Hacker Newsnew | past | comments | ask | show | jobs | submit | utrack's commentslogin

https://xkcd.com/2347/ , but with `fortune -a` and `cowsay` instead of imagemagick


I'm glad I can choose the level of formality. https://translate.kagi.com/?from=en&to=peepee%20poopoo&text=...


It's important though that Mullvad doesn't do port forwarding; you won't be able to seed effectively


I don't see any results on KDE Wayland; a (fairly old) open issue: https://github.com/openrecall/openrecall/issues/10

---

mss.exception.ScreenShotError: XGetImage() failed


Yeah, Wayland leaves this up to the compositors, and the compositors never bothered to implement it.


Not a lot of people know, but the 996 in Alibaba included 2 hour long lunch and sleep break, as well as 1 hour for a dinner at 6 pm.


I worked for ByteDance in Singapore. People would show up for work between 10 and 11am, lunch would start around 11:45am or 12, then people would nap until 2pm at their desk. A good, focused engineer could produce the same output as these engineers while only working in the morning


Exactly - I felt like the real work happened only 11-12 and 15-18, and maaaybe some meetings 19-20. Everything else was a fluff.


No time for kids and loved ones or hobbies outside of work.


To be honest, that Fastmail filter filters out almost every ad in any language.

{ "conditions": [ { "lookHow": "exists", "lookHeader": "list-unsubscribe", "lookFor": "exists \"list-unsubscribe\"", "lookIn": "header" } ], ... }


That's also going to match any legit mailing list you manually subscribed to though.


Yep - I put that rule at the bottom so that everything I want elsewhere is sorted by some preceding rule. That's how unfuck works too, though.

My ruleset looks like this now:

To: (tix|orders)@domain | From: orders@* | Subject contains (pedido|order|sipariş|confirma) -> something I bought, to Orders

To: tix@domain -> to Tickets

To: travel@domain | Subject contains (tickets|billete) -> to Travel

(some specific mailing lists by sender) -> to Reads - those are the newsletters I want to read

From: *@(domains of banks I have) -> to Banks - obviously

From: *@linkedin.com -> to Linkedin; it's noisy but sometimes useful

Header list-unsubscribe exists -> to Ads

That's about it. I don't remember the last time something I didn't want reached my inbox, however I go to the ads and do a mass unsubscription every couple of months.


Is there any way to subscribe to be notified when the Linux package becomes available?


The easiest way I can think of is for you to join the Discord server. Top right corner of the website (I'm aware that's not the best icon for it - addressed it to the team).

Shouldn't take long until Linux is up there, tho. I know the team started managing the build process.


Beta Linux version is now on the website. Feel free to go check it out :)


Jfyi, I'm doing exactly this (and more) in a platform library; it covers the issues I've encountered during the last 8+ years I've been working with Go highload apps. During this time developing/improving the platform and rolling was a hobby of mine in every company :)

It (will) cover the stuff like "sync the logs"/"wait for ingresses to catch up with the liveness handler"/etc.

https://github.com/utrack/caisson-go/blob/main/caiapp/caiapp...

https://github.com/utrack/caisson-go/tree/main/closer

The docs are sparse and some things aren't covered yet; however I'm planning to do the first release once I'm back from a holiday.

In the end, this will be a meta-platform (carefully crafted building blocks), and a reference platform library, covering a typical k8s/otel/grpc+http infrastructure.


I'll check this out, thanks for sharing. I think all of us golang infra/platform people probably have had to write our own similar libraries. Thanks for sharing yours!


https://github.com/m-bain/whisperX looks promising - I'm hacking away on an always-on transcriber for my notes for later search&recall. It has support for diarization (the speaker detection you're looking for).

I'm currently hacking away on a mix of https://github.com/speaches-ai/speaches + https://github.com/ufal/whisper_streaming though - mostly because my laptop doesn't have a decent GPU, I stream the audio to a home server instead.

But overall it's pretty simple to do after you wrangle the Python dependencies - all you need is a sink for the text files (for example, create a new file for every Teams meeting, but that's another story...)


Any good solutions for capturing the audio streams and piping them where they're needed? (I.e both microphone and speakers. I was wondering if I needed to mess with pulseaudio and/or jack (I mean pipewire under the hood, but I think those APIs sit on top and might be clearer))


Never mind, played around a little, and pulseaudio's cli API makes it easy enough to sling some loopback/virtual devices around that you can then read from easily enough.


So which are you "hacking away on" in the end?


It sounds great, but they could also block the settings' switches in the pull-down drawer first...

As far as I understand, this whole Find My/Remote Lock stuff will stop working when the thief pulls the bar down and activates the Airplane mode. Then all the data is one vulnerability away from being accessed.

This is the case on Google Pixel 8 Pro and it's been there for ages; I assume it's the same for other vendors.


Pixel 7 running Graphene OS: any sensitive toggle in the quick actions bar requires you to unlock the device before it can be activated.

I think the only quick action that doesn't require you to unlock the device is the flashlight.

Of course the thief can still forcibly shutdown the phone or open it and remove the battery.


> or open it and remove the battery.

Having just changed out the battery on my trusty Note 20 Ultra yesterday, this made me smile as I imagined a thief evenly applying heat to the back edges of the phone, carefully prying the phone open with suction cups and a series of plastic picks, gently dislodging six fragile micro-connectors, removing 11 different nano-sized screws, removing the wireless charging antenna, peeling back layers of ribbon connectors, removing the speaker module, dripping solvent into the battery compartment and then waiting ten minutes for it to soften the battery glue so they can start prying the battery out.

Maybe somewhere during that painstakingly onerous process, they'll pause and ponder their life choices. I know I certainly did! :-).


Most smartphones I've opened recently take far less steps than that, but yes, a heatgun / suction cups and a screwdriver are still needed nowadays.

The magic combo still (thankfully / sadly) works though.


>As far as I understand, this whole Find My/Remote Lock stuff will stop working when the thief pulls the bar down and activates the Airplane mode. Then all the data is one vulnerability away from being accessed.

Finding that "one vulnerability" is going to be pretty hard. The device is still going to be locked, you're very limited in what your exploit has access to. The common EoP used for rooting/jailbreaks are going to be out, because you won't be able to run arbitrary code on the phone. True, there are occasionally exploits in the bootchain itself (eg. checkra1n for iOS), but you could be waiting years/decades for it. By then the phone would be useless, and any juicy credentials already rotated. Best case scenario, you get some nudes.


I mean, rubber-hose cryptoanalysis is still the easiest attack vector, but root exploit releases are frequent enough to be a valid concern :)


I checked on my OnePlus 7 and indeed it's possible by default. There is a setting to disable access to the notification (/setting) drawer from the lock screen at least in Oxygen OS though.


Right. I just recently switched to iOS and was pleased to turn that on. It took a minute to remember why only sometimes I was able to access the settings pulldown until I finally realized I had to wait for face unlock to finish - I felt pretty silly when I remembered.

I'm surprised this isn't a feature on android yet.


This is also easily defeated by throwing the device into a foil bag until you are in a room with a faraday cage, or just a remote location without cellular service.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: