Thanks! I did a quick search for “HustleGPT” across HN and didn’t find anything so just posted. A little but deeper digging would have likely found this older post.
I worked nearly 100 hrs per week at the beginning of my twenties. Between an undergraduate engineering program, business school minors, a busy college life, running a boutique software agency for small-to-medium sized businesses, and creating & building startups of my own, it took its toll.
A couple years later, I was completely burnt without knowing it. I only realized it after talking with others about the not-so-admirable things I had been feeling, something many like myself hesitate to do when trying to grow into the leaders we aspire to be. It was at that point that my situation became clear.
I ended up taking almost two years away from any form of work in order to bring balance back to not only my mind, but my life as well. Suffice it to say this process was not as simple as it sounds.
I implore anyone caught in the “just keep going with everything despite the stress, you’re almost there” mentality to consider what is driving you and if it is healthy for you in the long run. Being healthy and happy, with loved ones abound, is tremendously underrated by types like myself.
This is quite impressive for ‘94, thank you for sharing.
I found it funny - in a “how ridiculous/silly” kind of way - that at 4:40 we get to look inside a building by entering through its windows, but here we are in the 21st century with that exact capability. Individuals providing photos and/or footage of the interior of their commercial space does not seem so silly these days.
In the meantime, most users with that anticheat software installed presume that it is simply looking out for them, in terms of eliminating cheaters in __ video game, and could not possibly be doing the nefarious things you mention. Yet, all of us working in software know this is not a far stretch, given the application is already designed to gather information about the environment surrounding the running game. We have a long way to go with software, put simply..
Pretty much this. I've worked in the field. If you do development work, drivers, and/or have installed certificates or root CAs that are "rare" or not installed on a large majority of machines, they absolutely WILL be uploaded.
If you are detected to be a reverse engineer based on running processes or otherwise, even if it has nothing to do with the game, expect significantly more surveillance too, up to and including literal streaming shellcode running from the server at the highest privilege level at any time, none of which you can control.
I’m going to take a guess that perhaps it has to do with Google’s ability to continue to commercially operate in China.
Perhaps X leadership from Google spoke with Y leadership from China and reached this compromise in order to avoid a potential all-out ban of Google’s services in China, similar to - though nowhere close to the same reasoning behind - the US’ ban of Huawei telecommunications equipment.
PLEASE NOTE that this is purely conjecture. I am not affiliated with Google or China, in any way, shape, or form. This should not be taken as fact.
Is any part of Google still operating in China? All Google domains are blocked in China. If you use an Android device in China with Google Play Services (or microG), you will not receive any push notifications through Firebase Cloud Messaging unless you use a VPN (or equivalent), and many VPNs are blocked or throttled to an unusable level. Even Android's internet connectivity check is broken in AOSP, since the Great Firewall blocks the android.com domain, which hosts the test page.
I would guess also that it has to do with "normalizing" relationships with China as well. Every country has skeletons in its closet. And every government seeks to rationize and minimize those skeletons as much as possible. As a country gains stake in mefia institutions, those institutions internalize some of the propaganda of that country.
This skeleton is not in the closet, it’s on the front yard and still being punched in the face every day. Meaning they have not stopped oppressing which is needed for it to be a skeleton in the closet.
My comment is not to minimize the oppression. It is rather to point out that other countries, engaging in similar oppression and dehumanization have managed their PR in such a way that they don't need to twist the arm of a company like Google to ensure their preferred vocabulary is used. It is the status quo. China is doing the work now of integrating itself with the "free" media to ensure a certain image. A country like the US did so decades ago.
I was going to say this as well. I, too, am neither affiliated with Google or China. This very much sounds like a, "I'll scratch your back if you scratch mine," kind of thing IMHO.
Proprietary and Git don’t really go well together. Anyone can use Git and you certainly don’t have to use this or any additional software with it. I’ve never used Tower, as everything I’ve wanted to do in Git has been accomplishable via the command line.
The necessity of this article is debatable however. As with the majority (all?) of software products (excluding games), there’s often always that “this tool solves a problem we had ourselves” component. A somewhat shallow piece of content marketing is what this appears to be.
This could be quite a revolutionary find so long as the research can be replicated and validated.
However, we may be a ways off from seeing it actually implemented…
> The team says the exact mechanism behind this extreme thermal stability isn't totally clear, but that perhaps bond lengths, angles and oxygen atom positions are changing in concert with one another to preserve the overall volume.
With that said, I am optimistic and very hopeful that answers - and a more elaborate description of its operation and its operational boundaries - are discovered soon. Only then could I see, say, the USAF utilizing this as the “skin” for their latest generation craft, particularly, UAVs or missiles operating at Mach >=5.
> Zerodium customers are government organizations (mainly from Europe and North America) in need of advanced zero-day exploits and cybersecurity capabilities.
Based off Zerodium’s origin and reputation, it seems an exploit is sought which enables a governmental actor to examine information that it otherwise could not. I am assuming they do not have a legal basis for doing so or courts would have granted/ordered such access.
How do you think warrants work? The police suspect Criminal Charlie of organizing a crime using pidgin, so they get a warrant, then they give the warrant to Charlie? "Please remember to cc us on all your criminal plans. Thanks."
The issue isn’t about the warrant but the over breadth of the method for getting the desired information as it can leave other users vulnerable. Whether they have a warrant or not, this seems like overkill, because they could obtain said info in a much more straightforward way, assuming they have probable cause.
> I am assuming they do not have a legal basis for doing so or courts would have granted/ordered such access.
It's also possible that they have a lawful basis and warrant, but realise executing a physical warrant won't get access to what's required - with e2e encrypted chats going over Pidgin, on an encrypted laptop, you need to be very confident that when you swoop, the laptop is on and decrypted. You get one "go" at that, otherwise you have a suspect, little or no evidence, and an attorney requesting their immediate release on bail absent any actual evidence, which would let them flee and clean up any other evidence that may be out there, either with them or others.
[1] https://news.ycombinator.com/item?id=40098468