written | 8 years ago
written's comments
written | 8 years ago
If I'm responding to e-mail from their users, I expect at least my initial response will get through. You really don't need any fancy crap like DKIM/SPF/nice IP addresses database/AI/bayes/etc. in this case to make the decision if e-mail is legitimate.
All my responses contain randomly generated ID of the message I'm responding to that nobody else than the sender and the intended recipient (me) can know. If it matches one of the e-mails their user sent me, say within a reasonable timeframe, and it's a first response or so, it is almost certainly genuine.
It just shows how little they give a crap about their own users, if they don't make such a simple check to make sure that their users can get responses to all sent emails.
Instead of making e-mail work, they're inventing bullshit like this new "expiring email" thing and making redesigns nobody asks for.
written | 8 years ago
written | 8 years ago
written | 8 years ago
written | 8 years ago
written | 8 years ago
written | 8 years ago
I guess we can make it at home if need be.
written | 8 years ago
written | 8 years ago
It's meaningless number in isolation. For example if backpage.com captured 70% of the sex ads market, I'd expect it to also capture the sex ads related crime at the similar rate.
If craigslist has 90% of ads for selling beanie babies, it will also have a hand in significant majority of beanie babies selling related crime.
So the question should be how big backapage was when it came to sex work ads, to make sense of this number.
written | 8 years ago
written | 8 years ago
written | 8 years ago
written | 8 years ago
written | 8 years ago
Perhaps it recognizes that being annoyed and a willful breaking of rules are also human qualities.
written | 8 years ago
Good source of reasonable randomness is twitter. I've set up a scrapper for various twitter accounts and I'm downloading every page that is linked by those accounts automatically.
With this approach you can even select what you want to look like based on your browsing data by selecting proper accounts. Gold bug? Bitcoin fool? Knitting expert? No problemo. ;)
written | 8 years ago
Though people are forwarding their second factor SMS confirmation codes for their banking accounts to attackers upon request, so it's not too far fetched someone would find a way to trick some users to enter it.
Here's one study about the phenomenon (the N is basically zero, but this happens and banks are warning people against doing this):
written | 8 years ago
written | 8 years ago
How will this work with Google Analytics and things like that? Will random e-shop be required to notify Google to stop using/delete PI for random persons upon request?
written | 8 years ago
The parent is pretty much 9/11 inside job conspiracy level stuff. I just stated a few facts about what happened, and how that contradicts the parent's speculation.
Anyway, whatever. Evidently HN is not a forum for reasonable discussion around this topic, because people don't follow what's happening wrt Syria closely.
EDIT: Let's just say, that this reaction is pretty typical. Almost universally, whenever a chemical attack happens and is reported, we're told that rebels are doing it to themselves as a false flag, to inspire western intervention.
After 40th case of rebels successfully throwing canisters with chlorine upon themselves from helicopters they don't have, to inspire intervention that never happened in the last 7 years or didn't bring anything good,... it gets ridiculous...
The problem is that anyone who doesn't watch closely, only sees this one medialized case in MSM, and thinks that false flag somehow may make sense. And "why would Assad use chlorine?" pops up, when it's docummented he uses it regularly.