nyxxie | 5 years ago | on: PC games are fighting a new surge of cheaters and hackers
nyxxie's comments
nyxxie | 6 years ago | on: Tanka: Our way of deploying to Kubernetes
There is a bit of a movement, however, behind using it to deploy software by pairing it with Packer. You use Packer to create an e.g. AMI whose sole job it is to run your software (like a Docker container) then use Terraform to launch a bunch of EC2 instances that have juuuust enough resources to effectively run your software. That'd allow you to eliminate k8s from your stack, though it remains to be seen which stack would be more cost-efficient to run on.
nyxxie | 6 years ago | on: Ask HN: Solo devs, how do you plan your development?
Generally I put all features, ideas, bugs, etc into small granular issues that I can ideally complete in a day or two. I’ll group them into milestones representing high level goals (“implement video editor”, “v1.1 release”, etc) and then prioritize issues accordingly into a kanban dashboard.
I find that this method takes little extra time and lets me separate my development brain from my project management brain. I can come up with high level design and compose goals, then start hacking away later in tiny sprints without needing to think too much about how things fit together. Issue comments are also great places to record ideas when you’re e.g. at a bar with friends and have a sudden breakthrough that you want to jot down.
Most importantly though it helps with motivation, since it’s usually much easier to pick up my laptop knowing I’ll be able to achieve something that day rather than making incremental progress towards a larger goal.
nyxxie | 6 years ago | on: Networking Guides for Linux Sysadmins
nyxxie | 6 years ago | on: I asked my students to turn in their cell phones and write about it
I don’t think this is a very charitable interpretation of what GP was trying to say. Of course you can’t get by being a blind conduit of Google’d/Wikipedia’d/etc information, but you certainly don’t need to (and probably can’t) cram everything you need into your memory for instant recall on demand.
How about a middle ground: memory can be thought more like an LFU cache, where “use” is defined as reliance on explicit details of a concept. For example, I rely daily on programming language syntax and best practices and therefore have them deeply embedded in my mental cache. Other knowledge however, like sorting algorithm implementations, I rarely utilize and probably won’t remember after the next time I’m quizzed on it in e.g. an interview or conversation with someone where I’m trying to sound smart (cache miss).
In many cases where I suspect that I’ll frequently encounter cache misses with a particular piece of knowledge , I often find it better to just cache high level details (useful properties of sorting algorithms) and Google the missing details. That or work with subject matter experts.
nyxxie | 6 years ago | on: Google claims copyright on employee side projects
Not only is it unfair for these companies to leverage their power to try and claim ownership over side projects, but they're actively shooting themselves in the foot by discouraging a massive and free source of continuous education for their employees.
nyxxie | 6 years ago | on: Ask HN: What are you thankful for?
nyxxie | 6 years ago | on: Go master Lee Se-dol says he quits, unable to win over AI Go players
nyxxie | 6 years ago | on: Vinod Khosla Wins Ruling Threatening Public Beach Access
> To what benefit to ones self can you possibly point? I worry that tolerating the entitlement of the many over the rights of the few will result in a degrading of those rights. It's this dude's beach today, what about a website that I suddenly charge for tomorrow? Or hey, lets be realistic here, what about my future beach when that aforementioned website makes me my billions :)
nyxxie | 6 years ago | on: Science Vigilante Calls Out Bogus Results in Prestigious Journals
nyxxie | 6 years ago | on: Adding Client-Side Scanning Breaks End-to-End Encryption
1.) Simple alteration (change a pixel in MS paint) or encryption of content bypasses the filter 2.) Patching out the filtering routine bypasses the filter 3.) Blocking the phone-home address (pihole, router firewall, etc) bypasses any reporting 4.) Any vulnerability in the future that allows an attacker to report arbitrary clients (disclosure of client IDs, weakness in app, weakness in server) renders evidence gathered by the system unreliable.
At best clientside filtering allows you to draw relationship maps of technically incompetent perverts who might possibly be sharing CP. What harm reduction are they trying to get out of that?? Why not just refocus efforts on catching the small minority of individuals who are actually producing this content??
But hey, if these garbage clientside filtering of image uploads is enough security theatre to keep governments satisfied, I say let them have it.
malwrar | 6 years ago | on: Kickstarter’s Year of Turmoil
If you’re going to allow your employee’s controversial political opinions to guide corporate policy, I’d argue it’s unethical to build a culture in which disagreement is not permitted. A substantial number of people disagree with these policies and want to debate them, you can’t just dismiss those people as having wrong ideas and push forward patting yourself on the back for being the ethical good guy.
nyxxie | 6 years ago | on: What is the new Apple U1 chip?
Interesting. Will this thing be always on and broadcasting my phone's precise location? Seems like a rather privacy-sensitive feature.
nyxxie | 6 years ago | on: M.I.T. Media Lab concealed its relationship with Jeffrey Epstein
I think you're putting words in his mouth. He doesn't want to see no consequences whatsoever for those who were involved with Epstein, GP argues that people are drawing arbitrary boundaries with no clear repeatable definition and then taking action on them. He wants to understand what precisely being "tainted" entails and why a particular definition is deserving of the consequences such a label entails. In other words, he rejects arbitrary and subjective persecution for an objective approach to justice.
malwrar | 6 years ago | on: A Gambler Who Cracked the Horse-Racing Code (2018)
Hell, I’ll bite here and assert the same as my parent comment: the folks who dumped their life savings into crypto made a personal choice. I fail to see how the rest of the market bears responsibility to those who lost their “investment”. So long as everyone is playing by the same rules, there’s no way you should be ethically responsible from benefiting from other’s losses.
You signed up for the risk when you chose to play. Do you believe that if I dump my money in a stock and it tanks, investors who benefit from that are now responsible for the money I’ve lost?
malwrar | 6 years ago | on: A Gambler Who Cracked the Horse-Racing Code (2018)
Gamblers are making a personal choice to bet their money, other gamblers should not be made to bear responsibility if that gambler’s choice turns out to be a poor one. Gambling addicts obviously exist, but they are playing the same game everyone else is. If you want to protect addicts from harming their finances, change the rules to accommodate that goal (betting limits, credit/finance checks, outright banning of gambling) rather than expect other gamblers to follow undefined rules that may or may not protect other gamblers from themselves.
nyxxie | 6 years ago | on: A Telegram bug that disclose phone numbers of any users in public groups
Point being, if "who is using signal" is a question you want answered, it's far more trivial than having to acquire actual devices. Your oppressive regime could go from zero to black bag list in an afternoon.
malwrar | 6 years ago | on: CyberChef – Cyber Swiss Army Knife
https://github.com/gchq/CyberChef/wiki/Automatic-detection-o...
This is REALLY cool. Basically given an unknown string or file from something CTF-y you can run this tool on it to look for low-hanging fruit like it being e.g. base64 encoded.
nyxxie | 6 years ago | on: Parsing JSON Is a Minefield (2018)
If I want to perform some rough tests of an endpoint during development, all I need to do is compose the json request and fire it off using curl. The response then comes back in a human readable format I can parse straight from the terminal. Boom, simple test conducted in less than 1 minute. I don't even need to think about it.
Compare that to protobufs; I need to create a custom client or unit test that'll compose and fire off the request I want to test, then I need to write a bunch of code that will introspect the contents of the response so I can pick out the details. Huge time loss, concentration ruined since I need to actually think about the process, I'd rather just take the extra latency that using json will incur.
This skips past all of the other advantages json has over binary serialization protocols, like quickly being able to parse requests while debugging issues, infinite client language support, ease of sharing breaking requests to help devs reproduce problems, not needing to add an extra compilation step to my deployments and packages, etc.
nyxxie | 6 years ago | on: Google Plans to Deprecate FTP URL Support in Chrome
They've added obfuscation, that's about it. Even one of the guys the author interviews admits it:
> “Last year, we spent time working on various measures to block cheat programs,” explains Taeseok Jang, executive producer of PUBG PC. “Most of these actions focused on blocking cheat program developers to make it more difficult for them to create these highly lucrative cheats.”
That obfuscation was probably a huge problem when PUBG initially started adding it, but so long as some bored high school kid has a pirated copy of IDA and a desire to prove themselves, that info is going to end up online. Each new obfuscation feature or anticheat detection becomes a challenge, and the results of that challenge being inevitably solved are inevitably posted in a public and high-visibility place for others to learn from and use.
All of this public information meant that creating a cheat for the game probably added around a month or two of work to adapt to the cheat prevention efforts, on top of the month or so that I spent looking for the actual in-game structures necessary to implement the radar I was going for. I already expected every hindrance I encountered when reversing the game and writing the tooling to interact with the game's process. It was still daunting, especially since I had never touched the windows kernel until this project, but ultimately when I ended up getting everything working it felt like I was just using the same techniques I used to use back in the day only with extra steps.
My takeaways for anyone interested in preventing videogames from being cheated in: