For the best experience on desktop, install the Chrome extension to track your reading on news.ycombinator.com
Hacker Newsnew | past | comments | ask | show | jobs | submit | history | more anyzen's commentsregister

Interesting question! I would assume that some invoice must be generated, but it can be in electronic form (e-mail). Getting this right internationally is still a major problem as far as I'm aware, but would love to know if there is a (cheap enough) service that solves it...


Off topic, but maybe you should try Firefox for Android? I have it on mobile (with uMatrix admittedly) and it hasn't crashed on me for ages...


It is OK, my phone is really old and not suitable for surfing the Internet. Thanks though!


No, but I am curious too - that would be a nice idea to kick-start a distributed social network imho.


Opera had something called Unite just before it went under; it was a web-server that ran on the browser and allowed you to connect to friends p2p for sharing, etc., it wasn't quite there but it had the concept of the 'net as _the_ social network without intermediates.

I was really excited by the concept and thought we were on track to have "the next Facebook". Primarily it needed caching to handle self-hosted content not being always on.

Still hopeful we can move on that direction so we can self-host and publish to different platforms, etc..


Or invitation links (with auth tokens).


A secret is only a secret when only one person knows.


This doesn't make sense to me. Ok, so I understand that it is time consuming to take the first measurement, but I would assume that the first bra would be expensive, but all the next ones would be much cheaper (if it's the same model) or getting cheaper and cheaper with each order. What am I missing?


As the article says, they're all custom-fabricated to match the exact dimensions of a specific person. These are one-off, custom bras. There's little economy of scale possible.


It sounds like the plan is to eventually automate fabrication in order to achieve such economies of scale; that they're currently doing it manually in part because they didn't yet have enough information to properly automate.


Am I missing something? Google gives me the creeps as much as it does to any sane person, but if I understand correctly, DDG is comparing just the variation of results on each page. This doesn't mean that you're still in the (same) bubble when you log out.

How about comparing the logged-in data with logged-out / private tab data? Did they find these two sets related? If not, G could be just implementing some sort of A/B testing on grand scale (learning from clicks and making search algorithm better).


Sure - but do you? Does anyone?

EDIT: a better solution would be if the store itself allowed you to inspect the source that went into building the plugin. Then you would only need to trust the store itself, which you already do (when you trust the browser).


It's quite common among many groups of people to download and install locally as it also protects you from unwanted automatic updates. For instance, those using MetaMask or Scatter to interact with a blockchain are often advised to install the extension offline.


I have yet to meet a person who did it though. Though I'll admit that the argument against automatic updates is a good one..


> the store itself allowed you to inspect the source that went into building the plugin

Or at least build it from the source code, like F-Droid.


Not sure if I understand this correctly, but the attacker's JS must load the pages in question to see if they are in cache, right?

Wouldn't that put also them in cache, which means that next time this technique is used it will not work? Even more, there is now plausible deniability: "I never saw these pages, I guess some JS must have been snooping around and put them to my cache..."

And the logical workaround is disabling cache, which helps fight against other tracking techniques too.

All in all, this doesn't sound so worrying. Unless I missing something?


> And the logical workaround is disabling cache,...

The attack uses the CPU cache, not the browser cache.


Thank you for the clarification!


Fun fact: JavaScript is fast enough to muck around with cpu caches if you know how.


Execute better. It depends on the idea what this means, but in general your product should be a better choice for the customer than the competitor's. You probably won't be able to achieve that for all customers, but the more you convince you are better for them, the more market share you will have.


No need to decrypt SSL, there are easier ways: https://xkcd.com/538/


Or do like Uzbekistan has done, force all local computer stores to install a trusted root CA in the operating system before it gets to the hand of the end user. You can transparently MITM TLS1.2 if the system trusts the mitm operator CA. Maybe 0.01% of people even know where to look to examine their windows 10 machine's trusted CA list.


Having looked through the government CAs in preinstalled CA lists, I'm a little surprised Uzbekistan doesn't qualify.


Naturally! Well - except for the diplomatic disaster this would turn into if you did it on foreigners.

I think most people exaggerate the technical capabilities of the Chinese government and how interesting they are for them. Sure, we shouldn't be naive, but a drop of realism is always good.


The difference is in the degree! I don't think the Chinese could or would decrypt all foreigners traffic (and I did mean TLS but use the more well-known SSL name) but if the question is "As someone with a trip to Beijing on the horizon, aside from using a VPN, are there any other best practices to keep data secure while traveling there?", the answer is very clearly don't connect to the internet.

I don't know the person who asked the question, whether he is a realistic government target or just some normal person but there are enough reports of cache poisoning, VPN control/blocking and Chinese hijinks to know that if you are worried about them, don't connect. Mind you, the same fear applies to the US and UK as well.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search:

HN For You