Hacker Newsnew | past | comments | ask | show | jobs | submit | oink's commentslogin

No it doesn't, and anyone who would draw a conclusion about an entire profession from the actions of a handful (positive or negative) can, in my opinion, go fuck off.


Yep, those are all grounds for interesting ideas that one could discuss over coffee for a good while. The entrepreneurs identified in the article that is being criticized however seem to have very bland businesses (coffee intern placement doesn't really capture the imagination).


Actually internships are quite eye-opening stuff when done at the right place. So i'd say the internship website was a brilliant idea.


Why does that matter? It's just politics and bullshit, a bit OT I guess.


IMHO this isn't about politics. Political issues include: strategies in foreign policy, the introduction of new taxes, the reform of the health system etc. I wouldn't care if somebody posted commentaries pro/contra this or that position. A political statement doesn't refer to the opponents race, gender etc. though.


Do you think that the Obama phenomenon has nothing to do with race?


Because MySQL's cozy like PHP.


Cozy like a bed of nails. So many sharp pointy bits that you barely notice. Just don't try to move or you'll get spiked.


You found a security exploit, feel special. Finding an exploit isn't a voucher to rant against the people responsible for it. The bottom line is that nobody can be 100% sure that their data is secure after they've put it in the hands of a third party.


The author did not claim anybody can expect or provide 100% security. The write-up was (among other things) about something more important - how do companies respond when presented with an important security issue. 37signals responded fairly poorly and that's useful information. Interestingly, this is not the first report of a somewhat strange attitude they seem to have regarding possible exploits -

http://evilpacket.net/2009/jul/9/basecamp-one-wrong-click/


I didn't read the post as a rant at all. If anything I think that the author has articulated an important factor in evaluating any third party provider's security infrastructure: attitude.


I think my point was a lot more nuanced than you give it credit for.


There's an interesting tangent towards the end -

"Web application security is still an immature field, and many of the layers are sufficiently poorly designed that issues like this will pop up for a good long while. Just like buffer overflows have been a weak spot for C security as long as the Internet has been around, escaping issues will continue to be a weak spot for web security for as long as we're afflicted with this particular architecture."

It seems like a field not only in its infancy but also oddly unglamorous and under-reported. There's no repository (that I know of, at least) of vulnerability reports of major web apps, for instance, yet it's easy to look up an exhaustive history of Flash vulnerabilities down to the seventeenth decimal sub-version. And yet the various XSS/CSRF/etc vulnerabilities are easily as dangerous and as exploitable. Twitter's dreams of a billion users and a new internet were not exposed by a buffer overflow, after all.


I think you're probably wrong about that; more security practitioners are familiar with OWASP than with any other security advocacy/advisory group.


That's possible especially since I'm not a 'security practitioner' and I'm essentially talking about a subjective personal impression - that it's taken less seriously, is less reported and incidences of specific vulnerabilities or exploits in specific apps are not tracked in the way they are for operating systems and major applications. This may, in part, be because in the case of web apps fixes are immediately available to all users. On the other hand, you can head to the RoR download page right now and click your way to downloading the current vulnerable version of RoR. At no point will you get a suggestion to check for recent security advisories or patches.


Now with 90% fewer snickers.



Damn, Drudge Report used to look slick.


“I don’t have money to travel.”

Fair enough if it’s true, but for many people who say this, it would be better to say, “I’ve chosen to spend money on a lot of other things, so now I don’t have money to travel.”

Shall we never forget the lovely Victorian ethic that the poor have only themselves to blame.


I don't see how this Victorian ethic applies. He's not talking about the poor, but rather those who have "chosen to spend money on a lot of other things", i.e. the middle-class.


He assumes you make more than $2 a day. http://chrisguillebeau.com/3x5/you-are-incredibly-rich/


And given his audience is probably 80% American, he'd be right.


The argument suggests that your net worth is mostly your own choice and has little to with circumstances. My point is that this flawed notion is responsible for other, more noticeably flawed notions.


No his argument suggests that the distribution of your net worth is mostly your own choice, which it on the whole is.


Well, he did say "Fair enough if it's true", fwiw.


I'm not sure. I'm quick to toss stuff out.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: