Hacker Newsnew | past | comments | ask | show | jobs | submit | ZaneA's commentslogin

Hey, HackWM author here, this might be a better link https://github.com/ZaneA/HashTWM :) Unfortunately it has been largely unmaintained by myself since the initial release, I occasionally pick it up for a day or two but I'm not using it actively anymore. Just happy that some people find a use for it!


Yeah I clearly saw it a long time ago.

As I said, stumbled upon your blog because of Chicken Lisp musings (dare I say chicken scratch)? Thanks for that, all very interesting.


It is the Heroku power being used in the Nestor shell example that gives this impression, using Trello or something else should solve this :)


What tool is used to create the diagrams here? Is it GraphViz or something else? Looks very nice


No syntax highlighting here either, Firefox 44.0.2, console shows that loadJS is undefined


Ahhh, I'll look into that on firefox :)

Thanks,


Patched. Syntax highlighting should work now :)


Not that this is any sort of proof but if you watch the last few videos you can definitely see the shading change on the tree leaves that move around in the wind.


Trees are static though - they only deform - they don't transform around the scene itself.


Working for me, Nexus 5 with Visa Paywave

Edit: Reading that is...


Works for me too - Nexus 5, MasterCard PayPass. The app in its current form isn't dangerous, it takes ~2 minutes to read the card and if the screen goes off or the reader loses contact you have to start again.


That sounds very odd; I compiled the app mentioned here and it took more like 200ms to read the info from my UK contactless VISA card.

But this whole attack isn't anything new — this was pretty widely reported back in 2012 in the UK, e.g. http://www.channel4.com/news/millions-of-barclays-card-users...

I wrote essentially the same proof of concept app two years ago after seeing that report pretty much just by reading the specs. From reading the paper mentioned on GitHub, the only real difference to what I wrote is that I didn't check for the CVC3 information (which I think is generally not included, or doesn't correspond to the actual security code on the back of the card).

But in any case, just the card number and expiry number are enough — as mentioned in the Channel 4 report — to make purchases from a lot of places.


If CVC3 is anything like CVV and CVV2, it's probably intentionally different than what's on the back of the card. Mag-stripe VISA cards have a three-digit code embedded in the stripe (this is the CVV), and a different three-digit code on the back of the card (the CVV2). Different brands of cards use the same model, but they don't always call them CVV/CVV2, and the number of digits may be different. The numbers are different so that use of the card is a magnetic reader can be differentiated from someone typing it in.


Doesn't this make it an impractical attack in most situations? I've never thought that buying RF shielding cases is of much use for 99% of situations, and this seems to support that theory.

Or should I rush out tomorrow and get one? (Australia, so yep, all of them are paywave, whether you want them or not).


Though as I understand from the source this also acts as an emulator, so if you scan your phone it may replay those card details, worth keeping in mind.


I'd love this. My bank wants me to pay $2.99 for a sticker to go on the back of my phone (to do contactless purchases) while supporting Galaxy S* phones natively...


Google Wallet's "Tap and Pay" works with select phones in the US: https://support.google.com/wallet/answer/1347934?hl=en

You might also be interested in Coin: https://onlycoin.com/


Sounds to me like his bank is the Commonwealth Bank of Australia(1), so Google Wallet is a non-starter. Coin is interesting, but the payments landscape in .au is rapidly moving away from card swipes to Paywave/Paypass. I've seen quite a few places that offer Cash or Tap, no swipe (I presume because of the fee structure).

1) https://www.commbank.com.au/paytag


Commonwealth Bank charge $2.99 a year regardless of what you want to do. To use their Android app, they also bill you that to have the functionality turned on.


The annual fee is not applicable in case of the PayTag (https://www.commbank.com.au/personal/can/can-tap.html). Also, can you refer me to the doc that mentions the extra cost of using the Android app for that purpose?


The Android app itself says it (I have it open right here).


Correct!


I'll try using my phone to buy coffee tomorrow, and let you know how it goes ;) (Aus, big four bank, not Commbank...)


I have PayWave too - can you explain why reading would work, but not actually using it to pay for things with your phone?


It may work, just haven't had the opportunity to try it out :)


This was posted to the NZ Python User Group a couple of months back, where a bit of discussion around the name took place, https://groups.google.com/d/msg/nzpug/womO01rqF58/niM48Fn8QA...


This looks great! I tinkered with building a similar service-oriented bot, using ZeroMQ for communication (though not very robust as it would block for responses IIRC); http://demonastery.org/2012/07/building-a-decoupled-irc-bot-...


Have you looked at ZeroMQ pub-sub yet? It has a flag for non-blocking publish.

Also thanks!


Thanks for the heads-up! Would be a fun project to revisit


I'd recommend Piwik (http://piwik.org/) as a decent self-hosted alternative to Google Analytics that is quick to set up on any PHP based hosting.


I have been using it also and agree it is worth a look. I keep meaning to move more of my sites to using piwik but time keeps going by without that happening, [sigh].


The great thing about evil is you can enable it in your .emacs and it mostly just works. But even better, because this is Emacs the vi layer is also easily extendable. Here's an example of adding other operators (adding `mit`, `mit>` etc): https://github.com/ZaneA/Dotfiles/blob/1858a02de25e25de20e96...


I'm tempted by emacs/evil as well, but everytime I try to make the switch I run into two problems:

1) intial emacs setup: it feels really tricky to just get basic editor sanity configured (auto-indent, syntax highlighting, etc.)

2) I worry that by using evil mode, I lose out on a lot of the goodness of emacs major and minor mode's. Do you remap everything to be more vi-ish for each mode that you use? I guess that is fine but the transition just seems daunting.


I second the idea of using Prelude to start with Emacs, along with the package manager which makes the initial setup and adding modes/stuff very easy (see http://melpa.milkbox.net).

I haven't seen any lost functionality by using evil; modes that define bindings continue to work, and the usual C-x/C-c/M-x/whatever works fine with evil. There is the odd major mode that doesn't work with evil out of the box (usually if it redefines j/k) but most have no problems. You can still use most (all?) regular Emacs movement commands with evil as well.


Prelude[1] is a great way to start with emacs. I don't have any experience with evil, though.

http://batsov.com/prelude/


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: