Hacker Newsnew | past | comments | ask | show | jobs | submit | pkaeding's commentslogin

> permitted a single ECS task role "read access to every secret in the account, including the production Redshift master credential."

...

> noting that the stolen information was old and consisted mostly of non-critical details

So I guess 'mostly' is doing a lot of heavy lifting, and they hadn't rotated the credentials in a long time


Like the headline said, you had to be there...

Of course, nostalgia slop can exist for any period. But it can be interesting to stop and think about how the little details of everyday life have changed over the years.


Yes. And I'm sure the next administration will as well. These things only ratchet in one direction.


You would still be able to use the telnet client to connect to an SMTP server on TCP port 25, just not port 23, right? I don't think that part changed here.


It's... not super clear from the article whether this is a port block or a stateful protocol thing. But yes, you're probably right and SMTP spoofing is probably safe for now.


I read it as a clear port 23 block.


Or Simple Sabotage[1]?

[1]: https://www.gutenberg.org/ebooks/26184


A good insider threat program already would pick up on that.


If I started implementing the organizational sabotage section at Google people would think I'm going for promo.


Maybe this doesn't beep at you if you take your hands off the wheel?

And people think that is a good thing?


It beeps at you if you stop paying attention, which is superior. Hands on wheel is an arbitrary design decision more likely to placate what a layman would think is necessary to ensure safe AI steering.


It’s an option in open pilot, but not one that defaults to on


My car judges it if I have put in any manual inputs over the past 10 or so seconds then it starts complaining. Which is seemingly reasonable however there's plenty of nearly perfect straight aways where there's nothing to do for it or me.

It would be nice if it had a system where if it isn't doing anything, it doesn't think I'm not doing anything either.


Except those straight, boring roads that require no input are also exactly where and when I most want to use autopilot. This means I have to manually adjust to keep the car happy, instead of letting the well-aligned car just carry on. Autopilot ends up being more work, and more annoying, than just driving myself


Okay, but "fad-use-of-GPU bros" doesn't roll off the tongue as well.


Why would a thief post a photo of a stolen vehicle? Are they trying to sell it whole? I can't imagine that is very common, since the buyer won't be able to register it, right? Aren't most stolen vehicles disassembled (chop shops, etc)?


> Why would a thief post a photo of a stolen vehicle?

Casual small time occassional car thieves might do this, receivers of stolen cars as payment for other debts owed by a thief may do this ... but it's somewhat atypical.

> Aren't most stolen vehicles disassembled (chop shops, etc)?

In the organised bigger scale operations vehicles are dealt with for the greatest profit with least risk. A good many are stripped for the parts - the more popular the car, the larger the parts after market.

A suprising number of cars from developed countries are shunted whole into containers and sold elsewhere about the globe. eg:-

  “Each year, hundreds of thousands of vehicles are stolen around the world, yet the initial theft is often only the beginning of a vehicle’s journey into the global criminal underworld.

  “Stolen vehicles are trafficked across the globe, traded for drugs and other illicit commodities, enriching organized crime groups and even terrorists. 
https://www.interpol.int/en/News-and-Events/News/2025/INTERP...


Going back to the the article, you have to find a picture of your exact car online somewhere, then use GeoSpy to tell you it was stolen in the US and was photographed in Columbia, then you go to that place in Columbia to find it's not parked there anymore, so you contact the person who made the post/listing and try to arrange a meeting, then you confirm it's your vehicle, then... what exactly?

Local police are doing none of this btw.


When an insured vehicle is stolen, it soon belongs to the insurance company. I think it would be helpful for insurance to know whether a stolen vehicle is across town or in Columbia. If it's nearby they can recover it and the salvage value for it, and if it's in Columbia they have some evidence that their resources are better spent elsewhere.


They will often sell it to someone for super cheap. They don't care about getting fair market value. $1000 for a $10000 van with no title isn't a loss to a thief. It's still $1000. And there are a lot of desperate people who are willing to pay $1000 for any type of transportation, and are willing to drive around until they get caught. They'll just steal some plates and run them with valid tabs. Maybe pass it onto someone else for $1000 later on down the road, and get another from their favorite stolen car supplier.


> often

Really? Not that anyone has any data on any of this but since you're measuring it as "often" I'm going to disagree and say this is a very tiny percentage of stolen vehicles that are being used this way.

If they are, it's probably being bought from a hookup you know and not randomly on marketplace.


Sometime the sellers of stolen cars are inconsiderate to the buyers in this way. Or they sell to buyers who also don’t care to register their vehicle.


Yep, this is what I was thinking. It was part of the detente negotiated to end the "drone" hysteria about this time last year.


They operate on the t-mobile network, so they would be limited by that, at the very least.

I'm not sure if t-mobile operates in other countries?


That fact makes me seriously doubt their claims of it being "privacy first". Perhaps Phreeli can be taken at their word about their own practices (but remember, we only have their word to go on with this), but T-Mobile is still handling the traffic, and they're not likely to be terribly concerned about user privacy.

Aside from their privacy claims, there doesn't really seem to be anything unusual in their offering. If you're the sort who wants/needs a burner phone, this offering doesn't reduce that need.

This whole article appears to be just a thinly-veiled advertisement.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: