Hacker Newsnew | past | comments | ask | show | jobs | submit | sethherr's commentslogin

Not true. NYTimes had reported on it

I love that he got in because the trunk was left open, and then couldn’t get out.

Failure mode they hadn’t thought of yet


Trunks are supposed to have light-up safety releases for that exact scenario. Something tells me he's lying


There'a a video, it's not really a trunk. He's behind the seats of a hatchback/minivan/SUV

Afaik, there's no requirement to allow those doors to be opened from the inside, like there is for trunks.


There's a fine legal distinction between a trunk and a rear/5th door. Only the former is required to have the latch. The ipace has the latter.

I haven't crawled around in the trunk of one looking for the release latch, but there probably isn't a latch given that Jag doesn't even put them into the European models of their sedans.


Some of my vehicles have only had a glow in the dark plastic handle on a wire. It didn't even really glow. I'm not even convinced it wouldn't have broken off if ever pulled on.

I don't know if there are newer standards to this, though.


Trying to figure out how to align this with my experiences (which match the parents’ comment), and I have an idea:

Coding contests are not like my job at all.

My job is taking fuzzy human things and making code that solves it. Frankly AI isn’t good at closing open issues on open source projects either.


I think the fact that Apple is having to fight this fight is evidence of why they were right to make a secure walled garden. I don’t know of any other service I would recommend my mother use for securely backing up her phone.

I think the UK is ultimately going to roll back this law. I don’t think this means that iCloud E2E is hostile to Apple or its users. I think Apple is going to win.

The war isn’t won by telling people to use GPG https://moxie.org/2015/02/24/gpg-and-me.html


> The war isn’t won by telling people to use GPG

Tangent, a friend and I started using Delta Chat with a chatmail relay and it's incredibly friendly to get started, and hides the fact GPG tech is being used from the user; one can export a bundle of the key data as needed and easily copy the key profile to a second device over local wifi (I was impressed at how smooth it was).

Not that I've kept track, but Delta Chat's UX is probably the first easy, no-nonsense implementation of using GPG tech as a foundation but keeping it away from the user experience I've encountered (and liked). It has it's pain points but I mean it just works and my buddy and I chat all day over it using a public relay.


Doesn't Protonmail do this as well? Proton to Proton accounts will use gpg under the hood?


> I think the fact that Apple is having to fight this fight is evidence of why they were right to make a secure walled garden

Would you mind explaining? I don't see how that's evidence.


yeah guys, we don’t win by using free and open technologies, we win if we all buy {NAMECORP} devices, that’s true victory right there, backed by a real warranty, that’s what grandma wants


I've had files in Apple's iCloud for 14 years now (had to look that up) and they're still there. I have no reason to believe that they won't still be there after I am dead. Apple is a big company with a big reputation to protect.

I can't say the same for the smaller services.

I don't have any grandmothers still alive but would certainly suggest iCloud for all family members.

(But, FWIW, I copy down everything from iCloud annually and store on a portable 1TB drive to have my own cloud-backup.)


I don't know in which part of this planet you are living in, but: 14 years ago you might have lived a free society where your ideas and thoughts could not cause you to get arrested, deported or killed.

Yeah, back then Apples iCloud might have been the best suggestion.

If you are trying to extrapolate from the past - which is a good thing in general - do not go back ONLY 14 years from now, but try a bigger time span, too.

I was born in Germany. When I extrapolate from the past on ANYTHING, I at least always start in the year 1933.

No, not a good idea if you expect that within your lifespan some entity might be able to be forced to tell a regime where you are hiding right now.

Taking control of your own data is shitloads of work, I and understand people do not have time it, and have other priorities.

I am just making my point here on how to better extrapolate and project from the past towards the future.


Taking control of your own data is shitloads of work, I and understand people do not have time it, and have other priorities.

That's not a physical law, but just the result of the current technological landscape.


If you have a free and open technology that is sufficiently user-friendly that grandma isn't going to lose all her photos, I'm all ears


This is the major issue, most free and open technology is not marketed as well; isn't anywhere near as user friendly and often times takes a lot more time and effort to setup. Most people don't care enough for that.


Okay, secure E2EE backups we've more or less perfected for a while. There's good F/LOSS solutions for that. And if you're willing to pay a bit, thinks like Backblaze come to mind. In other areas it's true that open-source stuff is less polished, but not backups. I mean, a few months back Apple had a regression where they were un-deleting people's photos, that's pretty nasty.


You haven't actually listed one yet. I can't think of one myself that Grandma could use safely.


Duplicati was easy enough to convince the family. And for our home server, I set up Restic. I agree that this later one is tricky to set up properly and grandma would definitely struggle.


SyncThing. It's set-and-forget. All you need is two networked computers. Grandma and Grandpa can back up to each other's phones.


> a few months back Apple had a regression where they were un-deleting people's photos, that's pretty nasty

As failure modes go, not great, but I'd say strictly less bad for the average user than losing photos you didn't plan to delete


The 35mm film camera, developed by a photo lab, with pictures stored in a show e box


Shoe!


Modern devices are so locked down that you couldn't build such software even if you wanted to.

Those corporations are part of the problem, not the solution.


Plug in a phone, run adb pull /storage/emulated/self/DCIM or wherever that Android garbage OS stores photos these days.

Local, doesn't need encryption since there's no middle in E2E that you need protection against, and simple.

Grandma can setup ~/.zshrc `alias bak=cd ~/phonephotos && adb pull ...` to make it even simpler.


When I'm done teaching grandma shell scripting, I'll let you know


You're way too slow at teaching...


I turnips were watches, I'd wear one by my side.


Wild! I’ve lived in Chicago and San Francisco and have never lost power for more than an hour. And can’t remember the last time it went out at all, maybe 2 years ago?

What city do you live in?


I'm (not GP) in the Chicago burbs and expect to lose power 1-3 times a year. Usually it's for less than twelve hours but last year it was out for three days straight. Most recent outage was ~10 minutes long a couple weeks ago - I still haven't set the oven clock.

The cause around here is usually storm + trees + above ground power lines, plus a low enough population density that you're not top priority for the utility company.


Checks out - you aren’t in a city.

I was surprised that the original comment said they were in a city


I got to stay on my parents health care for additional years because of Obamacare - as have millions of others. That gave me flexibility to experiment and during that time I learned to program.


You have an incorrect definition of Class 3.

Class 3 allows pedal assist up to 28 and throttle to 20

https://thecyclistchoice.com/resources/electric-bike-classes...


I’m asking because I genuinely don’t know - what are “pages” here?


That’s a fair question. A page is the smallest allocatable unit of RAM, from the OS/kernel perspective. The size is set by the CPU, traditionally 4kB, but these days 8kB-4MB are also common.

When you call malloc(), it requests a big chunk of memory from the OS, in units of pages. It then uses an allocator to divide it up into smaller, variable length chunks to form each malloc() request.

You may have heard of “heap” memory vs “stack” memory. The stack of course is the execution/call stack, and heap is called that because the “heap allocator” is the algorithm originally used for keeping track of unused chunks of these pages.

(This is beginner CS stuff so sorry if it came off as patronizing—I assume you’re either not a coder or self-taught, which is fine.)


My understanding is it’s more akin to stage hypnosis, where you say bananas and they tell you all their passwords

… the articles example of a potential exploit is exfiltration of data.


All roles are networking roles


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: