Hacker Newsnew | past | comments | ask | show | jobs | submit | more pfexec's commentslogin

> As is, I still prefer Airbus when I get a choice

Better pack a toxic fume respirator in your carry-on:

https://www.cbsnews.com/news/delta-engines-airbus-toxic-fume...


Is there any reason to think this doesn’t apply to all aircraft using bleed air from the engines to pressurise the cabin? If not, only the 787 would be exempt, as far as I understand.


AFAIK this is all based on hearsay. I rarely if ever have seen thin plastic bags "in nature", no one is chucking them out a moving car window.

Anyone who litters single-use bags is also littering other trash elsewhere, most people can be trusted to place them in a responsible place for rubbish.

The Great Pacific Garbage Patch (which is often cited in defense of bag bans) is mostly Chinese trash.

Grocery bag bans are a feel-good distraction that makes no measurable environmental impact.

"Reusable" bags also have some fewer use cases for reuse; for example truck drivers are known to poop in the single use bags. Can't do that in a reusable bag.


Reusable bags are a farce that ignores the use case of reusing singe-use plastic bags as trash can liners, so you're already getting reuse out of them, and the thin bags will likely decompose faster in the landfill.

Meanwhile nearly every feel-good measure that banned plastic bags from municipalities allows paper bags, which require more energy and water to manufacture, and cannot be used to line trash cans.

So I now have to buy plastic trash bags, made out of thicker plastic, so I can throw out the paper ones.


Tthe flip side is instead of frequently seeing exploded weak retail plastic bags, I now see occasionally exploded thick plastic bags, and due to size, it never explodes in as spectacular mess as loaded tiny bags. TBH I think we're probably trading more polution for slightly cleaner enviroment... which works for me.


There are alternatives to throwing out paper bags. For example, getting a bunch of reusable bags and reusing them. Then you don't have to deal with paper bags or buy those thicker plastic bags either.


Not sure why you would buy plastic bag to throw recyclable paper away in it.

And the entire point of reusable bags being a thing is that you don't constantly buy bags.


No one has mentioned that "hacked" appears nowhere in the tweet and seems to be editorializing on the part of the submitter.


Sounds like boomer-speak for they sent one of those full-screen SMS messages (aka 'flash SMS') with a link to a livestream.

You guys read too much Tom Clancy.

If spammers can do it and send me links to phishing sites so can one of the most technologically-proficient governments. You really think they would waste multiple 0-days on some bullshit like this?


> too much Tom Clancy.

Isn't this is the nation that planted explosives into pagers? I think they're the ones reading too much Clancy.

> so can one of the most technologically-proficient governments.

How would you feel if China did this to your nation? Would you marvel at their proficiency or perhaps focus on the complete lack of diplomacy it displays?


I would feel that the responsible adult that was in charge of my protection is doing a lousy job. So he should surrender and spare us the war.

How would you feel? Insulted?


> the responsible adult that was in charge of my protection

So you're infantilizing an entire nation to make this point?

> So he should surrender and spare us the war.

Do you have any measure on this sentiment among the population currently? If it is, as it is in so many places, that the leaders actions are detached from the will of the voters, then what should we make of this?

Should they be allowed to surrender to a _neutral_ party?

Should they be allowed to keep their state?

Is there any reason not to presume a peaceful negotiation under these terms? Is there any reason to attempt to assassinate the party trying to coordinate this?

> How would you feel? Insulted?

Violated. These are _our_ emergency broadcast services. They should be used for the intended purpose and not to force an angry political message on a powerless population.

Do you not have any good faith in yourself for this topic?


[flagged]


> Your comment is all over the place, but it is very telling. You are a confused westerner

Be kind. Don't be snarky. Converse curiously; don't cross-examine. Edit out swipes.

Comments should get more thoughtful and substantive, not less, as a topic gets more divisive.

When disagreeing, please reply to the argument instead of calling names. "That is idiotic; 1 + 1 is 2, not 3" can be shortened to "1 + 1 is 2, not 3."

Please don't fulminate. Please don't sneer, including at the rest of the community.

https://news.ycombinator.com/newsguidelines.html


> You guys read too much Tom Clancy.

Seymour Hersh, actually.


Friendly reminder that you've been able to automatically unlock fully-encrypted Linux systems via TPM for years since it was added to systemd...

(Here's a nickel kid...)


This is not the same thing is it? Arch Wiki mentions something about having to install a separate ssh server into initramfs to support ssh’ing into fully encrypted systems.

systemd-cryptenroll seems to be about storing encryption keys into the TPM so that they can be decrypted automatically at boot (?)

Apologies if I misunderstood something.


I'm looking for what you're describing, some way to remote unlock a system. Is this the wiki page you're talking about?

https://wiki.archlinux.org/title/Dm-crypt/Specialties#Remote...

However, I'd prefer that the box is not on the general internet, but only over my tailscale net. I wonder if tailscale will also fit in the initramfs...


Yeah I was looking at that page. Found this btw: https://github.com/darkrain42/tailscale-initramfs


Thanks! I'm just getting back into Linux boot issues for the first time in multiple decades, and boy is it different than I remember.

It's pretty incredible to be able to dump all this stuff directly into the boot system. Now to see what Omarchy has done to give the fancy LUKS password entry...


and I imagine that the initramfs is not encrypted and trivially modifiable?

Apple is able to achieve this securely because their devices are not fully encrypted. They can authenticate/sign the unencrypted system partition.



This is super cool, thanks for the link! I’m glad they were able to leverage the TPM


More similar to the usage pattern in the original post is "dropbear-initramfs", e.g. https://wiki.debian.org/DropBear


If you want it to automatically unlock via TPM then you turn filevault off. This is protection on top of that.


But that uses TPM backed keys only protected by the TPM PSRs. Someone could still swipe your box and unlock the disk.


Also possible without a TPM: you just put openssh into the initrd, so you can log in and type the password to unlock the root.

(It's technically not full-disk encryption because the kernel and initrd are in plaintext, but everything else is)


What do you authenticate against? Your shadow file is in the unencrypted area leaving it susceptible to offline attack.

With the TPM you can fully disable password auth over SSH.


My Raspberry Pi some time ago had a setup where only public key auth was enabled for LUKS unlock, so I only had to have an authorized_keys file unencrypted.


Correct, someone with physical access could run a MitM attack and steal your passphrase. I just find this extremely unlikely, so I honestly don't care.


If this worked as well/seamlessly across updates and hardware revisions as your friendly reminder makes it seem, today's Mac news wouldn't be all over the place getting praise.


Link?



Debian is known to have made similar monstrously stupid decisions.

For example, they patch OpenSSH source code in a way that makes defaults behave differently than upstream. In the name of backwards compatibility of course.

I assume this will continue until it doesn't anymore, and the only notification you shall receive from the ivory tower is a cryptic one-liner buried in a changelog somewhere.


> For example, they patch OpenSSH source code in a way that...

Isn't it the same thing with the RedHat downstreams ? (Not necessarily OpenSSH but other packages)

IIRC RedHat do all sorts of things to keep their gov / corp customers happy, also usually in the name of backwards compatability, all of which then end up in the downstreams.


Russ Allbery left over bureaucracy and systemd. It sounds like it's chocked full of people who want power and an excuse to patch downstream to create a cottage industry of quirks, busywork, and codependency.

I prefer real choice and light patches that try to upstream as much as possible, or workaround upstream obstinacy rather than create incompatible idiosyncrasies. One area that isn't well represented in barely a/no distro is init freedom neither married to nor completely divorced from the sprawling octopus.


You are confusing Russ Allbery with me, while at the same time making it sound like I have a problem with systemd, which is not the case. Russ remains a debian developer.


No, I don't think so but perhaps it wasn't as drastic: https://lwn.net/Articles/620879/

Also, I worked in the same department as Russ once upon a time in a galaxy far, far away.


I don't think you can be partly married to Cuthulhu. (Systemd.)


[ eldritch noises intensify ]

As an actual answer, it's not too bad on Debian; we only really use/need: systemd (system and user), -logind, -journald, -udevd. All in all, not too many tentacles but there are a few...


Waiting for someone to explain that iPhone has replaced this too (via streaming), completely unaware that the origin of the stream is likely a 3.5mm jack on... an actual scanner.


While very true, so long as someone keeps that scanner online and the source remains unencrypted, only one person needs to own a scanner rather than hundreds.

Sadly, my city now encrypts all police channels. Fire and EMS can still be streamed though.


I am surprised they such sensitive channels are not encrypted. Both for confidentiality and integrity.


It depends on the region and specific needs, but a common reason for not encrypting is that it adds complexity in an emergency (where, e.g., people might need to communicate from other regions nearby, or ambulance needs to talk to fire, maybe civil defence or AREC needs to be involved.) The simplicity of plain unencrypted radio can outweigh the benefits of secrecy.

This said, different places weigh factors differently, there's no one-size-fits-all answer.


But then you lose accountability.


In what sense?


Likely replaced by group text for most. my grandpa drove snowplow for the state and often had the scanner listening for when he might be called in. he couldn't respond directly but he did call dispatch to give his ability to come in. Pagers probably replaced that for many.


> All weather personal stereo

> AM/FM clock radio

> In-Ear Stereo Phones

> Microthin calculator

> Mobile CB

> Deluxe Portable CD Player

Maybe I missed the rollout for the iPhone that performs all these functions, but no iPhone has ever:

• Picked up AM/FM radio (even though throwaway Nokia mobiles could do so)

• Allowed you to talk to truckers on the CB band.

• Played CDs you already own.

iPhones no longer come with earbuds (so they can sell you overpriced wireless ones), and a wayward update to the Calculator app kept it from functioning like a traditional 4-function calculator ever again. (Delete button? Really?)

Considering this article is nearly 12 years old and there have been no improvements on the above I declare this list dubious at best.


Well if you want to be completely literal, then you’re right. It also isn’t literally a Tandy 1000.

But if you actually comprehended the article, the author said that you use your phone to perform all those functions. The iPhone can replace all of those functions you listed. It is water resistant and has a speaker. It does not have an AM/FM station but most broadcast radio stations also have a live stream that you can get in your phone. The iPhone came with earbuds when this article was written. It had a calculator app on day one, and it’s just fine. You don’t have literal CB but you can use a variety of apps to communicate with voice in real time. You can’t play the literal CDs but you can’t play the literal .wav files on the CDs.


> The iPhone can replace all of those functions you listed

> It does not have an AM/FM station

> You don’t have literal CB

> You can’t play the literal CDs

So not the same function, got it.

As for your last example, you might as well replace "iPhone" with "tape deck".


iPhones did replace tape decks. The mini hi-fi in my living room, my car stereo, my tape and CD walkman, all are now either bluetooth recievers for smartphones or play audio directly from the smartphone.

The function wasn't "playing tape" or "playing CD", it was playing music or audio books.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: