Hacker Newsnew | past | comments | ask | show | jobs | submit | oddlama's commentslogin

I've written something like this for NixOS a while back [1], which generates infrastructure diagrams directly from the source of truth (albeit not as pretty as isoflow). I'm sure this could be applied to other declarative tech stacks aswell!

[1]: https://github.com/oddlama/nix-topology


This is great if you only have a single disk, but if you have multiple encrypted disks that are unlocked in the initrd this way, then if you can gain control flow by faking data on the last decrypted disk you can still gain access to all the previously unlocked partitions.

Of course you cannot unseal the secret from the TPM anymore.


If you have tpm encryption on your boot disk, then you can simply store decryption keys for your otyer disks on it.


What to do for a single root fs spanned over 2 encrypted partitions on 2 separate disks?


I can think of plenty real world usecases. Take for example a network interface that can send or receive predefined packet structs.

Imagine each packet requires a size header. When you want to send multiple packets at once, you now want to optimize that and only write a single initial header to the interface, preceding the data.

With variadic generics, you can enable a syntax like `interface.write_packets(packet1, packet2, packet3, /* ... */);` which writes the packets in the desired optimized way. It can internally construct a serializable data tuple from the variadic generics and add the correct header only to the beginning.

Without variadic generics a similar syntax is only possible with macros, which means that it cannot be implemented as a reusable trait.

> It would seem to me, you're just skipping the part where you give your tuple a name, but is that even a good idea to do?

Sometimes you explicitly don't want to require naming the tuple for flexibility, like in the example above.


And additionally I would't want anyone on my network path to be able to read what data I exchange - even if it is a static site.


That’s a valid concern too. For a lot of static sites I visit, I don’t particularly care if people know I visit them as I live a boring life. My primary concern is malware and verifying identity.


Not parent, but I'm doing the same thing and I have had 5 leaks out of (currently) 387 accounts over the past 4 years (which is when I started doing this).

Oh and none of the involved entities ever acknowledged the leaks. I'd also be highly interested in the rates other people encounter.


I've been doing the same over a similar time span. 5 years for me. However, i am yet to find any leaks.

I get a ton of spam, but they ALL are sent to my publicly listed email address in my git commits. I'm seriously considering turning that email into a honey pot.


The "leak" could be the company selling their email list, yes?


Or some kind of involuntarily passing on the mail addresses, like a breach of some kind.


Could be. If they sold the email addresses, that is one reason they would not "disclose" it, it was just routine business (and not business they are eager to disclose, although I suppose it's mentioned in some fine print in their privacy statement somewhere, hypothetically, maybe).


I haven’t counted, but have had a similar rate over 10 years.


I haven't looked at the project but would assume that several people generated their wallets by using this tool. The attackers were thus able to generate keys for existing wallets by simply bruteforcing the measly 31 bits that were used in the tool's random initialization.


Just a battery would be the simplest option. Just measure time until empty.

If you want higher time resolution, there are several fully integrated hall effect current measurement ICs out there, like for example the ACS723.

If you need even better accuracy or resolution and you can spare 100 bucks, just buy one of the Nordic Power Profiler Kits.


That is the way. Once you get into actual measurement there is plenty of hard problems, like your device might only wake up for 10ms, take few hundred mAs of current and go to sleep.


1.5A. Peak consumption of an ESP32 is around 1.5A. I once had to add a supercap from junk bin to Vcc to stop it from bootlooping.


That doesn't sound right... it would be ~5W, WiFi is supposed to max out at 100mW (so even at 10% efficiency it would be still just a watt)


Nothing here requires uploading the image to some form of cloud service. Do the recognition locally - maybe on a phone connected via Bluetooth. Never have any information leave the device and you will have significantly less privacy concerns.


If anyone wants to learn about GPS from the ground up, there's an excellent website with interactive explanations by Bartosz Ciechanowski that I can wholeheartedly recommend [1].

His blog also covers other topics in a similar style - it's a real treasure trove.

[1] https://ciechanow.ski/gps/



I for example just wouldn't like anyone to be able to see what data I exchange with any server, be it small profile blog or a login page.


    I for example just wouldn't like anyone to be able to see what data I exchange with any server, be it small profile blog or a login page.
Note: It's really, "see and modify undetected" what data you are exchanging with any server.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: