Hacker Newsnew | past | comments | ask | show | jobs | submit | emanlin's commentslogin

Yes, simply add the key gcloud generates as normal using ssh-add ~/.ssh/google_compute_engine


No, I meant the client private key that gcloud uses to authenticate itself (on your behalf) to Google's servers, not you to your servers. That wouldn't be an SSH key, probably TLS or hand-rolled crypto.

----

Also, now that you mention it, even if I encrypted the generated SSH key, wouldn't running a `gcloud ...` command again just ... re-generate the key, in unencrypted form?


Sorry, I should clarify: The client key is used in our corporate login.

When I log in to `gcloud`, that goes through our corporate login. Corporate login uses a client certificate and two-step.


The author is capable of identifying their emotional state and adjusting their behavior accordingly.


Unit testing.


Or better, integration test where multiple executables are involved, making regular in-process mocking unusable.


It’s normal that most people prioritize the social responsibility to prevent the spread of a deadly virus.


Ive already had covid. I am immune and don’t spread it. I already meet your requirements. But why must I go further and modify my body unnecessarily?


Because we don’t know if you’re immune. We do know vaccines help even for those who have contracted the virus. Therefore, it’s necessary for you to get vaccinated.


Do you mean, we don't know if I'm immune but spreading, or can't prove that I'm immune (no negative test)?

Assuming the first, I guess we'll have to wait for the data. Assuming the second, I haven't ever been assumed sick until proven healthy. I've been sick many times in my life, and I voluntarily self-isolate to protect others. But suddenly this is considered selfish. I must prove health or be exiled until I conform.

Are you not worried about losing your freedom? Or was this a freedom you never valued? The specific freedom I mean was choosing what goes in your body.

Thank you for your honest response. Most people just downvote and scroll on.


Printers and scanners have refused to process imagines containing certain patterns of stars for decades and it seems to have worked out OK.


No it really hasn't worked out 'OK' because here we are now.


Could you elaborate?



Printers recognize patters of stars on currency notes and will not print them and sometimes even notify the police.


I recently tried to help someone onboard into a cloud project that requires git tunneling due to security policies.

While they had experience with their IDE of choice and git, they were ultimately unable to push any changes.


Caution is warranted on the you can have it if you can pay for it route.

An enterprising teenager may earn money in undesirable ways.

I’m a parent and I’m thinking I’ll handle this as a clear you can have it or you can’t to avoid the grey and black market incentives.


While that sounds unpleasant the initiative is worthy of praise. It’s something to work within. I would probably prefer that outcome over drug addiction to Facebook or TikTok.


It’s already mandated if you’re a government employee, which millions of people are.


Kubernetes removes the complexity of keeping a process (service) available.

There’s a lot to unpack in that sentence, which is to say there’s a lot of complexity it removes.

Agree it does add as well.

I’m not convinced k8s is a net increase in complexity after everything is accounted for. Authentication, authorization, availability, monitoring, logging, deployment tooling, auto scaling, abstracting the underlying infrastructure, etc…


> Kubernetes removes the complexity of keeping a process (service) available.

Does it really do that if it you just use it to provision an AWS load balancer, which can do health checks and terminate unhealthy instances for you? No.

Sure, you could run some other ingress controller but now you have _yet another_ thing to manage.


Do AWS load balancers distinguish between "do not send traffic" and "needs termination"?

Kubernetes has readiness checks and health checks for a reason. The readiness check is a gate for "should receive traffic" and the health check is a gate for "should be restarted".


If that’s all you use k8s for, you don’t need it.

Myself I need a to setup a bunch of other cloud services for day 2 operations.

And I need to do it consistently across clouds. The kind of clients I serve won’t use my product as a SaaS due to regulatory/security reasons.


Multi-cloud is one of the few compelling use cases I can think of for Kubernetes.

That said, there are relatively few organizations that actually require it.


The boy who called wolf is an old children’s story for a reason.

What alternative behavior do you suggest?


checking the location of thee caller. If its not coming from somewhere nowhere near the location of the supposed shooting maybe be a little suspicious. 9-1-1 calls are supposed automatic location identification as part of the E-9-1-1 system.


Swatters are obviously hacking the system by finding ways around that like spoofing numbers. This is a problem that will always exist, though the phone system certainly needs to be be made more reliable. But there's not much the cops themselves can do as a policy change. These laws you cite also force police to accept calls from burner phones with no identity. In one case the swatter called the local police's non-emergency number which doesn't go through the reverse lookup. It's basically social engineering in these cases.


which just brings up the question of why the telecom's cant identify where there own customers are. They obviously know otherwise they could delver service so why cant they pass that information on accurately. why is it even possible to fake the location.


Not sending out militarized police teams based on anonymous tips.

(FWIW, I've been swatted before, and live in constant anxiety every since. I don't feel safe.)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: