Hacker Newsnew | past | comments | ask | show | jobs | submit | more DownGoat's commentslogin

Depends on the app I guess, but you can get far without needing a Mac with flutter etc. Sadly I think there still is some restrictions for some Apple hardware for the developer part of the app store. I'm not super familiar with that part, but we had some issues with some Apple legal terms which could only be accepted on a authenticated device, which means you need Apple hardware.


No.

Whatever solution you pick for iOS dev: Flutter, React Native, Xamarin etc etc, in the end we will always meet the same thing: iOS SDK. And iOS SDK only runs on Mac, unlike Android.

Unless Apple decide to port their SDK to Windows/Linux (which I believe will not happen), you can't practically avoid Mac.


They don't just start encrypting stuff as soon as they have a foothold. They spend some time on your network siphoning out valuable data, compromise backups, and staging for re-entry.


It sucks for the people who got their personal information caught up in this. They do more than just encrypt your files, they typically siphon as much data as possible from the companies before they execute the ransom part.


Some virologists suggest that the common cold corona viruses that are endemic, might have been deadly when novel, and caused similar pandemics, but mutated to something less dangerous over time.


It's not that they mutate specifically to less dangerous versions; rather the subtle variations that don't kill their host before spreading persist while the ones that are rapidly fatal quickly disappear when containment measures are put in place.

Which makes this one bad as it's infectious for a long time before there are symptoms or it kills the host - hence the panic.


I've wondered that too. What if in human pre-history (10,000+ years ago) modern rhinoviruses and coronaviruses that cause common colds, were once terribly deadly. We could just be the descendants of survivors who evolved immune systems that were able to deal with these viruses?

One of the techniques of trying to make vaccines is to attenuate it by exposing to to different hosts; so that it will mutate into a form that's less harmful to humans; kinda the opposite of what probably happened here, where a virus that was not deadly to either bats or pangolins but caused havoc when it got to us.


SARS-2 isn't particularly dangerous for children. Most of them don't even have symptoms. Maybe all of our cold-causing coronaviruses are deadly when they present for the first time to an adult but since we all get them as children, our immune systems are better prepared.


It need not even be pre-historical. Until indoor plumbing, germ theory, and modern medicine in general, infectious diseases were one of the few remaining modes of natural selection that humanity couldn't control. The usual solutions to nature's challenges like increasing density to allow for specialization and economies of scale or trading with neighbors just made the problem worse. Given how many people died due to the introduction of diseases to the Americas and the black plague in Europe, infectious diseases have definitely been a powerful driver of our evolution in the common era, let alone 10,000+ years ago.


Reminds me of an old "Bastard Operator From Hell" story. https://www.theregister.co.uk/2004/03/09/bofh_protecting_bod...


Can even set 3D settings for each friend, which can be handy. For some of the cooler things you can do with Teamspeak through extensions see the Arma 3 ACRE plugin.

http://www.armaholic.com/page.php?id=19324 https://www.youtube.com/watch?v=3N1q4NgyCMs


It's also likely naive to think that data will only be in the hands of the supermarket. Who do they share it with? There is no transparency for where your data ends up. What if you are okay with sharing the data with the supermarket, but not dissapprove of them selling it to a data broker. We need more fine grained control than just disallow everything, or allow everything with no restricions.


We should have a National Do-not-track Registry, just like we have a Do-not-call Registry [1].

[1] https://en.wikipedia.org/wiki/National_Do_Not_Call_Registry


And it would be ignored just as much.


No password managers really help in this scenario, as the attackers have access to the machine the client runs on. Any malware will simply wait untill you unlock it, and then siphon out any credentials.


True in that case as that has nothing to do with the password manager. Any password that you would type in manually is also vulnerable.


The gist of it is gathering credentials from the initialy compromised machines, and using them to access other computers on the network. A lot of this is possible because of the way Windows handles authentication between computers. Mimikatz is a tool that really made this method of lateral movement much easier for attackers, and Microsoft has been slow to adapt defences. Over time the attackers will eventually gather some admin credentials, and then it is really game over.

It is hard to defend against, unless you want a system that constantly prompts you for your password everytime you want to do something. Frequent password prompts is not really good for security either. Current mitigations really just slow down the attacks and gives you time to respond. If they are left alone they will manage to gather credentials over time.

https://github.com/gentilkiwi/mimikatz https://www.sans.org/reading-room/whitepapers/detection/mimi...


The "mimikatz" problem (aka memory protections on the lsass.exe process) has basically been solved by Microsoft, they call it "Credential Guard". It works by doing some trusted boot stuff and using the hyper-v hypervisor to protect certain regions of memory from even the OS itself.

It's pretty complicated and requires server 2016 or windows 10. More info here - https://docs.microsoft.com/en-us/windows/security/identity-p...


@mox1: ‘The "mimikatz" problem (aka memory protections on the lsass.exe process) has basically been solved by Microsoft, they call it "Credential Guard". It works by doing some trusted boot stuff and using the hyper-v hypervisor to protect certain regions of memory from even the OS itself.’

How about running the OS in a Virtual Machine, that evaporates on exit and you get a new clean image on each invocation.

“All the King's horses and all the King's men couldn't put Humpty together again”


CAPTCHA is typically one of several defences, and you underestimate the cost they cause attackers. One of the main problems for an attacker is not really the dollar cost of buying a CAPTCHA solver, the real inconvenience is really the time it takes to solve on. The attackers go from less than a second to complete a request, to 30-60 seconds to complete a request, a significant slowdown.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: