| 1. | | Trouble at the Koolaid Point (seriouspony.com) |
| 723 points by mpweiher on Oct 8, 2014 | 266 comments |
|
| |
| 457 points | parent |
|
| 3. | | Adobe Spyware Reveals Again the Price of DRM: Your Privacy and Security (eff.org) |
| 504 points by sinak on Oct 8, 2014 | 166 comments |
|
| 4. | | Final – A credit card built for the 21st century (getfinal.com) |
| 517 points by arfrank on Oct 8, 2014 | 358 comments |
|
| 5. | | Move Fast and Break Nothing (zachholman.com) |
| 459 points by bpierre on Oct 8, 2014 | 83 comments |
|
| |
| 303 points | parent |
|
| 7. | | Watson Services (ibm.com) |
| 362 points by harscoat on Oct 8, 2014 | 104 comments |
|
| |
| 254 points | parent |
|
| 9. | | Fixing a 37-year-old bug by merging a 22-year-old fix (openbsd.org) |
| 268 points by tscherno on Oct 8, 2014 | 72 comments |
|
| 10. | | Wanna know what product your competitor is working on? Try Slack (tanay.co.in) |
| 273 points by tangoalpha on Oct 8, 2014 | 140 comments |
|
| 11. | | Show HN: HTML5 online animation editor that exports to SVG and SMIL (animatron.com) |
| 239 points by VasyaPupkin on Oct 8, 2014 | 52 comments |
|
| 12. | | Microsoft Xim (getxim.com) |
| 229 points by emadelwany on Oct 8, 2014 | 112 comments |
|
| 13. | | Poll: How long could you survive without income? |
| 218 points by jacquesm on Oct 8, 2014 | 144 comments |
|
| 14. | | Show HN: Sail boat simulation – try to sail into the wind (imakesnowflakes.com) |
| 229 points by imakesnowflakes on Oct 8, 2014 | 83 comments |
|
| 15. | | Show HN: A curated list of Chrome DevTools tips and tricks (devtoolstips.com) |
| 212 points by jefkoslowski on Oct 8, 2014 | 24 comments |
|
| |
| 169 points | parent |
|
| 17. | | Venezuelans turn to Bitcoins to bypass currency controls (reuters.com) |
| 174 points by rafaelm on Oct 8, 2014 | 95 comments |
|
| 18. | | Firestone Stopped Ebola in Its Tracks (npr.org) |
| 183 points by mdturnerphys on Oct 8, 2014 | 96 comments |
|
| 19. | | San Francisco Legalizes, Regulates Airbnb with 7-4 Vote, Lots of Amendments (techcrunch.com) |
| 159 points by enra on Oct 8, 2014 | 111 comments |
|
| |
|
|
| 21. | | Peter Thiel Is Wrong About the Future (bloombergview.com) |
| 136 points by T-A on Oct 8, 2014 | 139 comments |
|
| |
| 115 points | parent |
|
| 23. | | A native code to C/C++ decompiler (derevenets.com) |
| 137 points by fla on Oct 8, 2014 | 54 comments |
|
| |
|
|
| 25. | | Segment (YC S11) Raises $15 Million Series A (segment.com) |
| 141 points by pkrein on Oct 8, 2014 | 47 comments |
|
| 26. | | Running GUI apps with Docker (fabiorehm.com) |
| 123 points by SlipperySlope on Oct 8, 2014 | 34 comments |
|
| 27. | | The Curse of Increasing Marginal Work Utility, or Why I Work So Much (togelius.blogspot.com) |
| 111 points by nkurz on Oct 8, 2014 | 62 comments |
|
| 28. | | The Kitchen Network: America’s Underground Chinese Restaurant Workers (newyorker.com) |
| 115 points by throwaway344 on Oct 8, 2014 | 39 comments |
|
| |
|
|
| 30. | | Qubes – Secure Desktop OS Using Security by Compartmentalization (qubes-os.org) |
| 101 points by tete on Oct 8, 2014 | 49 comments |
|
|
| More |
"Ah, but that's the thing: You can't build a "back door" that only the good guys can walk through. Encryption protects against cybercriminals, industrial competitors, the Chinese secret police and the FBI. You're either vulnerable to eavesdropping by any of them, or you're secure from eavesdropping from all of them.
Back-door access built for the good guys is routinely used by the bad guys. In 2005, some unknown group surreptitiously used the lawful-intercept capabilities built into the Greek cell phone system. The same thing happened in Italy in 2006.
In 2010, Chinese hackers subverted an intercept system Google had put into Gmail to comply with U.S. government surveillance requests. Back doors in our cell phone system are currently being exploited by the FBI and unknown others."
http://www.cnn.com/2014/10/03/opinion/schneier-apple-encrypt...