Hacker Newsnew | past | comments | ask | show | jobs | submit | dchest's commentslogin

Colin, if I remember correctly, you first ran Tarsnap servers on Ubuntu before you made FreeBSD work on EC2. At what point were you confident enough to switch to FreeBSD?

I think cc1.4xlarge was the first instance I ran the Tarsnap service on. Being HVM made me far more confident -- PV dramatically increases the risk of VM/paging bugs, which is exactly the way to get silent data corruption.

So... I'd have to check my notes to be sure but I think fall 2011?


They are a marketplace for model providers, which is quite a nice business model.

Being the middleman is always nice until the need is obviated. My understanding is that this is largely used to cycle through free usage tiers without getting rate-limited. Anonymous Credentials is designed to end that.

What makes this preferable to a self hosted or framework built-in version?

https://blog.dock.io/anonymous-credentials/


Convenience. They sell very convenient shovels in a goldrush.


> Traffic encryption with 2048-bit TLS, the successor to SSL

With 65537 exponent, the successor to 3.


I just downloaded the ODS version and it comes with .pdf extension, had to rename it. It also uses Aptos Narrow font (from MS Office), which gets substituted.


Note that this isn't a study of actual workplaces, it's based on cognitive tests, so "bad at their jobs" may be a stretch. For example, "overconfidence in one's intellectual and analytic abilities" may be good for business, e.g. when dealing with US government contracts in 2026.


Yes, it can -- to all questions.


8 GB M1 MacBook Air does support Apple Intelligence.


Yes it does. I was clarifying what the commenter was saying; not making his statement myself.

akmarinov said their M1 doesn't support apple intelligence but they still think it's plenty usable; jasongill thought akmarinov was referring to the Neo and responded that the Macbook Neo does in fact support Apple intelligence; and I clarified what I think akmarinov intended to say.


correct, I thought he meant that the Neo does not support it, since his M1 Macbook does support Apple Intelligence but perhaps he's not aware of that or hasn't updated yet.


You are correct i indeed thought that you need at least 16 GB to support Apple Intelligence and I thought Neo doesn’t support it.

I stand corrected.


How is _your_ supply chain a concern of this open source developer?


_My_ supply chain is not a big deal, lol. But this is HTTPX. A network library that has a considerable number of users.

When I say _considerable_, I'm essentially saying _nearly every_ big tech. The one I can tell for sure is OpenAI (not a fan of them though).

Remember xz attack?


Why can nearly every big tech take care of their supply chain? :)

Clearly, the maintainer doesn't want to do this job anymore, and it's not a requirement when releasing your code to also do stuff unrelated to programming.


The parent poster never said it was. They just claimed it's risky for them which I agree with


Nothing in this post is specific to passkeys; it reads like advice to not encrypt data. There’s no way to prevent some users from losing their encryption key anyway. Whatever warnings you include, even when software doesn't connect to the internet and just encrypts local files, someone will write to support that they forgot their password and ask you to "reset" it.

Good advice at the end, though.


The issue I think is that passkey managers don’t make it clear that deleting a passkey can cause permanent data loss


Because passkey managers have no idea what a service is using its passkey for. They could warn that deleting a passkey could make all sort of bad things happen, but for most services it will be only the loss of access. What the alternative could be? "Before deleting this passkey you must contact this site and ask them what data you will loose. I give you a week. Come back here a week from now and confirm your desire to delete this passkey. I will not make you delete it before that day. See you!"


yeah I feel like metadata could be attached to the passkey so the manager could surface the info


While I in theory would love this idea, attaching arbitrary metadata to something and expecting a manager to somewhat "nicely" figure out some text to display for it is just not really scalable unless you limit what those fields can be set to. Mainly cuz just displaying keywords isn't exactly user friendly and having anything longer will also need to get translated for all/most/some languages they manager supports.


There's a big difference between being kept in the dark and being informed but careless.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: