Hacker Newsnew | past | comments | ask | show | jobs | submit | more martinsnow's commentslogin

Nah. It was amazing back then.


Yeah it was sort of cool. There were entire software products built on top of Notes and its forms and workflow.

I never had to program any of that, so can't speak to that side of it, but where I worked we used Notes to quickly build a lot of internal forms and workflows, and had some internal discussion forums and documentation in it, it all worked pretty well as I recall.

The one weird thing was we had to run it on OS/2. The only OS/2 machine in the server room.

We didn't use it for email though.


My only experience with it was in 1999, I took a distance-learning class to learn C++. The teacher would send us mail about assignments, reading that we needed to do, quizzes at the end of a unit, etc. We submitted our projects through that system too.

Maybe I'd have a different opinion now, but I remember it working pretty well for that purpose back then.


Rarely is that a problem with react itself. Poorly written applications exist in every flavor of language, framework and library.


Some frameworks though make it easy to fall into a good default, and others don't.


Yep, the more complex an app can be, the more complex the app will be


I don't understand this comment. All electronics assembling happens in Shenzhen. Be it Apple, Cisco or Microsoft. If anything this is par for the course.

What I personally would have liked to see was an EU based entity overseeing and taking responsibility for the project since neither US nor China really should be trusted with privacy these days.


No. These terms are not uniquely new.


Yes. This is a fancy electron browser.


I would love to know counter points instead of just down voting. I guess not being on the gravy train doesn't satisfy the paid for advertisement.


Are respondents truthful in interviews? I found my wife using a dating application. It was very easy, I just had to widen the geography I was searching.


Same here, I was lucky being a digital nomad, hopping about in western Europe. There also needs to be a willingness to have a long distance relationship though.


Galactic search enabled ;-)


lol for some of us i doubt multi galatic multi dimensional searches would yield nothing


your double negative implies confidence

and confidence is the most effective quality

he who knows himself and the enemy will not lose in 100 battles

but who can foresee fate's fickle finger of luck?


What data do you base that on?


Given the current US administration I don't see any respect. America wants a shining beacon on their tech and offerings while my continent Europe and others has to be painted in a worse light.


How is that related to this news? In Europe we have many potential lithium mines and in the US mines are currently being developed.


Why don't you do the legwork instead of asking rhetorical questions?


Legwork of what? Companies already have done the legwork to make it easy for strangers to send you money.


Companies that "do the legwork" of decrypting ransomware for the most part just pay the ransom on your behalf.


Presuming this results in a cryptosystem change for Akira, there’s a real number of victims who won’t get their data back as a result of this disclosure.

Whether the number is more than that of victims to date who can recreate this? Who knows


How would they get their data back if someone theoretically knows how to decrypt but never tells anyone.


I can’t remember the example (it was a conference talk a few years ago), but I’m pretty sure there’s LE and DFIR companies who also reverse this stuff and assist in recovery, they just don’t publish the actual flaws exploited to recover the data.


Key being generated insecurely is hacking crypto systems 101. The mere fact someone can reverse it probably means this is the first thing to check.


It was already disclosed to the bad guys that someone managed to break their encryption, when they didn't get paid and they saw that the customer had somehow managed to recover their data. That probably meant they might go looking for weaknesses, or modify their encryption, even without this note.

Other victims whose data were encrypted by the same malware (before any updates) could benefit from this disclosure to try to recover their data.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: