Hacker Newsnew | past | comments | ask | show | jobs | submit | more shrubble's commentslogin

Solaris had Trusted Extensions for X11 which shipped with Trusted Solaris 8.

In 2000.

Solaris 10 had it built into the base OS and integrated into both the CDE and GNOME desktops they shipped. With OpenSolaris it was released as open source under the non-GNU CDDL license.

In November 2006.

Wayland was started in 2008.


The app is not activation-locked to a remote server, from what I can tell.

There is nothing stopping the author from buying a 2013 Mac Pro "Trash Can" with 64GB RAM, and running it in perpetuity. RTF import/export won't stop working, documents won't bloat beyond what 64GB RAM can handle, etc.


Israel reportedly has unredacted data feeds from the USA(this was part of the Snowden leaks, Guardian link: https://www.theguardian.com/world/2013/sep/11/nsa-americans-...).

This means that they can read even the personal email of Supreme Court justices, congressmen and senators.

However they have a gentleman’s agreement to not do that.

“Wink”


However they have a gentleman’s agreement to not do that.

Trying to remember back to Snowden, I think I recall that not only DON'T they have such an agreement, but the intelligence folks consider this a feature. The US government is Constitutionally forbidden from reading "US persons" communications, but our Constitution has no such restriction on third parties. So if those third parties do the spying for us, and then tell our intelligence folks about it, everybody wins. Well, except for the people.


That's pretty optimistic.

I think it's just more likely that we send them whatever they ask for when they ask for it.


Why would the US send unredacted personal email of justices and senators to a foreign country?


To circumvent US law prohibiting spying on Americans.

It's cute, really. Country A turns a blind eye and even helps country B vacuum all of it's citizen's data. Then country B gifts back to A. And vice versa.

Since country A didn't do the surveillance, it didn't break any laws. Furthermore, it's legal to accept data from third parties.

As to why country A would allow even its senators and congressmen to be spied on by B? That's obvious - country A's intel agencies are most interested in their budget!

But this is a special case. It's Israel.


And why would country A’s lawmakers allow that legal loophole to be used against themselves? They wrote the laws no? Or are they being blackmailed, or is their power a facade?


Congressmen don't have classified access by default. Even those involved in oversight often rely on briefings which are written by the people potentially breaking the law and include whatever they choose to include, or not. It's akin to regulatory authorities that operate by asking those being regulated 'Are you still operating under all appropriate regulations?'

And laws are also written extremely broadly, which gives the intelligence agencies extreme leeway in interpreting them as they see fit. And even if they go beyond that, it's not like there are any consequences. For one of the most overt - James Clapper indisputably lied under oath and absolutely nothing happened. Furthermore politicians are generally ignorant on most topics, especially on anything remotely technically related. But revealing that ignorance is politically damaging, so they turn into yes men on most of these topics.


It’s not a secret that there’s a legal loophole and how it might be used. And congress don’t need classified access to change the law. So I don’t see how any of that relates. The problem of effective oversight is likewise orthogonal to the issue I raised which is that “getting spied on by their own subordinate agencies” is conduct that has been legally permitted by lawmakers


Country A can just a well turn a blind eye on direct spying like it has done so numerous times in the past.

> Since country A didn't do the surveillance, it didn't break any laws.

Of course it did, that's where the data came from!


1. We don't have a right to privacy.

2. The power of the constitution ends at the border.

It's pretty sick, but that's what it amounts to. The CIA can't operate within US borders but it can operate at and outside borders. That means sending messages internationally are fair game for warrant-less searches.


That doesn’t explain why lawmakers would allow their own government to (indirectly) spy on them. Or are they so full of integrity that they would say “I must be spied on as well as my constituents, you know, for fairness”? /s


Because it places a higher priority on the desires of that foreign country than on the privacy of its justices and senators?


Imagine asking about they why in 2025.


link to any credible report?


Updated my post with a link, thanks.


A large number of telecom companies have Alcatel routers like the 7750 . My personal thought was that the control plane OS was likely based on Plan9, though I never had access to any source code to verify that.


its based on TiMetra's TiMOS, a router startup alcatel acquired around 2013


If you ever get to Colorado Springs, in the shadow of Cheyenne Mountain is a state park, Cheyenne Mountain State Park. While it’s due to the dry conditions, all the trees and shrubs there look twisted and contorted, like a scene from Roadside Picnic.


Curious if the architecture is similar to what is called “systolic” as in the Anton series of supercomputers: https://en.wikipedia.org/wiki/Anton_(computer)


I was an architect on the Anton 2 and 3 machines - the systolic arrays that computed pairwise interactions were a significant component of the chips, but there were also an enormous number of fairly normal looking general-purpose (32-bit / 4-way SIMD) processor cores that we just programmed with C++.


I spent a lot of time on systolic arrays to compute crypto currency POW (Blake 2 specifically). It’s an interesting problem and I learned a lot but made no progress. I’ve often wondered if anyone has done the same?


You should check out AMD's NPU architecture.


Not really. I work for NextSilicon. It's a data-flow oriented design. We will eventually have more details available that gradually explain this.


The Bind resolver required each zone to have an increasing serial number for the zone.

So if you made a change you had to increase the number, usually a timestamp like 20250906114509 which would be older / lower numbered than 20250906114702; making it easier to determine which zone file had the newest data.

Seems like they sort of had the same setup but with less rigidity in terms of refusing to load older files.


The Etudes book is considered a classic, especially among FSU programmers-the book was licensed for a small amount, translated into Russian and used in many classrooms.


It's absolutely a classic!


You should expect a lot of friction around having to install the extension; if you can figure out how to do it without the extension, it will lead to faster uptake.


I wish it can be done like that, Actually we had 3 options:

1- To have a website that acts as a gateway for the nostr websites, but this way we will lose decentralization 2- To build an app that can directly access the websites "Nostr browser" 3- To have an extension that acts as the gateway for nostr websites

We went through the 3rd option which provide the easiest and mostly native way to access the websites


Yes people were complaining in the late 1990s about large plants being bought by the Chinese and then the Clinton administration allowing 20k visas for the Chinese workers to take the plant apart and ship it to China.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: