The Undoing Project" - would definitely recommend if you're even tangentially interested in human psychology. It's a great introduction into why we make errors on a cognitive level and is a great follow-up to some of the concepts discussed in Moneyball.


This article was actually written by the same guy from the Tickled documentary.


Not OP, but my dad was in a similar situation to yourself - when I was 12 he bought me an Arduino kit for Christmas and we spent the holidays building projects together. When I was 13-14 he started taking my sister and I to CoderDojos. I'm not saying this will work for every kid and I was nowhere near as advanced as this guy at his age but it has given me a what seems to be a great career path post-university and a good background in open-source software.


It's going to be an open source release so depending on your paranoia levels you could just build it yourself.


You'd have to audit the source code first, though, which is not a trivial thing to do.


But you can bet there will be plenty of people looking at it, and that group of people will also likely include security professionals looking to use it. I'm not sure I can honestly think of a stupider move in this area than to include nefarious code in an open source security auditing tool aimed at the highest and most complex levels of security auditing and used by professionals whose job it is to find and announce these things.

That doesn't mean assume nothing's wrong, but I'm pretty sure this thing will have some pretty talented people looking at it fairly early just for kicks, so of things to worry about, this isn't high on my list.


Given the audience I feel like the source code will be audited by the community in record time.


I don't get the criticism here, you're right on the money. What's the one group of people absolutely guaranteed to

a) audit a tool like this and

b) have the chops to perform that audit

Reverse engineers. If you're nervous, just wait 2 months and follow Twitter.


exactly my point. When they released SELinux this was the argument and how many lines of code does an OS have?


Lines of code is not a great metric to equate to the effort of auditing the code.

Harder to meter: how understandable is the code? More verbose, but more easily understandable code will be far easier to audit.

Personally, I'd rather a million lines of code that are clear and obvious than 500k that are obtuse, terse and/or obfuscated.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: