written's comments

written | 8 years ago

Hmm, I never thought my informative post would get flagged, while baseless speculation is upvoted.

The parent is pretty much 9/11 inside job conspiracy level stuff. I just stated a few facts about what happened, and how that contradicts the parent's speculation.

Anyway, whatever. Evidently HN is not a forum for reasonable discussion around this topic, because people don't follow what's happening wrt Syria closely.

EDIT: Let's just say, that this reaction is pretty typical. Almost universally, whenever a chemical attack happens and is reported, we're told that rebels are doing it to themselves as a false flag, to inspire western intervention.

After 40th case of rebels successfully throwing canisters with chlorine upon themselves from helicopters they don't have, to inspire intervention that never happened in the last 7 years or didn't bring anything good,... it gets ridiculous...

The problem is that anyone who doesn't watch closely, only sees this one medialized case in MSM, and thinks that false flag somehow may make sense. And "why would Assad use chlorine?" pops up, when it's docummented he uses it regularly.

written | 8 years ago

Most of the big providers are shit, I wish I could shame them, but alas, I can not.

If I'm responding to e-mail from their users, I expect at least my initial response will get through. You really don't need any fancy crap like DKIM/SPF/nice IP addresses database/AI/bayes/etc. in this case to make the decision if e-mail is legitimate.

All my responses contain randomly generated ID of the message I'm responding to that nobody else than the sender and the intended recipient (me) can know. If it matches one of the e-mails their user sent me, say within a reasonable timeframe, and it's a first response or so, it is almost certainly genuine.

It just shows how little they give a crap about their own users, if they don't make such a simple check to make sure that their users can get responses to all sent emails.

Instead of making e-mail work, they're inventing bullshit like this new "expiring email" thing and making redesigns nobody asks for.

written | 8 years ago

Have you looked around? :)

written | 8 years ago

They will get there on weekend. OPCW was allowed in. Unless the strikes will change that.

written | 8 years ago

Probably too early for anyone to have any substantial comments anyway.

written | 8 years ago

All I hope is that the regime didn't do the same shitty thing it did in anticipation of Obama's response in 2013, when they moved prisoners into evacuated air bases, in hopes that the US will kill them.

written | 8 years ago

Just take the info with a grain of salt. Counterattack on whom? US forces in the east? US/French ships in the west?

written | 8 years ago

Thank you Bulgaria. Hopefully the real thing without thickeners will always be available. A lot of crap is being sold as yogurt by the usual multinational culprits.

I guess we can make it at home if need be.

written | 8 years ago

Oh, I understood that posting the photo was propaganda, not the actual content of the notes. I guess the meaning of the parent post was ambiguous.

written | 8 years ago

Everyone's repeating the 73% number, like it's some shocking statistic.

It's meaningless number in isolation. For example if backpage.com captured 70% of the sex ads market, I'd expect it to also capture the sex ads related crime at the similar rate.

If craigslist has 90% of ads for selling beanie babies, it will also have a hand in significant majority of beanie babies selling related crime.

So the question should be how big backapage was when it came to sex work ads, to make sense of this number.

written | 8 years ago

Perhaps a breach of privacy, but propaganda?

written | 8 years ago

Just make the algorithm select a random frame, and it will be solved.

written | 8 years ago

x264 is a software codec.

written | 8 years ago

That's probably why he seems to enjoy it so much.

written | 8 years ago

Even random clicking on these "select X" captchas works. You'll just get a longer run around, until AI gets bored and lets you in.

Perhaps it recognizes that being annoyed and a willful breaking of rules are also human qualities.

written | 8 years ago

I just realized I'm obfuscating my internet usage inadverently. Here's how:

Good source of reasonable randomness is twitter. I've set up a scrapper for various twitter accounts and I'm downloading every page that is linked by those accounts automatically.

With this approach you can even select what you want to look like based on your browsing data by selecting proper accounts. Gold bug? Bitcoin fool? Knitting expert? No problemo. ;)

written | 8 years ago

That's pretty good. It would require some serious gullibility to defeat. If it's active attack, attacker may send the second mail with the passcode and instruct the user to enter it.

Though people are forwarding their second factor SMS confirmation codes for their banking accounts to attackers upon request, so it's not too far fetched someone would find a way to trick some users to enter it.

Here's one study about the phenomenon (the N is basically zero, but this happens and banks are warning people against doing this):

https://engineering.nyu.edu/files/VCFA_PasswordsCon15.pdf

written | 8 years ago

Many state run organizations have to be compliant too.

written | 8 years ago

Also user can require the service to remove his personal information and that means that service provider has to notify services he uses to stop using and remove that PI.

How will this work with Google Analytics and things like that? Will random e-shop be required to notify Google to stop using/delete PI for random persons upon request?

written | 8 years ago

You have no guarantee that the domain part case is preserved from what the user wrote, if it's not defined to be case-sensitive. So you can do what you want, but the input data are not reliable.
page 1