Hacker Newsnew | past | comments | ask | show | jobs | submit | oefrha's commentslogin

iOS Safari's reader mode heuristics has always been mediocre at best, and it's getting less useful by the day as more publications knowingly cripple it. It used to be that you can get around some soft paywalls with reader mode, especially if you turn on "Use Reader Automatically" which distills the content before JavaScript kicks in to remove it. Nowadays that works on fewer and fewer commercial websites, and the other day I noticed something truly shocking on a pretty mainstream tech publication (don't remember which one unfortunately): I can see like two paragraphs of content before the paywall, but when I turn on reader mode, the content shown is literally a list of Christmas laptop deals (that is not visible on the non-reader page), with the title being the only relevant thing.

I’m afraid out of all the waiting strategies available in Puppeteer/Playwright, waiting a fixed period is the worst possible. Maybe consider exposing the proper waiting strategies, load/domcontentloaded/networkidle, maybe even the more fine-grained ones https://playwright.dev/docs/actionability

I did some tests and it didn't seem like a fixed wait, when I kept making network requests the render timed out entirely.

I made the comment based on the delay parameter (“Wait time in ms.”) in the API. I didn’t test so don’t know what the default behavior is.

You mean like the piece of crap that was WAP?

> Back when malware was more prevalent among the lower class, there was also far more freedom and interoperability.

Yeah, “the lower class” had the freedom of having their IM accounts hacked and blast spam/scam messages to all contacts all the time. How nostalgic.


The virus-infested computers caused by scam versions of Neopets, are not dissimilar to Windows today.

Live internet popups you didn't ask for, live tracking of everything you do, new buttons suddenly appearing in every toolbar. All of it slowing down your machine.


What and how much do I need to pay to add Don Jr. to my company’s board? $10MM converted to TRUMP? $100MM?

I don't see the word powerpoint anywhere in https://github.com/QwenLM/Qwen-Image-Layered, I only see a code snippet saving a bunch of PNGs:

  with torch.inference_mode():
      output = pipeline(**inputs)
      output_image = output.images[0]
  
  for i, image in enumerate(output_image):
      image.save(f"{i}.png")
Unless it's a joke that went over my head or you're talking about some other GitHub readme (there's only one GitHub link in TFA), posting an outright lie like this is not cool.

> I don't see the word powerpoint anywhere in https://github.com/QwenLM/Qwen-Image-Layered,

The word "powerpoint" is not there, however this text is:

“The following scripts will start a Gradio-based web interface where you can decompose an image and export the layers into a pptx file, where you can edit and move these layers flexibly.”


Oh okay I missed it, sorry. But that’s just using a separate python-pptx package to export the generated list of images to a .pptx file, not something inherent to the model.

I've been using Chromium's display: masonry in some internal apps since they introduced it behind a flag in Chromium 140. Looks like they just have to rename it now?

I have too. And the Safari version that was in the betas/tech previews.

One of the biggest arguments over the last couple of years was what to call it. A lot, lot of ideas put forth as alternatives to "masonry" which wasn't thought to be great for non-English speakers. I'm glad they finally nailed a name for it!

The other big argument was over how to activate it. Is it a grid? Is it a flexbox? Is it a brand new animal?

Now I just need to figure out the best way to implement this semantically with a polyfill for the next 30 months until it's baseline.


I actually started using Safari's `grid-template-rows: masonry` when it came out, but unfortunately Safari TP crashed a lot on me when using that for some reason. Chromium's never had a problem.

No sharing link needed. Before I deleted my Facebook account more than a decade ago, it was already suggesting random people I met once IRL and are at least two hops away in terms of existing FB relationships. I had very few friends (~20 IIRC).

Id suggest FB & co also uses location tracking & proximity to expand their social graph continuosly? Most people just dont care about these privacy settings, and if you have a vast number of users, it doesnt matter if ther are 10% "techsavy people" because the mass is just big enough to create profiles on which you then easily can compute/guess other connections & joints in the social graph.

Yes, that’s my assumption, although IIRC I never gave FB location permissions, so it might be temporarily sharing an IP address by being on the same WiFi or something. Come to think of it they had access to WiFi SSIDs as well in the early days even when location permissions were off.

Scams are extremely high margin businesses and as such can spend very generously on advertising. Consequently the Googles of our world love them.

You know perfectly well what blocking VPN access means in common verbiage. I don't understand the motivation of these "hey look my WireGuard connection to home isn't blocked, you guys don't know the true meaning of VPN" comments that inevitably pop up in these discussions. Like come on, this is a tech forum, you're not impressing anyone for knowing the technical definition of VPN and how to set up WireGuard.

Please make your substantive points without crossing into personal attack.

https://news.ycombinator.com/newsguidelines.html


I fail to see how this is a personal attack. I was basically saying I don’t understand why people always have to post these ostensibly on-topic, actually off-topic humble brags (?). Where’s the attack? “You know perfectly well”? People have really thin skins these days if that counts as an attack. I see multiple more aggressive comments in this very comment tree (e.g. “it's an ignorant and arrogant take”) and IMO even those hardly crossed the line.

"You know perfectly well" is already edgy, but when you follow it with "I don't understand the motivation of these $dumb-comment-paraphrase" and then a "like, come on" and a "you're not impressing anyone", you've crossed well into personal attack.

You're a great HN user and commenter and your contributions are much appreciated! I don't want to come across like a bag of bricks but if you would use this feedback to fine-tune a bit, that would be appreciated.

(You may be right that other commenters were breaking the guidelines worse, but we just don't come close to seeing everything, and a lot of what we do see happens by random access.)


It's not so easy to setup. I mean: it's easy but it hits some real world constraints.

Example 1. I run Blockada on my Android phone, so I can block every ad even in apps and I can more or less firewall them (the outside calls). Blockada runs as a local VPN and unfortunately Android allows only one active VPN. So it's either Blockada or Wireguard. I'm with Blockada but I might occasionally want to disable it and enable Wireguard. I never did it yet because:

Example 2. WireGuard does not run everywhere. My little home ARM based server has a Linux kernel with some special driver to manage its hardware (it's pretty common on non-Raspberry ARM devices) and WireGuard does not run on it. It requires a newer kernel that I still cannot upgrade to and maybe I will never be able to. So I don't have anything to VPN to.

I might eventually put online a Raspberry, even an old model 3, as a bastion host on the home end of the VPN, but then it would be something else to care about and to power. It's not worth the mind share and the wattage so far.


Here's me making a similar argument a month or so ago

https://news.ycombinator.com/item?id=45926849

Besides the political implications, I think we should try to find an objective taxonomy, it's clear that privacy VPNs and network security VPNs are different products semantically, commercially and legally, even if the same core tech is used.

Possibly the configuration and network topology is different even, making it a technically different product, similar to how a DNS might be either an authorative server for a TLD, an ISP proxy for an end user, a consumer blacklist like pihole, or an industrial blacklist like spamhaus. It would be a non trivial mistake to conflate any pair of those and bring one up in an argument that refers to the other.


To flip that though, what about just using those sketchy-ass malware-laden "residential IP" VPN providers and route your traffic through someone else's hacked up VPN running on a Fire TV stick they bought off JimBob for $200?

The exhausting "well actually" masks a corrosive argument, that if you can't enforce the rules in a rigid and rigorous fashion, the rule is fiat.

It's not that he doesn't know the difference. He's making the argument that since there's no _technical_ difference there can be no legal difference.


Yeah, it's an ignorant and arrogant take on the legal system.

In most places the law is exercised pragmatically, interpreted by presumed intention. That's why legal precedent is important. You likely won't convince any judge being anal about the wording (maybe if the law gets applied for the first time). You can derail anything semantically. Furthermore, despite apparent belief, laws are frequently formulated in such a way that a particular wider term is extended to help interpretation. Eg. "It is prohibited to use a VPN in a way capable and intended to obscure one's physical internet access point identification". (Not a lawyer, not a native speaker, don't get anal with this wording, either.) I very much doubt any legally binding document would even use the term 'VPN' primarily to describe the technical means for anonymization, but rather describe it functionally.


If you block the commercial VPN services, you increase the burden of entry. You block the 99%. It's not a legal discission, it's a business decision.

And this is rather an anemic take. The (proposed) UK VPN ban that was recently discussed here have a definition on what exactly is a "VPN" for the purposes of the ban (basically "VPNs generally advertised to normal consumers") but a lot simply shouted "ssh go brr" (and definitely did not read the proposed law). These "let's go techical" thinking never flies with the poeple who makes such legislation, and in (probably unpopular!) opinion we should talk to them in terms that they can understand. Yes, we don't want that law, but having a purist take would probably alienate regular people.

It doesn't really matter that a single person has found a loophole because many, many other people don't have such a luxury, and that's what the lawmakers are aiming for.


I have worked for fintech companies that mandate VPN use as a security measure.

It's going to be interesting when the majority of the UK accesses the internet via VPN because of the increasingly ridiculous hoops that the UK makes them go through, and the government tries to stop them while also allowing VPNs to be used by the tech sector.

I agree, these are two separate legal processes powered by the same technology. But the internet doesn't have any awareness of legality (thankfully) so we're stuck with only the technical meaning.


They mandate you use Nordvpn? Or surf shark?

I doubt that.


No obviously not. There are specialist products for this, and it's not hard to roll your own if you want.

The tech is the same, though. That's the point.


> The (proposed) UK VPN ban that was recently discussed here have a definition on what exactly is a "VPN" for the purposes of the ban (basically "VPNs generally advertised to normal consumers")

It’s not taking about IPsec tunnels between networkers, or a connection back to your home. It’s talking about surfshark


Maybe, at the moment, because when Surfshark is banned people will learn how to make their own VPN (like I said, it's not hard), or find some other source. And then the government will move to ban that, and we'll go round the loop again.

The point, again, is that the tech is the same, and there's no method for determining what purpose the VPN is being used for.


Tailscale is really not that hard to set up. There's an Apple TV app for it, even. And who doesn't have some friend in another state or country that would like an Apple TV?

Your friends don't find it uneasy that you can be tunneling illegal activities through their internet connection and have the FBI knocking at their door in a few months?

Exactly, I have friends from other countries. Friends I really like, I would not give a VPN access to my internet connection to most of them. They have to be the perfect intersection of technically competent (so that their computer doesn't get turned into a botnet) and fully trustworthy.

I do actually give VPN access to my mother that is not technically competent but I have full access to her computer and locked her down as much as possible


This word you used... friend... what does it mean to you?

Obviously not everyone have friends in all of the countries they want to tunnel to (or want to ask them). Otherwise these VPN services wouldn't exist.

I live a thousand miles from another country. No I don't have friends in another country and I don't even know anyone with friends in another country except immigrants or spouses of immigrants.

I am concerned that this comment reads like an advert, it's completely unnecessary and out of touch.

How is it out of touch? GP comment makes it sound like the technical know to setup a VPN exit node is this crazily esoteric super weird nerdy thing that no one would expect anyone normal to even know about. Installing an Apple TV app onto an Apple TV and mailing it to a friend requires zero command line usage.

But no, Tailscale did not pay me for this comment. I do happen to know someone that works there though.


Don't bother with these comments. I made a similar reply to yours a few days ago and while most found it useful, a surprising amount of whataboutism occurred - no, Apple TV hardware isn't common, or no, only old people have them, or no, why would you use an Apple TV when [X] can do it cheaper, or no, why not self-host and not be dependent on Apple and Tailscale?

Entirely missing the point that setting up a VPN exit node on your own or someone else's connection is a crazily esoteric super weird nerdy thing outside of communities like HN, and Tailscale on an Apple TV box will not only work but automatically update itself with no intervention on your part, and that the person whose house it is in needs extremely minimal technical skill to do what you tell them to over the phone.


Thanks. With people in their own independent bubbles it's hard to tell, but with a guess at 25 million Apple TVs out there in the wild, I didn't think it was that esoteric, but what do I know.

Thanks again, devilbunny


I'd say that even the idea that you could VPN into your own network and forward all traffic through it is pretty far from the mainstream. Let alone how to actually do it. Most people think of VPN as a way to avoid porn blocks or getting tagged for piracy. But, as you and I both noted, the technical know-how for setting up Tailscale is not that high, and for using it is almost nil. Turn it on, pick an exit node, go. Combine that with a device that's intended as a consumer appliance that makes maintenance a non-issue, and you have a very good solution for the family geek.

You're very welcome.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: