Hacker Newsnew | past | comments | ask | show | jobs | submit | more butvacuum's commentslogin

Because you've now published your internal machine names. Look up certificate transparency logs.


What do you mean? I used self-signed for communication b/w LB and the nginx serving backend

Edit: I don't see any "machine name" on crt.sh for public LB which uses LE

Ah, you meant the DNS address is on CT now. You think I wouldn't know that? Regardless, a dns01 challenge is far better than using self-signed at home


They don't care about safety, life, or limb. Amazon didn't enforce the ban of literal suicide kits until legislation was in the works.

It's quite clear: until it threatens to blow away their "we're not an intermediary- We're a service provider." Smokescreen they don't care.


Probably the bionicals... Disaster?

Lots of those pieces look like technics, but aren't.


Didn't they only add those after losing a lawsuit?

And, I swear I heard about another one for cyber trucks, but with the vitriol surrounding them I'm not even going to try and find it.


I have no idea, don’t own a Tesla and haven’t been in one that often.

Looks like some models might have the manual door release switch easily accessible in the front but not in the back, about what you’d expect from Tesla.

At least the fact that they have a decent solution shows that there’s no reason this has to be a problem for electric doors.


Sounds like they're having issues with people thinking you can poke, prod, or drum on watermelons to check "ripeness" but it got lost in translation to "non-confromtstional."


Maybe? I am well aware/ don't care about watermelon ripeness because I find watermelon to be a complete waste of time 90% of the time. But now I want to poke them.


And no bills from the coast guard. (All these devices have distress beacons that activate automatically)


They can be a lot smaller when neither dose nor movement is a factor in imaging.


And something using keystroke injection to abuse the exception?


Is called an automation tool.

Like Powershell, or Microsoft Automate or Tosca, who can all run keystroke injection, but aren't flagged.


My question was rhetorical and intended to point out that granting an exception for 'good' software to do a bad thing is just allowing bad actor to do the bad thing.

Then, when the exception has to be revoked, the backlash is massive. Look up the recent example of the driver FanControl used to issue SMBus commands being blacklisted.


I was pointing out that keystroke injection is already the norm. The exception is banning it for some software.

It has been the norm since we first started automating processes designed more for people than automation. It will remain the norm for as long as that exists.


More likely/precisely, it's flagged as malware because it's bypassing protections build into windows credential guard- eg, impersonating(or injecting code into) outlook.exe.

making an exception for such a heuristic is, in all cases, wrong since it will always be abused.

The actual answer is: Defender needs a PUP category.


Not all of them apparently. I'll have to dig for a schematic(they exist, but places want money), but it seems my Dell laptop from 2019 uses the embedded controller as the BMS.

As, somehow it managed to turn all four cells in the pack into pillows. Which indicates a shockingly flawed balancing system


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: