Hacker Newsnew | past | comments | ask | show | jobs | submit | wslh's commentslogin

I sometimes feel a bit weird about this. In the 90s it felt like "we" won the crypto wars: PGP, the fight over export controls, the Clipper Chip, etc. There was a strong sense that privacy and strong crypto had become settled questions.

You are safe until you are a real target. The exploit someone have ready for your safe browser was not used yet in the wild.

The phenomenon of google dorks would say otherwise.

That is the low bar, there are millions spent in searching for Google Chrome exploits

I think you could start saying that there are multiple options. The simpler is sharing the sheets in Google (or Microsoft) Sheets. After this, Then, I would have asked if there are any security and/or compliance issue to doing so to analyze other alternatives.

This is the first release. They test the market and optimize. BTW, I have an old M1 with 8gb and works well for some kind of [light?] development. Not using xcode but vscode.

Apple recently released open models. I wouldn’t be surprised if they start shipping increasingly capable models as part of their platform offering. That would fit perfectly with their hardware trajectory.

Full support now?

Depends on your definition. Most things apart from touchid and usb-display work really well on M1-M2.

I don't want to spoil Marty Supreme (2025), but there's a provocative line delivered by Kevin O’Leary (yes, the Shark Tank guy):

"I was born in 1601. I’m a vampire. I’ve been around forever."


I understand that this is mainly about the Apple business where having an endorsement/certification is a barrier of entry for others, even if it's artificial.


And, Gecko Security.


Flock is an awful company, but what's the trouble with Gecko security? Are you talking about https://www.gecko.security/ or something else?


There are documented public disputes about Gecko Security’s conduct when it comes to claiming credit for vulnerability research. For example, FuzzingLabs publicly accused Gecko Security of copying PoCs and submitting CVE reports for vulnerabilities that FuzzingLabs had originally disclosed, and of misdating their posts to make it appear they found them first. Gecko publicly denied intentional wrongdoing, but later updated their attributions to credit the original researchers [1].

That's one example that's already reported online; I also have another related situation that isn't public yet and involves one of my companies.

[1] https://www.bleepingcomputer.com/news/security/security-firm...



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: