Hacker Newsnew | past | comments | ask | show | jobs | submit | ejr's commentslogin

I wish more people took a sane approach like this. I can't tell you how many times I've had to turn down - politely at first - sales from seemingly reputable companies. I find it hard to believe they would approach anything else in the organisation with that level of clumsiness.

I'd rather buy from someone who is actually willing to listen to me.


I imagine there are a number of authors who don't want to be bothered by the extraneous bells and whistles on a new system. It reminds me of this clip of George R.R. Martin. https://www.youtube.com/watch?v=X5REM-3nWHg


I didn't downvote you, but I imagine it has less to do with what you said and more with how you said it. NSLs as a "boogeyman" is a poor substitute for lacking evidence. So far, we know that these things are sent to US companies which are in the business of collecting and bartering data. While Apple has a corner of that market, it isn't its entirety.

So here they have snippets of our information Ex: email, credit card, home address for app purchases. However, it's just as possible to use the phone normally without downloading a single app. That leaves the SIM provider holding the bag for your information ready to be collected by the authorities. Effectively, Apple washes its hands of your data on phone calls, but there is no reason to presume lies regarding backdoors on iMessage.

Also, I'm not an "Apple fan boy". I'm just unconvinced of widespread eavesdropping at Apple and that they're willing to risk destroying such a massive advantage over Google's Hangouts platform.


In a post-Snowden world, when it comes to leaking your data, companies are guilty until proven innocent. That is the only sensible stance to take given what we have learned in the last year.


This.

The Director of National Intelligence James Clapper tells Congress that the NSA doesn't conduct intelligence on American citizens, and then later gets caught out. He committed Perjury without any ramifications.

Why do people think that CEOs are telling the truth when they are all in the same boat paddling up shit river?


I'm unclear as to what you mean by that last sentence. If someone is running a message system that is distributed and keys to encrypt and decrypt are store locally, not on the server, then why wouldn't it be secure? The message system may be anything as simple as an addressing system

Ex: Email, which is run by any number of providers, however if an email client is configured to use PGP and access is via POP/IMAP and not webmail, it's still secure as far as we know. A message system that may not be email, but still doesn't store keys on the server, still provides no way for cops to read it. Except perhaps to see some message was sent, not what the message was.


If the jurors in that area of the country have a special incentive to keep these trials going, then that should be grounds to move them elsewhere. Local businesses may be benefitting by having the increase in outside revenue due to the influx of legal teams and such.


It's worth noting that the ubiquity of these "on a computer" type patents and similarly questionable other software patents is directly a result of the poor handling of the entire patenting process as well as general incompetence Ex: http://arstechnica.com/science/2014/02/uspto-issues-patent-f...


I think widespread 3G is making the range less of an issue now. I can see providers - third party or not - using existing cellular networks offering data-only plans that make this far more feasible.


You'd just be exchanging your 'cell phone bill' with a 'data plan bill'. The phone company really doesn't care if you stick that SIM in a tablet or in a phone.

From the phone company's view there are only data networks, voice networks are dying out. Voice is just another form of data.


You would think they only view it as data networks!

Instead, Verizon for example, likes to charge per minute, text message, and media message if you are not on an "unlimited" (which is actually limited unless you are truly grandfathered in from an unlimited plan)

I think a lot of people would welcome a 'data plan bill' only and get rid of the nickel and diming


Of course they do. That's abusing peoples misunderstanding of how this all works under the hood. The whole notion of 'air time' makes 0 sense with a cell phone, the phone is off the air more than 90% of the time even while a conversation is in progress.


Widespread is one of those relative terms... finding a carrier that understands people use their phones outside of population centers has always been a challenge for me.


Fair point. I'll add that carriers also selectively drop speeds for certain mobile users based on arbitrary data caps and, in some circumstances, type of phone. Ex: My Blackberry inexplicably loses speed after the first week of the billing cycle.


data-only plans solve all issues, we don't need "talk" or "texts" to be included. Just carry around a "hotspot" (it get's hard when you have a family plan since it would be to expensive to buy multiple hotspots.


"messaging" Implies that these notices travel from A to B likely in your own network, but you added "secure". This suggests the network itself is only password protected and is a compromise - or two? - away from revealing what is being sent. The purpose of encryption is to limit the damage should eavesdropping of the network occurs.

Ex: Your routers, switches, RAID storage etc. are not immune to rootkits. However, if your message from A to B is encrypted and only decrypted locally by B, you've limited the exposure of this information.


Everything is only a compromise or two away from being revealed. It may be one compromise away and we don't know it (yet). Cat and mouse my friend, that is all.

There are no passwords - we use our own CA system, PKI, carefully selected cipher suites, physical security, mutiple vendors' products, logical isolation, tiered architecture, an IDS system, mirrored environments, tamper detection and automatic key disposal.

And I still don't sleep because there are a thousand ways around it all.

Still, we have insurance.


That's a rather bleak outlook, but I don't blame you. Obviously you can't name which specific company you work in, but may I ask which sector in finance you do?


It's the chains of being responsible for the security :-)

Integration between various companies, nothing more. We're a hub.


Thanks for the info. I work in email encryption so it's useful to know what specifically makes it appealing.


This comment should be higher. CommonMarkup gets rid of the naming hiccup by having no direct ties to the original spec except syntax, which is arguably a dialect anyway. Atwood gets to have One Syntax to Rule Them All - I sincerely doubt Atwood wanted Yet Another Markdown as he said - and the community benefits from having the syntax ambiguity resolved by comprehensive reform.


'Markright' (adopting another direction other than 'up' or 'down) or 'Markwrite' (implying natural-language composition) would have been other interesting choices. Or even 'Markround' (completed/balanced like a circle).

Each is closer in spirit to the original – a "mark-up" with a different spin for ease or correctness – and close enough in sound/rhythm for drop-in replacement use. And, each is still different enough to avoid any unearned implication of official Gruber-ness.


I understand that hackers tend to be irascible often, especially online, but parting shots like these are in very poor form. Consideration and goodwill tend be diminished when you can't be graceful no matter what the other party said. Especially considering that other party was originally the impetus for this in the first place.


You also have to consider the other party was subtweeting all day and calling people dicknoses.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: