Hacker Newsnew | past | comments | ask | show | jobs | submit | jandy's commentslogin

Primary driver for me (finally) learning tmux.

I think you can see this when you look at the downvotes on that GitHub issue on any comment which suggests gating AI access behind a paywall.


Sadly, seems to be abandoned. Last commit a year ago.


That was surprisingly awesome.


Yep, this. I’ve switched to Claude for a while (because I can’t afford max plans for both) and nobody in the real world has any idea what it is I’m talking about. “Oh it’s like ChatGPT?”


Claude is also difficult to consistently pronounce for a non-English speaker. Sometimes people dont say that because it can get misinterpreted. ChatGPT is something easy on the the tongue and very difficult to mis-pronounce.


I know a lot of people who refer to it as ChatGTP which I assume stands for German treebrained performers


https://chat.mistral.ai/chat/12da2e83-f3f1-4a47-b432-753cac2...

I suspect they chose that name because of the proximity with the word "cloud".


The CEO is also more puritan than the pope himself considering the amount of censorship it has. Not sure if they are even interested in marketing to normies though.


> The CEO is also more puritan than the pope himself considering the amount of censorship it has.

In that case, you should try OpenAI's gpt-oss!

Both models are pretty fast for their size and I wanted to use them to summarize stories and try out translation. But it keeps checking everything against "policy" all the time! I created a jailbreak that works around this, but it still wastes a few hundred tokens talking about policy before it produces useful output.


Surely someone has abliterated it by now


Ah yes, the Latin-originating French name that has a variant at least in every Latin language is hard to pronounce for non-English users.


Might want to consider a different name, given there’s an open source CI/CD tool called GoCD already. https://www.gocd.org/


Yeah, who’s going to pay for your single person AI-powered vibe coded calendar organiser product when nobody has a job?


Fwiw, that’s actually an En dash not an Em dash. You need a Shift in there to get an Em dash.


It depends on the keyboard layout. Some (US) do have it like you described, but others have the dashes reversed.

Both make sense, to a degree. On the one hand you can argue that the em-dash—being longer—should require and extra key, but on the other hand it has more uses so it should not have the extra key to be more accessible.


Ah I hadn’t considered keyboard layouts.


Not OP, but one I came across yesterday was `date`.

Linux: `date -d '10 mins ago'` Mac: `date -v -10M`

There's loads of tiny differences like this. Often just old versions, and you can pull in the latest with `brew` or something.


Another one is GNU find assuming the current directory if omitted, while BSD find explicitely has to be told the directory to search in.

It's nothing complicated, but breaks many scripts if you only test them on Linux (more or less the same problem like case-insensitive filesystems).

I'll have to add, though, that one could argue that OSX is the one behaving like "traditional UNIX", since most of it's tools derive from BSD-Versions. GNU tools are the ones that deviate from this (which I still find more convenient in day to day use).


Sure, I know there are lots of differences between GNU and macOS; that's not what I'm asking about.


I'm confused by the "not affected" remarks. I thought the issue was any site which passes data through cloudflare could be leaked by requests to a different site, due to their data being in memory. Have I misunderstood?


Inside of TLS, 1Password uses an additional SRP handshake that negotiates a static secret (like a DHE), which 1Password uses to both authenticate the user and set up an additional AES-GCM transport encryption.

So even a full memory dump of what's transported in TLS should, as long as it's properly implemented, only reveal an SRP authentication session and subsequently symmetrically encrypted data.

(And inside that SRP-negotiated encryption should only be more symmetrically encrypted vault items, and RSA-encrypted vault keys. If properly implemented even complete TLS breaks do not break 1Password at all, even the cloud version. Properly implemented being the key words of course.)


I typically think of "encryption inside of encryption" as a boondoggle more likely to somehow break things than make things stronger.

My confidence in that has dropped slightly in the past day.


I'm no expert, but intuitively it would seem that encryption-inside-encryption would be snake oil when they're meant to guard against the same layer/attack vector/threat model: for example, if you nest Serpent inside AES for a single local file encryption operation (ahem, TrueCrypt), that seems very gimmicky.

But if the encryption are supposed to protect separate and independent OSI layers or operation steps, then it would seem to me it's fully valid - specifically, in this case: - TLS dissolves inside HTTP-HTTPd endpoints or any reverse proxies, if used - additional SRP-negotiated AES dissolves inside client to the process doing key handling - final "actual" key encryption, handling at-rest encryption, and to make sure it's zero-knowledge to the storage handler

They seem to me to be guarding information leakage against very different parts of the key mangement process (storage, manipulation, http transport), and that doesn't seem to be snake oil to me.


>for example, if you nest Serpent inside AES for a single local file encryption operation (ahem, TrueCrypt), that seems very gimmicky.

I take it to be insurance against a future vulnerablility discovered in one of the algorithms. For some scenarios it seems like the cost can be worth it.

On the other hand, nested hashing has always seemed counter productive as it seems plausible that nesting hash functions can decrease the randomness of the image.


PGP email sent over TLS would be an example of nested encryption that people take for granted. So would E2E encrypted chat systems like iMessage, Signal, and WhatsApp, which encrypt each message on the machine, then use TLS to communicate with servers.


Interesting, thanks for the reply.

I wonder which password manager the original Project Zero thread referred to then if not 1Password.


It could be that it was 1password, but the only clear text was URL parameter names or JSON keys, with the values as encrypted strings in base64 or similar.


The update from 1password indicated that there was application layer encryption happening in addition to the TLS encryption, so a breach of the TLS protection did not expose any sensitive data. Presumably other sites are in similar situations. But don't take my word for it, go change all your passwords.


Any hosted password manager should be "host proof". They should not have the decryption keys and it should not be possible for them to disclose your unencrypted passwords no matter how careless they or their intermediaries are. They should be sending an encrypted blob over the wire which is only decrypted in your client app or browser when you enter the passphrase.


1Password said that even though they were not affected, they will still move away from Cloudflare due to bad optics.


> Presumably other sites are in similar situations.

Not to my understanding. 1password uses client-side encryption, using keys generated from your master password. This means that any data transmitted over the wire is already encrypted, whether over SSL or not.

Most other sites do not do this, at all, in any way. If you use a website that use'd CloudFlare's SSL termination, change your passwords, cancel your credit card (if you sent it to that site in the past few months, eg Uber/Lyft).

> go change all your passwords.

Yes, correct =].


If you'd seriously cancel your credit cards over this, I'd love to hear how you model that threat relative to all the other risks inherent in using a credit card anywhere (not just online).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: