Hacker Newsnew | past | comments | ask | show | jobs | submit | livus's commentslogin

1. Car pooling has become very acceptable. I live in NCR and every time I've taken an Uber Pool or Ola Share the car has been packed to capacity. This is especially popular among solo office travellers.

2. This has, sort of, lost its charm with the younger generation especially if they are earning well or used to own a car. Public transit has become faster (on the order of twice as fast during peak time) compared to driving. 2 wheelers are more popular than 4 wheels for cost and practical reasons.


There's an option to pay for GSuite, which gets you access to most Google products, but I'm not sure about it's privacy policies.


They've reached a market position where NN doesn't really impact them much. They, now, have the cashflow to pay their way out. They can pay, smaller companies cannot, thus cementing their position in the market. Absence of NN, in an indirect way, helps them competitively by constructing artificial barriers to entry without taking the heat.

Sure ISPs have their own equivalent offerings, but dealing with one or two competitors in an area is easier than dealing with a couple of them.


Not so when their major competitors are literally part of the ISPs they have to negotiate with.

I know Netflix has pretty good penetration and awareness with customers, but people are fickle and will jump ship as soon as something better (or less shit, due to less bandwidth squeezing) is available.


Eh. I regularly update my Windows gaming PC and every time it takes a long time to restart and apply updates. Far more than macOS and Ubuntu. And this is not new behaviour.


Not to forget iTerm 2 on macOS is amazing. I find it much more pleasurable to use than the default Terminal.app


I try it every few years, but always seem to end up going back to plain Terminal.app. The main issue is speed and memory usage— iTerm2 seems to be much slower and laggier, especially on a busy laptop (running VMs).


Because *nix kernels provide terminal devices, making a new terminal program is relatively easy on OS X compared to Windows where a lot of the free things have to be written in userspace.

I usually use iTerm2 as well.


This is the new "It's compiling!"


Start reporting on those messages. If you are on Android, use India Against Spam. If iphone, you'll have to report manually on the operator's website. for example - airtel.in/dnd

It's a pain in the ass but I kept on reporting for a month after activating DND and the calls and messages dropped. I've even received calls from people begging me to take my complaints back or otherwise they'll loose their jobs. I agreed twice but holy hell those exact same companies spammed me again. I stopped being a good samaritan and just told them to sort it out with their companies since it's the companies fault. Now spam has reduced to a message or two a month.

From what I understand there are old mobile numbers list being passed around from before DND was available and that's why you need to start reporting the spam messages. Word quickly spreads between the companies to remove your number from the lists.


I have reported them via India Against Spam but the responses from Airtel were, roughly, 'thanks but this is not spam' so I stopped reporting. Complaining on Twitter helped with some, but not all, spammers.


Not OP but it could be very much possible and that's what OP is trying to say. Just taking it on Intel's word that they haven't done it is not the correct way to go. For the truly privacy minded, it's better to err on the side of caution.


Err on the side of caution in this sense would mean fabricating your own proc. Are you going to do that?


How do you know the fab you send your design to doesn't implement a backdoor? You have to have trust at SOME level.


How do you know the fab you send your design to doesn't implement a backdoor?

It really wouldn't be that hard to compare what you received from the foundry with the masks you sent them. There are services that decap ICs and attempt to reverse engineer them. Here's the first hit I found on Google: http://www.intelligservices.com/Services.htm

You wouldn't need the reverse engineering. All you would need to do is to compare that all the metal layers (and perhaps poly) match what you sent. That's an almost trivial comparison. The hard part of reverse engineering is in figuring out what the circuitry actually does, and you already know that, since it's your chip!

It could be possible for a fab to alter diffusion layers to change the functionality of a chip. That would be harder to detect by services such as the one I mentioned. But it would be very hard, very time consuming, to attempt to hack in a backdoor by only messing with base layers, rather than messing with metal or with poly (where changes are easily observed).

If there were to be a backdoor anywhere in a design, it would be in IP you used on your chip, that you got from either your foundry or from a 3rd party IP supplier. It would be easy enough to hide all kinds of stuff there.


That is exactly my point. If you don't trust Intel, then who are you suggesting should build your processor? Unless you are going to design and fabricate your entire system top to bottom, and have no other persons involved who could surreptitiously insert evil code, then you're going to have to accept some degree of trust in a 3rd party.


It's not just Intel you're trusting, it's the OEMs, who also have an EXTREMELY poor record. Just take a look at the ENORMOUS number up BMC and auto-update vulnerabilities. They really just either couldn't care less, or are deliberately making machines vulnerable. Things are being pushed into IME, that aren't optional, often aren't wanted by users (or snuck in there so they wouldn't know), don't all have to be there, can't be verifiably disabled or overriden by end users. Even if it weren't backdoored (unlikely), it presents an ENORMOUS attack surface at the very worst possible privilege level. Open source designs that are at least inspectable by researchers would be a start. But more importantly - allowing users to CHOOSE whether they want to override software (it IS after all software and not hardware). Why shouldn't we be permitted to run Libreboot etc on modern hardware and know that when we turn a machine off, that it's off, without unplugging network, power cables, batteries, etc?


On average yes. There's massive corruption.

Source - I live here


Finally. But I wish microsoft would've done it sooner. Now a UNIX convert. Forever a convert. I'm no longer fighting my system to get shit done.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: