Hacker News new | past | comments | ask | show | jobs | submit | ptrf's comments login

yeah, I just tried to connect using irssi from my non-exit relay, works just fine...


As pointed out by blibble, the blocking is almost certainly due to Mr. Angry having got himself onto a list of open proxies somewhere along the line; any effort directed at tor, whether masking, restricting, or outright blocking, is in my experience always aimed at exit nodes only - because there's simply nothing to be gained by blocking relays.

Note that I have no particular insight into this specific case, but have opered on irc.perl.org for some years now (and was freenode staff for a while) and am working based on a >95% correlation with previous similar cases that I've dealt with myself.


Odd, my experience differs.


Please read the transcript in its entirety. Specifically the latter parts about trade agreements and bi/multilateral negotiations. Placement of liability (w.r.t. the US common law) makes reform hard to envision yes, but that is just a minor concern in the bigger picture.

The surveillance state was never intended to stop terrorism, it is the true terrorism. This malice cannot be explained by incompetence.


For MySQL RDS instances, it's most certainly possible to do offsite asynchronous replication without the use of read replicas, as described in their documentation here: http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/MySQL....

The guide does mention using a read replica to replicate from, an intermediate RDS instance between your offsite, but I've had no trouble replicating directly from the master instance.

One thing they don't cover is replication over SSL. AWS has failed to mention this shortcoming in the docs last time I checked. To have MySQL replicate over SSL, the master and slave both need an SSL certificate signed by the same CA, which would require you to obtain a cert+key signed by the AWS RDS CA.

Of course you have the option of tunneling the replication connection into a haproxy or stunnel running on an ec2 instance, but that has it's other shortcomings. You can't use the ELBs, since you can't register the RDS instance with an ELB.


Copenhagen Suborbitals Supporter here. I just wanted to let you know that these guys have an awesome youtube profile over here: http://www.youtube.com/channel/UCPzFMJIsp2fOQ_ic5a_zXTA

Also, you may find more information on this page http://www.copenhagensuborbitals.com/support_us.php (Yeah, shameless linking to the support us-page.

Peter Madsen writes in Danish on his blog on the Danish newspaper Ingeniøren: http://ing.dk/blogs/rumfart-pa-den-anden-made

Kristian von Bengtson is blogging on wired.com: http://www.wired.com/wiredscience/rocketshop/


Using DANE in tandem with DNSSEC ensures that such changes wouldn't go unnoticed.


Why do you think so? Let's assume I have complete control over a TLD zone file (.com), into which you inserted the DS records of your DNSSEC-signed domain (example.com). Let's say my goal is to MITM users connecting to https://www.example.com relying on DANE for trust of TLS certs.

I surely cannot modify the records in your signed zone because I don't have your KSK/ZSK private keys. What I can do instead is preparing a duplicate of your zone, signed with a freshly-generated KSK/ZSK pair; in that zone, I will change only the DANE records (or also the A records, depending on the kind of MITM attack I need to mount), and I will sign everything with my new keys. Then, I start MITM'ing my target so that:

* DS records replies for example.com contain the DS record for my own KSK/ZSK keys.

* NS records replies for example.com direct to my own nameserver (or even simply MITM the glue records, depending on the nameserver setup).

* My nameserver will reply as authoritative for example.com, and will serve the modified zone, which will be fully DNSSEC validated.


OP is linking to an infographic for some reason. Source article is at http://www.fastcompany.com/magazine/157/jack-abraham-ebay-mi... dated July 22, 2011


http://www.engadget.com/2011/06/11/detroit-diyer-cooks-up-st...

The title links to the mobile page of engadget for some unapparent reason.


I know it's a joke but it raises a good question.

As I understand it, the "friction" induced in your finger is purely a sensation. I mean how much force can it actually apply to your finger?

Also, the actual nature of the surface isn't altered - I wonder if you have two sensations at once?

Personally, I've been waiting for this for a long time... touch-typing on a screen (as it is common today, iphones and androids being ubiquitous) sucks, as you mistype regularly, even as you look at your screen.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: