Hacker Newsnew | past | comments | ask | show | jobs | submit | dnial02's commentslogin

Interestingly, when I see the wikipedia page, the Jewish interpretation is nothing to do with stealing property, but by stealing person(kidnapping).

So the correct translation from Jewish tradition is thou shall not kidnap.

https://en.wikipedia.org/wiki/Thou_shalt_not_steal


> Nevertheless, this commandment has come to be interpreted, especially in non-Jewish traditions, as the unauthorized taking of private property (stealing or theft), which is a wrongful action already prohibited elsewhere in the Hebrew Bible that does not ordinarily incur the death penalty.


Not OP, but I will answer with the second option and ask him what I should do?


$1337 bounty is a symbolic number to signify the receiver is an elite hacker.

So, it's the meaning that counts, not the amount.

edit: source: https://en.wikipedia.org/wiki/Leet


>So, it's the meaning that counts, not the amount.

Still, I believe that a more heavily accented/long "e", like in $13337 would have been graciously received ...


Or 31337, the long form of 1337


Yeah, the amount is quite geeky. For those interested in the other amounts they award (based on a matrix of severity and which part of Google):

https://www.google.com/about/appsecurity/reward-program/


The disclosure of the exploit signifies the status of the hacker. The amount of the award is a slap in the face that is entirely disproportionate to the value of the exploit.


It’s likely infantilising to any serious security researcher, an incentive for “script kiddies”.


I think the clause is there because China start to ask Tech company to open their source code if they want to do business there[0].

Which make me wonder, how do you distinguish between legitimate use of source code audit and the one that try to blatantly copy the source code?

[0] http://spectrum.ieee.org/tech-talk/telecom/security/chinas-n...


Do you seriously think that TPP going to stop China from stealing tech if they decide to actually use it stolen source code like that?

Come on. Source code audit is pretty standard procedure in case of any government usage around the globe and there also plenty of people have access to proprietary software source directly or not. Even big companies getting hacked by enthusiast with nearly zero budget and country have almost unlimited resources.

What's more important so far China was doing great just replacing exist products using hardware available on market and without copying anyone source code.


The idea is that source code audit will not be the barrier of import. If the government request foreign company for source code audit they need to ask nicely, not with threat of banning import and sales of said product.


I wonder if a trusted third party auditor agreed upon by both parties could work.


It might work, but it will be another barrier of entry.


Only if you're Westerner. South East Asian can enter Myanmar freely, but Myanmar is the only country that doesn't have free visa for other ASEAN country.


Americans never had a problem with entering Myanmar. All you needed was a visa from the embassy in Beijing (you could probably get one at the consulate in Kunming also).


Location: Bangkok, Thailand Remote: No Willing to relocate: Yes

Technologies: C#.NET, Python, PHP, Javascript, Puppet, RabbitMQ, Hadoop, MongoDB, Redis, Cassandra, MySQL, SQL Server, Oracle 10g.

CV: https://drive.google.com/file/d/0B-VODqQbQHCFamxVUVloZ1h4VzA...

Linkedin: https://www.linkedin.com/pub/daniel-hendrianto/23/a82/971

Github: https://github.com/dnial

Email: g.daniel.h [at] gmail.com

I am currently living on Bangkok, Thailand but originally from Indonesia. I am a Fullstack Developer and also have experience in Database Engineering, Enterprise Apps, and ERP Implementation.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: