Hacker Newsnew | past | comments | ask | show | jobs | submit | 2014-05-04login
Stories from May 4, 2014
Go back a day, month, or year. Go forward a day, month, or year.
1.Linus Torvalds Receives 2014 IEEE Computer Pioneer Award (computer.org)
417 points by r4um on May 4, 2014 | 86 comments
I no longer trust Google but still using their services because I don't see any other good alternatives.
213 points | parent
3.PostgreSQL partitioning explained (github.com/fiksu)
228 points by keithgabryelski on May 4, 2014 | 33 comments
4.Ask HN: Idea Sunday
219 points by jw2013 on May 4, 2014 | 199 comments
5.Magic mirror: One way mirror with a monitor behind it (michaelteeuw.nl)
197 points by redman25 on May 4, 2014 | 30 comments
6.Chrome's experiment of hiding the URL is great for security (jakearchibald.com)
190 points by jaffathecake on May 4, 2014 | 205 comments
7.Zombies once destroyed Japan's economy, now they're infecting China's (qz.com)
196 points by throwaway2048 on May 4, 2014 | 95 comments
8.Chinese Number Websites (newrepublic.com)
192 points by bpierre on May 4, 2014 | 94 comments
9.Betty – English-like interface for the command line (github.com/pickhardt)
190 points by jrpt on May 4, 2014 | 81 comments
10.What Writing and Selling Software Was Like in the 80s (thecodist.com)
188 points by nih on May 4, 2014 | 58 comments
11.The Meaning of Life (sivers.org)
182 points by kulpreet on May 4, 2014 | 117 comments
I trust Google with my personal data and I have no reason to find other services
137 points | parent
13.Osxc – Simple configuration tool for OS X (osxc.github.io)
110 points by robinricard on May 4, 2014 | 44 comments
14.GitHub Language Trends (redmonk.com)
113 points by spatten on May 4, 2014 | 65 comments
15.Coding the Movies – Don’t Fake It (goconspire.com)
106 points by pauljm on May 4, 2014 | 43 comments
I no longer trust Google and I have moved some of my data to another service
93 points | parent
17.Ask HN: How Can I Find a Mentor?
104 points by kremlin on May 4, 2014 | 49 comments
18.Hot or Not: Revealing Hidden Services by their Clock Skew [pdf] (cam.ac.uk)
96 points by lelf on May 4, 2014 | 39 comments
19.Show HN: WriterKata – a site for writers to practice their craft (writerkata.com)
93 points by willstepp on May 4, 2014 | 47 comments
20.Chrome's experiment of hiding the URL is awful (craig.is)
94 points by craigc on May 4, 2014 | 67 comments
21.When does a physical system compute? (arxiv.org)
93 points by yiransheng on May 4, 2014 | 51 comments
22.U-2 spy plane caused widespread shutdown of U.S. flights (reuters.com)
93 points by happyscrappy on May 4, 2014 | 48 comments

So phishers buy domains with a levenshtein distance of 1 or two. It solves one problem, but creates an entire class of users that don't understand what a URL is. Who benefits? Google and search engine providers because now they can manipulate future internet users to believe that search engines are the internet. We've reverted to AOL in 1995.

There is nothing more that can be productively argued about this topic. There will be analogies about how complexity is hidden in various domains (cars, computers) and how beneficial it has been and how users are happy with it. Those arguments are fine and maybe they are being made in good faith, but it doesn't change the underlying future truth:

Marketing will now be changed to reflect Google keywords, not URLs. "www." and ".com" will become meaningless. Google will have put one more level of distance between what the users type in the URL and even what they click in the browser and what is reflected in the address bar.


As a member of the Chrome security team and one of the original instigators for this experiment, yes the whole point is to prevent phishing. The fact is that phishing is one of the most common attack vectors for most people, and the way the URL is currently displayed does very little to protect them. So, we're experimenting with ways of displaying the essential information (origin and TLS state) as clearly as possible, while removing the components that are not security relevant and are currently being abused to trick users.

No one has any intention of diminishing usability or making it hard manipulate URLS. The team working on this is still actively refining things and studying what works and what doesn't. But, phishing is a very big problem, and this change to the omnibox shows real promise in countering the attacks. So, I think we would be remiss in not pursuing the investigation further.

25.SSH agent notifications for OS X (devinteske.com)
88 points by zobzu on May 4, 2014 | 22 comments
26.The Valuation Trap (avc.com)
89 points by asanwal on May 4, 2014 | 37 comments
27.The Fight (2012) (dcurt.is)
83 points by kamaal on May 4, 2014 | 19 comments
28.A C error handling style that plays nice with C++ exceptions (sduto.it)
81 points by lettergram on May 4, 2014 | 27 comments
29.Bloodhound – Elasticsearch client and DSL for Haskell (github.com/bitemyapp)
85 points by coolsunglasses on May 4, 2014 | 25 comments
30.Studies: Blood from young mice reverses aging in old mice (nytimes.com)
84 points by mking on May 4, 2014 | 48 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: