For the best experience on desktop, install the Chrome extension to track your reading on news.ycombinator.com
Hacker Newsnew | past | comments | ask | show | jobs | submit | history | more ericfrederich's commentsregister

Wait until you realize that "giving up the decently sized ecosystem of Powershell libraries" is a net positive ;-)


Would be nice if the "obscure in URL" feature wouldn't show the text in the textbox when you send it to someone.


Good idea! I've gone ahead and implemented this feature: if "obscure in URL" is turned on, the text won't be visible unless you focus on the textbox (e.g. to edit it).


Well noticed. Good point ...

(Or an additional "Obscure in textbox" checkbox or something along those lines ...)


Dude, let's fix spam callers first that are calling my USA number from a USA number.

This shouldn't be hard. If we can't fix that then good luck tracking down bad actors on the interwebs


I've nearly given up on my phone as a device for making calls because of this.


I came on here looking for an article about all of the network issues last night streaming the game. Couldn't find one so I'll rant here in the comments ;-).

In my neighborhood we have 3 ISPs but one is only just recently available (Google Fiber) so there's not many on it as we already have Spectrum and AT&T fiber available. Lots of people complaining across different streaming services (YouTube TV, Hulu, Paramount+, etc) and also across different internet providers (Spectrum and AT&T... just 1 data point for Google Fiber). Lots of buffering, scaling down to extremely low bitrates where you couldn't even make out how many timeouts were left and could barely make out the score.

Sending each customer their own bespoke video stream works fine for movies and shows, but apparently works terribly for popular live events.

Some sort of multicast solution would fix this... but then theres DRM.



Never seen this warning from Windows before. Happened when I tried to download this .msi

Windows protected your PC Microsoft Defender SmartScreen prevented an unrecognized app from starting. Running this app might put your PC at risk.

App: Bespoke-Windows.msi Publisher: Unknown publisher


It's quite a common sight if you often download installers from smaller publishers. On MacOs you get similar warnings (even though Mac "notarization"[1] works differently compared to Windows certification[2]) Obviously it's up to you if you want to consider the application trusted or not. My rule of thumb for open source projects is that I trust them if they have lots of "stars", and Bespoke has 1.2k https://github.com/awwbees/BespokeSynth/

(but I'm not suggesting you follow the same rule, I'm not responsible for anything that happens etc. etc.)

[1] https://developer.apple.com/developer-id/

[2] https://docs.microsoft.com/en-us/windows/win32/win_cert/wind...

(edit: added links to Mac notarizing / Windows certification guides)


How about after load, that tab automatically goes completely offline. Users can manually do this in Chrome on a tab by tab basis by using developer console and setting Throttling to "Offline"


That sounds more promising. The site might be able to store data and then send it the next time the page is loaded. I think at the end of the day, a malicious dev could probably find a workaround to most implementations. Might just be better to vet out sites and use reputation to state they are truly offline.


I hear what you're saying, but I also believe this to be a solvable problem


Note that the "offline" mode in devtools doesn't kill any websocket connections. It may have other holes i'm not aware of also.


I had a co-worker who played minesweeper all day long on his Linux workstation which I had remote access to. I grabbed the source code for the exact version of gnome-mines he was using and compiled my own version with some back doors. I would also launch an xvnc server so I could see him playing from my desk. Sometimes I'd have people over at my desk watching him play. It was hilarious.

I could enable various features while the game was playing. Features included: * Always lose on first click * Always win on first click * Force a guess in all 4 corners... so even if played perfectly he'd have to make 4 guesses. * Load custom designs from text file. For instance I had some that spelled things out. * Every click would be completely surrounded by mines (i.e. the number 8) until half the mines were exhausted. This one was fun because I remember him not believing it and actually clicking on a mine. * Ridiculous sounds when he won or lost


It sounds to me like you installed spyware on your coworkers computer. What kind of company were you working at where people see this as a joke instead of a security breach? And let's not forget the trust coworkers have in you not to fuck with their machines.


Sometimes, it's okay to play practical jokes on your friends.


A practical joke, especially in a work environment, should be good-natured and harmless. I think the screen recording aspect of this joke crosses that line. Every other aspect would make for a good prank, but there is just too much potential downside to watching their screen without them knowing. Even if OP didn't see anything but the Minesweeper games and the coworker has no legal expectation of privacy on a work computer, it still violates that person's trust and their likely assumed level of privacy.


"coworker has no legal expectation of privacy on a work computer"

That does rather vary by country - Germany has some strict rules about what employers can and can't monitor.

Also, some organisations explicitly choose not to monitor computer usage too closely (e.g. by using proxies that intercept HTTPS traffic) out of the fear that this would expose the organisation to greater liabilities in the case that someone was doing personal banking from their work PC.


One of the fun things that happens with HTTPS proxies is people desire a policy that only spies on some things people do, and the people making these middleboxes (who are concerned first and foremost with selling a product not with whether that product works or even if such a product could in principle work) are eager to offer that.

This can't work, but, having sold it/ bought it then there's a lot of pressure to make it work.

The best case scenario with such products is that some fraction of traffic is unmolested but the product owner policies do not actually control what that traffic is (which might surprise them and make their overall security policies ineffective but otherwise is no big deal)

The worst case is that in the attempt to do this "selective proxying" some or all traffic security is compromised. Non-participants aren't affected (except it might introduce denial of service) but active participants give up potentially all security. e.g. the company laptop that's configured to the trust the MITM proxy, might not only be uploading your bank password to some screen accessible by an entry level IT guy it might also just inadvertently remove the security of the bank connection altogether so that now random bad guys on the Internet can see everything, whoops.


Spyware is not a prank. Let's not come up with vague definitions of what is, and isn't acceptable.

Coworker has remote access to other coworkers machine and is abusing this trust to install spyware, setting a president for other "jokes".

Sorry man, I don't see anything funny here.


>president for other "jokes"

CJO in modern terms.


You must be fun at parties.


He is probably fun at parties and not undermining his colleagues trust at work.


I might agree with you if the modified Minesweeper did anything more than (if I read correctly) allow OP only to view and modify that game alone, and only when the worker was actually playing it

Nothing was seen that couldn't be seen by shoulder-surfing.


I've been in both kinds of cultures: ones where these kinds of shenanigans were common, and ones where, if HR or IT found out, you'd find your key card deactivated, and a box of your things shipped home.

As ridiculous as it sounds to someone in either camp, both were okay.

The former was an organization where everyone fundamentally trusted each other, and the concept of anyone doing anything really wrong was just foreign. It's so dissimilar to most business in tech today (which are either trillion-dollar megacorps, or places where people jump jobs every 3 years). This was an organization where people stuck around for decades, and everyone really knew each other. Doors weren't locked, and everyone had access to everything. It worked well.

The latter is like most of the tech industry today. My machine is private, and if you've hacked my minesweeper, I'm going to reinstall my OS. I don't know you well enough to know you didn't root my machine or steal my personal files. I'm also talking to HR since you shouldn't work here.


I think that's the right way to view it. People are viewing this through the lens of their current employment, but that's assuming a lot. I did something somewhat similar (in type, if not scope) when I was young and in tech support. The notable facts at the time were that a) we were friends, b) the computers were customized by us, but for the most part interchangeable because a web browser was the software needed, which allowed us to install Linux if we wanted, and c) I didn't really hack it as much as use an admin account he gave me to help in do something on his box.

Friendship comes fast when you're in your early 20's and there's lots of free time to screw around. It's twenty years later now, and I probably wouldn't do that to any of my coworkers. I probably would do it to any of my siblings though. How invasive you can get away with a prank being without upsetting the person targeted is largely based on trust.

When I pranked my friend, the company we were at had probably 30 people working for it, and there were maybe 16 of us in tech support total. It's easy to trust others when you're such a small group, because you can actually know most the people you work with. If your company employs even hundreds of people, that's much harder to do.


> Ridiculous sounds when he won or lost

You could really give someone some good experiences with that. A game that it artificially seems like you narrowly escape disaster turn after turn can feel great at the end.


Is the company you "work" at hiring? ;)


This reminds me of a prank i played on a classmate in high school. I snuck a "ver.com" command onto his boot floppy (the real "ver" was a builtin DOS command) that installed a TSR (remember those?).

We had a very simple custom serial bus network back then. It was sufficient to allow me to send a command to his PC to show a fake game screen when the teacher was looking at his PC. A fun exercise in x86 assembly (fun for me at least)!


I didn't install anything per se, but gained access to my colleague's machine remotely and would play very subtle audio messages in his headphones whilst he was listening to music. Was amusing to watch his facial expressions. I also messed with the volume every now and then and once went a bit crazy and he sussed it out.


As a consultant, I once did a two-day gig at a client site installing some software on a Sun workstation. It was very unsettling when the "restaurant scene" from "When Harry met Sally" started streaming out from the workstation speakers.


I hope the client fired your company.


That would have been something!

I was on a client-provided workstation, and it was the client project manager (!) who played the sound clip on my workstation.

I believe this was not their first rodeo, but it was embarrassing as he??. And I don't even think we fired the customer!


Can you open source this version?


This sounds awesome. Also what kind of workplace was this and did he ever find out?


Did he ever figure out why these "features" happen to him?


So this seems similar to an IR (impulse response) where you get a snapshot of an amp mic'd up in a room with knobs fixed at a particular position. In the end, you don't get knobs to fiddle with.

Awesome, I'd love to hear Josh from JHS Pedal's opinion on this.


This is even more impressive since regular IRs can't duplicate the distortion effect itself, only the frequency response


What is the difference between "distortion itself" and "only the frequency response"? Are you saying the phase response is important?


Impulse responses can only represent linear time-invariant systems. Like delays, reverbs, equalization curves.

Distortion is non-linear, it is something like a max(-1, min(1, input)) function (a waveshaper, like you said), and it produces harmonics when applied to audio signals.

However guitar pedals also have some additional circuitry to "sweeten" the distortion, removing the extra harmonics added by the clipping diodes. Tubescreamers are notable for cutting bass and enhancing mids. An IR is able to capture this. This is important for guitar pedals, and the reason multiple of them exist.

If you capture the impulse response of an overdrive pedal you'll be capturing only the frequency response of a distorted impulse. If you process clean guitar trough this you'll simulate the frequency response but not the distortion itself, so it will just be a clean guitar with a tinny, shrill, sound, not an overdriven guitar sound.

One way around it (other than the idea in this article!) is doing multiple passes of Impulse Response capture with different amplitudes, this will capture this distortion non-linearity. This is supposedly how a Kemper Profiler works.


Written in Python2.7 which had its end of life in January


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search:

HN For You