Hacker Newsnew | past | comments | ask | show | jobs | submit | TechieKid's commentslogin

Any links to said "troubling rumors about Arc Gen 2"?


The Moore’s Law Is Dead YT channel claims the GPU as been delayed and "cut back" to a more modest size... But on second thought, I regret making that claim, as MLID is a unreliable source. For instance, they previously claimed Arc was canceled, and die size revisions don't really happen this close to release.

This is the last credible rumor I know of: https://videocardz.com/newz/intel-next-gen-arc-battlemage-gp...

Nevertheless Intel did officially modify and delay Falcon Shores (their big server GPU) to 2025, which worrying.

https://www.anandtech.com/show/18756/intel-scraps-rialto-bri...


You can search with / on Firefox.


Unless you're on github.com, because it rather inconsiderately takes over `/`.


' will search in URLs, skipping plain text.


Also relevant news that Google has disabled io_uring for apps on Android and disabled it entirely on Chrome OS and production Google servers since 60% of the exploits (~$1M worth) submitted to the Google Vulnerability Rewards Program have been for io_uring: https://security.googleblog.com/2023/06/learnings-from-kctf-...



Thanks to you both! I've macroexpanded these links at the toplevel: https://news.ycombinator.com/item?id=36361124


Sidechannels in Signal is news to me. Can you provide some keywords to search for, or any links?


The contact discovery services leaks the fact that you are using Signal. It is not optional. It's clear why that is, so I won't spell it out.


They can get download records from Google or Apple to check for Signal downloads.

So there’s really no reason for Signal to try and hide one is merely using Signal. Best to focus on securing content.


You are missing the attack vector here.


It is optional isn’t it? I never gave Signal permission to read my contacts and yet I still use it.


Discover (discover.com) currently has a similar bug where it'll allow me to login with my password, but will not accept the same password in the 'Change password' workflow as the old password, complaining about it being invalid. (shrug)


Is this across titles or even for promotions within the same title?


AFAICT, these companies don't really promote within a title - they use a leveling system. The definition of a promotion is to move from one level to another.

Vague job titles like "senior" or "junior" can be useful in limited circumstances, but if a company can promote you within the same title, it's a bit of a smell.


Promotions within the same title ... aren't really promotions.


I've worked at companies where titles beyond junior & senior (and "senior" means 3 years experience) don't exist


Phoronix has been covering the Linux driver development for the cards as they happen: https://www.phoronix.com/scan.php?page=search&q=DG2


The update literally says that "found no evidence of access to production services or customer data."


There are two aspects to the comment though: 1. Did they access services/data as part of this? 2. Can/did they use what they got to impact customers/gain access to customer data.

The comment in the article speaks to #1. And of course, we have to take that with a grain of salt. I doubt any company impacted by this would be fully honest if there was a customer breach. Regardless, you also can't prove a negative. So all they can really say is what they did. Which doesn't mean services/data weren't compromised. Given the size of Microsoft, I find it hard to believe that every service running there has the logs/audit trail to know whether they were inappropriately accessed.

But I took the OPs comment to be focused on #2 as well. There is a very real possibility that having access to the source code could help the attackers attack customers. Having access to the source code can help in locating vulnerabilities that allow future attacks against customers/services.


Please note: the source code of Windows 10 can be requested if you are a large enterprise or a government already (as long as you agree that you won't release it). The only possible significant difference here is the lag - you can read the source code of the internal builds, whereas you can only access the corresponding source code for stable builds officially. So, if you are a government, you can actually request it for a legitimate purpose and pass it into the other side of that government if you want to.


I think you're misunderstanding my point.

The "risk" mentioned in the quote a few comments up, and in the context of the post by MSRC, isn't about the risk of leaking Microsoft IP. It's about the risk that Microsoft customers might have been affected. Whether or not MSRC found evidence of a breach of customer accounts/data is a related but separate question.


Please note: the source code of Windows 10 can be requested if you are a large enterprise or a government already (as long as you agree that you won't release it). The only possible significant difference here is the lag - you can read the source code of the internal builds, whereas you can only access the corresponding source code for stable builds officially. So, if you are a government, you can actually request it for a legitimate purpose and pass it into the other side of that government if you really want to.


As a person in the US who is not a PR or citizen and has worked on things the US Government likes to know are being exported, even exposure of the knowledge to a citizen of a target country is "deemed export." Google will probably have to reorganize its research center to comply with this and bring AI research that falls under this restriction back to the US. I don't disagree that it's futile though.


I'm sure you know this, but, I think at least since Windows 7, while having the Alt+Tab "popup" open, you can use the arrow keys while holding Alt down to directly navigate to the window you want to open. Very useful if, like me, you have 20 windows of browser tabs open, and the application you want is in the middle of the list.


Yes - and you can also mouse over them and click now too. All three of these interactions are, imo, very intuitive and easy to do.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: