Hacker Newsnew | past | comments | ask | show | jobs | submit | kennethfriedman's commentslogin

The full version is also available on YouTube: https://www.youtube.com/watch?v=p2LZLYcu_JY


I had the privilege of taking one of Strang's classes a few years back. He is still incredibly sharp, and has a great sense of wit.

During one lecture, he was half way through solving a problem on the board when he jumped straight to the final answer. He then turned to us, and with a deadpan delivery said:

"We haven’t proved it, but that’s okay, we only live so long."

And then he moved on to the next problem.

I've quoted that line a lot since then.


https://kennethfriedman.org

Handwritten HTML and CSS (no JS required). I've been working on my personal site in fits and starts since 2013, so it's by far the longest thing I've ever worked on.

I'm pretty happy with it (but would love feedback & suggestions!)


As the OP here, I could not agree more.


We should expect better, and you deserve better! Luckily, the issue has been fixed :)


Thanks for the heads up. I blame our site's Chief CSS Officer (me). It has been fixed!


John Gruber at Daring Fireball has covered the meta-story of the publication of these articles extensively.

Here's his take on the most recent update:

https://daringfireball.net/linked/2021/02/12/bloomberg-big-c...


Gruber is the least likely to have an unbiased opinion on this since Apple was part of the story.

I don't know what to make of this, but I'm finding it more difficult to believe that the story is not true.


I don't trust Gruber to be free of bias, but on the other hand, everything he says in his response is correct. This is a non-followup to a non-story.


Gruber's article says

> Today’s follow-up from Bloomberg offers no evidence either.

The follow-up article actually has quite a bit of evidence.

e.g.

> “In early 2018, two security companies that I advise were briefed by the FBI’s counterintelligence division investigating this discovery of added malicious chips on Supermicro’s motherboards,” said Mike Janke, a former Navy SEAL who co-founded DataTribe, a venture capital firm.

maybe there are reasons not to believe the testimony of Janke. but saying the article "offers no evidence" is just bunk.


The word of someone who's not an expert in the subject, who wasn't in the meetings and only heard about them via an unspecified number of intermediates, and doesn't even work there but "advises" the companies? Forgive me, but for the only sourcing of their main claim, that's a bit too weak to clear my standard of evidence.


it's not the "only" sourcing of the main claim, merely an example. (did you read the article?)

> Alarmed by the devices’ sophistication, officials opted to warn a small number of potential targets in briefings that identified Supermicro by name. Executives from 10 companies and one large municipal utility told Bloomberg News that they’d received such warnings. While most executives asked not to be named to discuss sensitive cybersecurity matters, some agreed to go on the record.

> “This was espionage on the board itself,” said Mukul Kumar, who said he received one such warning during an unclassified briefing in 2015 when he was the chief security officer for Altera Corp., a chip designer in San Jose. “There was a chip on the board that was not supposed to be there that was calling home—not to Supermicro but to China.”


> There was a chip on the board that was not supposed to be there that was calling home—not to Supermicro but to China

An extra chip on the board sounds like pretty solid physical evidence.

What other information do we have about this chip and what it was doing?


typo, .com


Thank you!


Here's Sussman giving a talk a few years ago on the same topic of "flexibility": https://www.youtube.com/watch?v=cblhgNUoX9M


Danke.


For anyone looking to understand Roam, I would suggest searching "roam cult" or "#roamcult" on Twitter.

I'm not one of them — but there is a hardcode, devoted fan base that are convinced it's the best thing since sliced bread. Whenever that occurs, it's worth trying to understand why.

I think the bad homepage is (somewhat) intentional: they only want people who are willing to look past the home screen and actually give it a try... and (I believe) they want to avoid the audience who is trying it just because of a flashy landing page.


Thanks for the search term.

But it's funny, what you see as positives I see as negatives. When something has a devoted fan base but nobody else uses it, it tells me it's something incredibly niche for a reason, and therefore probably not applicable to me.

And a bad homepage would be a horrible intention. Why would any product ever avoid an audience? Why would you only want people willing to look past a bad homepage? That sounds like it's screening for people who have a lot of time to waste. I'm not sure why that would be your target audience.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: