Readit News logoReadit News
Posted by u/Octabrain 3 years ago
Ask HN: What is the thing you've built that you regret the most?
Given the very interesting comments on the "Ask HN: What is the most impactful thing you've built?", I was wondering about something similar: Things you regret based on ethical implications, bad technical decisions you made convinced you were right but regret/cringe about later, failures on miscalculations on budgets that provoked a bad outcome in the company etc whatever.

Thanks in advance.

AlotOfReading · 3 years ago
I built a lighting system for <hotel chain you've heard of> to save energy by turning off hallway lights when not in use. The environmental aspect was great and saved hundreds of thousands in electricity. Someone eventually realized that the mesh network I built to connect all the lights together and report usage statistics could also be used to track employees moving throughout the building and catch them taking unauthorized breaks in the stairwell, so that's its main purpose now.

I'm a lot more paranoid about privacy these days.

SoftTalker · 3 years ago
Almost all software can be abused or co-opted for surveillance purposes. It's one of the reasons I've grown more disillusioned with computer tech over the years.
TeMPOraL · 3 years ago
I had this realization in stages.

1. Almost all software can be abused or co-opted for surveillance purposes.

2. Some software comes already designed for surveillance purposes up front.

2a. This includes plenty of well-known mass appeal software; importantly, the customer-facing marketing copy and the investor pitch can present a completely different value proposition.

3. Software doesn't become used for surveillance or abuse by accident; there are actual human beings who make a decision to use it in this fashion, or commission it for this purpose.

3a. The "misguided programmers harming people by trying to solve social problems with technology" meme is dumb for many reasons, but it's also distracting (possibly purposefully so) from the fact that it's not software, or people who coded up the software, that are the primary culprits. The coders that were too naive or too self-interested to refuse work or blow the whistle may have some responsibility, but we should start talking about the people who made the decisions to commission or repurpose technology for bad purposes.

dathinab · 3 years ago
> Almost all software

which is why it's less of a technical problem and more of a social problem

people need to realize that with how the technology is today we can't afford to rely on marked self regulation for a lot of things especially wrt. privacy protection it just fundamentally does not work

(Or in other words, such usage of employee surveillance should be just plain out forbidden by law not just to be used but to be deployed)

GeertB · 3 years ago
In many cases, software is like a tool. I provided a screwdriver: generally it's used for good, but sometimes it's used for assembling a bomb. By providing the screwdriver, I have no influence on how it's used. For me, it's important that most software I write is free software with few restrictions on its use. That way, I ensure that my screwdriver is available for all good purposed, even though I acknowledge that I cannot prevent it from being able to be used for evil. It's a tricky balance, but I trust that the good uses of new tools outweigh the evil. A war on screwdrivers won't prevent missiles targeting civilians.
WheelsAtLarge · 3 years ago
>"can be abused or co-opted"

I tend to believe it, "will be."

All tech will eventually be used to try to gain an advantage in war and surveillance. I don't think there's a way to prevent it.

pimlottc · 3 years ago
The term often used for this is “dual-use”:

https://en.m.wikipedia.org/wiki/Dual-use_technology

amelius · 3 years ago
It's not just computer tech. Obviously, advances in say molecular biology can cause much more trouble down the line.
someweirdperson · 3 years ago
> used to track employees moving throughout the building and catch them taking unauthorized breaks

There's probably more illegally unpaid overtime than there's unauthorized (boss doesn't like) breaks. The data can likely prove that, too.

pannSun · 3 years ago
> I built a lighting system for <hotel chain you've heard of>

I am sick and tired of how often extremely pertinent information has to be neutered in this way. And I am utterly disgusted at how the legal system is used to protect scummy corporations like this unnamed hotel chain.

I wish we had strong laws that prevented employers from even thinking about threatening employees for talking about their work. Or collective bargaining to make sure employers don't have the leverage to impose such one-sided contracts.

Symbiote · 3 years ago
What was the requirement?

My apartment building has lights in the hallways that are only on when needed, but they just use a basic infrared sensor.

AlotOfReading · 3 years ago
* Minimize BOM cost. Only 1 in N lights would actually have the full sensor complement, so they needed to communicate.

* Minimize installation cost. They just wanted to plug into a light socket, not run network cabling.

* Push data logs to a central server. They didn't want to send a tech physically to each lightbulb to get data for e.g. energy usage certifications.

plus other obvious requirements.

All of that made it really easy to just stick a beacon tag inside employee badges and measure the RSSI from the mesh lightbulbs (since they already tracked that to discover who their physical neighbors were). Instant employee monitoring.

wlesieutre · 3 years ago
Systems like that are commercially available now, even as far as pitching "we don't know what to do with all the data but by golly we're collecting it for you."

For location tracking they specifically called out things like equipment carts, but it was implied that it could track other bluetooth devices.

AlotOfReading · 3 years ago
I did this almost a decade ago. I'd be very surprised if it wasn't commercially available now. Heck, the system I wrote might even be one of them for all I know.
Havoc · 3 years ago
Wow. Well at least it was 100% good faith your side. Can’t really help it that some tools can be dual used
IAmGraydon · 3 years ago
How could they tell who exactly triggered the system? Also, they didn't already have security cameras?
naikrovek · 3 years ago
anything you write that can be used to pry into someone's life will be used to pry into someone's life. without fail.

that's the rule I've always followed.

Deleted Comment

geenew · 3 years ago
Need to know <=> Need to log
Negitivefrags · 3 years ago
What is so bad about catching people taking unauthorised breaks?
toofy · 3 years ago
for starters the idea of “unauthorized” in terms of taking a couple minutes to yourself is questionable.

i have never worked in an office environment where people didn’t routinely unwind for a couple minutes. the way we’re treated in an office setting vs those outside an office is in a lot of ways disturbing. a couple years ago my friends dad lost his job of 25 years because he was caught sneaking around a corner, out of eyesight of his foreman, to eat a candy bar. he had been warned about these “unauthorized” snack breaks in the past.

this idea is entirely foreign to any of us who sit at a computer coding or doing whatever desk job that sometimes we don’t stop to think of how ludicrous some workers are treated—my entire post college career, if i wanted to eat a candy bar, i just ate it.

were a decision to come down in just about any office full of engineers which said “unless authorized, you cannot drink or eat anything. if any unauthorized stoppage of typing occurs, there will be consequences.” people would be justifiably outraged.

but they’d be “catching” “unauthorized” non-typers.

the idea that someone somewhere decided to put trackers on human beings is wild.

toss1 · 3 years ago
The same thing that would be bad about using your phone GPS location sensors to automatically send you speeding tickets every time you wander >1mph over the limit.

Even without intending to, everyone would go from a ticket or two per decade to dozens of tickets on every commute.

"But the law is still the same!?!"

Of course it is, but changing from poorly scalable human-required surveillance to always-on, fully-scaled electronic surveillance, changes it from completely reasonable to massively oppressive.

If everyone's productivity is fine, and people take unauthorized breaks, no one will notice, all is cool. If one or two people are noticeably unproductive, the manager will likely investigate and fix the unauthorized breaks, which is also fine.

But with constant electronic surveillance, it's no longer about meaningful productivity differences, it is about oppression.

eCa · 3 years ago
Would you like to live in a society where the laws are the same as they are now, but it’s impossible to break them and not be caught?

(I know I’m jumping right to where the slippery slope ends.)

Deleted Comment

kelnos · 3 years ago
It's more about the negatives of pervasive electronic surveillance. The marginal benefit to the business of catching employees taking a break (which, honestly... they're probably all overworked and should have more breaks anyway) does not outweigh the downsides of our inexorable slide toward being monitored as we do everything.
fknorangesite · 3 years ago
> What is so bad about catching people taking unauthorised breaks?

Your profile indicates that you've commented on HN on a weekday.

Don't worry - this behavior has already been reported to the authorities.

052c7028e · 3 years ago
When I was at Akamai about 5 years ago, I was involved in building the system for making their CDN compliant in China. There were two main features, and they were activated on all servers running inside mainland china (not HK, macau or Taiwan)

1. Logs of the CDN were sent in real time to the ministry of technology -- there was about a 15 minute delay if I remember correctly, and they could impose fines if they were delayed. The log included the url visited, the IP address of the visitor, and a few other things. Perhaps the user agent? I forget.

2. The ministry of technology had a special API to block URLs on the CDN. Basically, they provided a list of URLs that would return a 451, and of course those logs also went to the government.

No other country had this kind of access at the time, but it was considered critical for the business to continue to operate in China. As I understand it, these are required to comply with chinese government regulations, and other CDNs like Cloudflare and Cloudfront have also built similar capabilities. Perhaps jgrahamc can comment on what cloudflare did?

I feel quite guilty about being involved with that project, but the business was set on building it, so I did what I could to limit the blast radius. I would not be surprised if someone got arrested or was killed because of it.

xwowsersx · 3 years ago
Glad you regret it. Not trying to rub it in as I don't think anything productive will come from self-flagellation, but this is truly awful and I think the US should have laws that make it a crime for any US corporation to participate in this sort of thing.
052c7028e · 3 years ago
I was powerless to stop it. I was just a junior engineer, and it was decided by the CEO to do the project. So, actually, I feel I made the right choice -- I participated in the project but worked hard on making sure it was as limited as possible. I successfully advocated for several categories of logs to not be sent because they were not required by law.

So, yes, I regret I couldn't do more, but I don't regret the choices I made with the information I had and the position I was in.

Deleted Comment

wcerfgba · 3 years ago
Thanks for sharing your story. I am curious what you would do next time if you found yourself asked to build something that you found unconscionable? Would you refuse to work on the project?

Other engineering disciplines have a strong focus on 'engineering ethics' and it may be more acceptable in different branches of engineering to refuse to build something that you consider unethical. I do not know if there are any professional bodies or laws which protect the employment rights of individual engineers who refuse certain work on ethical bases. But I feel that software engineers should be able to exercise their conscience, reference a standard of professional ethical principles, and refuse to work on such projects.

pototo666 · 3 years ago
If I use a VPN like v2ray and write some crazy shit about Dictator Xi, is your system able to know what I write and who I am?

I'm very curious because many Chinese people including me are doing that daily.

ospider · 3 years ago
That what I do on a daily basis, so far so good, I haven't been seized by the police for what I published outside of the Great Fire Wall.
jeffrallen · 3 years ago
Akamai has very tight relations with the US Government. So what was probably happening is that the USG was fine with Akamai treating it's users like this because it was getting a copy of those URL filters and access logs too. Don't know if that should make you more in or less sorry for being involved.

(It would make me more sorry. Sorry.)

stevewatson301 · 3 years ago
While I wouldn't put any authoritarian moves beyond China's reach, the ICP recordal mechanism already requires government approval.

In that case, isn't it better for user privacy (not that anyone cares about it in China) to receive an ICP recordal but then wait for an actual request from law enforcement to turn over the logs?

Also, while you wouldn't see anyone from Amazon or Cloudflare comment on your thread, both have the ability to stream logs to a destination, and that is also exposed to customers, so I don't think they needed to build anything else.

052c7028e · 3 years ago
All of the sites served had an ICP license. This is separate, and the CDNs in China have regulations specific to CDNs they need to comply with.

At the time, Akamai also had the capability to stream logs, but the ministry of technology required a specific, custom interface to receive them, which required engineering work, especially to do it for an entire country without the customers configuring it themselves. I would be extremely surprised if it required no engineering work at Amazon or Cloudflare to deliver the logs in the way they requested.

slim · 3 years ago
Thank you. This is very informative. And don't feel guilty, nobody will get jailed for visiting a website. This is mostly for censorship.
iopq · 3 years ago
There was a person in Beijing that was arrested for a post on Twitter. Government surveillance was able to track him down in real life, which I think is deeply troubling
nibbleshifter · 3 years ago
> This is mostly for censorship.

As if that makes if any better?

jasonhansel · 3 years ago
This is kind of like saying, "don't feel guilty, this weapon won't be used for murder, it's mostly just for arson."

Dead Comment

Simon_O_Rourke · 3 years ago
I worked in an Ad-tech start-up in Berlin run by two of the most evil f*kers I've ever encountered. I built out their principal ad auction algorithm and a lot of the back-end to support it, and all they did with it was target vulnerable groups of people at particular times of the week when they thought they were at their lowest ebb.

One meeting in particular really stands out still, a social media giant that everyone knows was in town meeting the founders to sell additional personalization data. Before that meeting, I thought things the start-up were doing were a bit sketchy, maybe borderline unethical. During the meeting itself, it was more like sitting around a table with Dr. Evil and a few henchmen. They were actively, unambiguously picking vulnerable groups for ad re-targeting. And that's not even the worst of it, the meeting wraps up and one of the founders says "OK guys, let's go get some beers and bring some girls". Then this despicable excuse for a man promptly walked out into the office, points at a few female employees and says "You, you and you, come with us now".

haxiomic · 3 years ago
Thank you for sharing

I hope this is a message that gets through to young devs. If someone is hiring you, you'll be making them more money than you cost. When you interview with someone, you're interviewing them too. You get a choice in who you make rich the more we make cruel people wealthy the more power they have to damage our society

agtech_andy · 3 years ago
I worked at a fintech and it was obvious that some of our users had serious issues with gambling/game spending. Like so bad that they would run out of money regularly before their next paycheck.

This fintech didn't exploit them, but it was very obvious how this data could have been used to exploit them and other addicts.

Uptrenda · 3 years ago
This is like something from a movie. You write really well, by the way. You could easily write a book if you wanted to.
HellsMaddy · 3 years ago
Name and shame.
danuker · 3 years ago
What were the vulnerable groups? But it's ok if you don't want to answer.
VoodooJuJu · 3 years ago
>"OK guys, let's go get some beers and bring some girls". Then this despicable excuse for a man promptly walked out into the office, points at a few female employees and says "You, you and you, come with us now".

And did everyone clap?

LVB · 3 years ago
Early in my career (late 90s) I worked at a big company that just loved getting patents, had a big patent wall and did plaque presentations, etc. I got swept up in this and patented some "novel" (:eyeroll:) uses of a device that a partner/supplier made. Yay... I got a plaque and a few bucks, but Big Corp was never going to commercialize these uses, that was clear. They just wanted to run up the patent count.

But the partner corp was just a startup, trying to break into some markets, and now had some of those opportunities encumbered by patents and rightfully viewed our partnership as not in good faith (we didn't tell them about the patent work). The engineers at the partner firm were fairly pissed off at me, since I knew them well on a personal level and my name was on those patents. And naturally Big Corp promptly forgot about that business, never doing anything with the "IP".

I've thought about chucking those patent plaques in a fire, but I keep them in a box as reminder of that little snippet of my career, which I'd otherwise probably block out.

vlovich123 · 3 years ago
Pretty sure it’s Qualcomm. Not familiar with any other companies that were so proud of their parents to build a wall to them
mangamadaiyan · 3 years ago
Patent walls were (are?) a patent feature of many BigCorps. I've seen at least three, and none of them were QualComm.
DavidPeiffer · 3 years ago
There are certainly others. Micron has a patent wall. For a period of time under CEO Steve Appleton, meetings with engineers were prohibited [Fridays or half of Friday?] because the engineers should be working on parents during that time.

My understanding is their strong patent portfolio was a good part of why they are still around after the massive consolidation of DRAM manufacturers through the 80's and 90's.

cipherboy · 3 years ago
IBM has done this as well.
mkeeter · 3 years ago
It's pretty common – I've seen a wall o' patents in at least two (non-Qualcomm) offices!
qwertywert_ · 3 years ago
Got one, and we are much smaller than qcom.
duxup · 3 years ago
McData did that when they existed.
zinodaur · 3 years ago
I worked for a company that made deep packet inspection based network equipment. Western customers mostly used it for "security" and media streaming man in the middle attacks (actually a useful feature saving lots of bandwidth).

The boxes were also sold to Syria and Burma, and were used to facilitate censorship and human right abuses

Scoundreller · 3 years ago
And limiting torrent speeds to 40k/s during "peak" hours. Which I kinda understand, but not when its unilaterally launched against the 3rd party providers leasing the lines too!

(I guess Bell Canada, which also sells TV services, lost too many customers over this policy to their unthrottled competitors)

https://www.cbc.ca/news/science/small-isps-fight-ruling-that...

Canadian telecom regulators are gutless.

Though I kinda liked it when my university throttled napster and torrents, because that meant my IRC downloads went very very fast!

liketochill · 3 years ago
In my memory Napster was before torrents? Did the idea for torrents, receiving pieces of the same file from multiple peers, come from Napster?
badrabbit · 3 years ago
Ultimately you are like a kitchen knive maker whose knive was used in a stabbing. It was entirely the stabbers fault and does not diminish the utility of your product.

In a corporate setting, mitm'ing TLS and blocking sites by category is routine practice (better ways to stop bad stuff but expensive firewals are a waste when most traffic is TLS).

TaylorAlexander · 3 years ago
> Ultimately you are like a kitchen knive maker whose knive was used in a stabbing.

I don't know about this. The difference with knives is that they are an old technology, basically they have always existed. If you are responsible for creating a new technology, especially one that is not certain to exist without your involvement, the calculus is different.

wheybags · 3 years ago
There's a difference between selling knives to the general public, vs seeking out violent criminals and specifically marketing your knives to them.
curious_cat_163 · 3 years ago
That’s how it is justified. However, there are always moral implications of the work one does.

Sometimes, the moral calculus is done only retrospectively and that’s when it really becomes problematic.

derangedHorse · 3 years ago
> In a corporate setting, mitm'ing TLS and blocking sites by category is routine practice

Deep packet inspection is a terrible practice in my opinion. It adds more security vulnerabilities than it typically helps avoid. I’ve seen one implementation use client software to extract keys from a machine to send to a centralized server. How some companies don’t see how this model can be easily exploited is beyond me. Me and a VP friend of an organization have had long debates about this topic and he insists it makes more sense for him because the employees have been more competent at the companies I’ve worked at than the company he managed (which could be true since his company had high turnover leading to many engineers being hired out of need rather than evaluated merit).

Zak · 3 years ago
The difference is that most people have kitchen knives, and use them for cooking, not assault. Identifying buyers with ill intent in a retail setting would be impossible, and I suspect most kitchen knives used in crimes were purchased for cooking.

Selling deep packet inspection technology to the government of Syria is different as there is ample reason to believe that government would use it for human rights abuse.

Eduard · 3 years ago
It's bad practice.

Dead Comment

jylam · 3 years ago
Ho, I got the same one. Sold to me as a tool for low-cost ISPs (or hostels) (mostly in Africa at the time) to advertise mobile subscriptions as "Free MSN & Facebook, 1GB per month otherwise". After a month or two, I understood it was sold to various dictatorships in south America to spy on citizen's MSN and Facebook private conversations. I left immediately, with a very upset boss wondering why every Linux kernel programmer was so political. Not proud of this one.
Symbiote · 3 years ago
It would be entirely reasonable to name the company.
miscaccount · 3 years ago
Maybe Procera or sandvine
p4bl0 · 3 years ago
Probably AMESys.
jbirer · 3 years ago
I built a crypto invoice system that was originally targeted towards our freelance dev clients, which was soon overrun with drug sellers, weapons sellers, and when it reached a point where some of the invoice descriptions included words like "8yo.mp4" we realized it was time to put it down. We reported the IPs of the people involved and shut down the servers. Luckily I live in a third world country and not somewhere I could get in trouble for.
IAmGraydon · 3 years ago
Not trying to be snarky here, but did it surprise you that a system built to obfuscate financial transactions would be used for illegal activities?
jjeaff · 3 years ago
I don't think most crypto is built to obfuscate. It's built to bypass centrally controlled monetary system. With the exception of some specialty crypto created to obfuscate, it's really not nearly as good at hiding transactions as say, cash.
jbirer · 3 years ago
I thought nobody would be stupid enough to try to slang rocks on "clearnet", and also Bitcoin is not built to obfuscate, that's Monero.

Deleted Comment

scotty79 · 3 years ago
It could become very useful honeypot for the police or some government agency tracking crime.

Those people found another way to get paid.

Although I couldn't ever blame you for shutting it down. I'd probably do the same and try to forget about it for many years.

jbirer · 3 years ago
Unfortunately, I was not contacted by any intelligence agency with a promise of money and lack of prosecution, so that was my choice at that time.
localhost · 3 years ago
My first job at Microsoft was to build IronRuby, which was an implementation of Ruby on top of the Common Language Runtime. I got the job because I had built a bridge that connected MRI (Matz's Ruby Interpreter) to the CLR before I joined the company. This project ultimately failed because of a principle that we learned from the school of hard knocks: respect developers' existing code investments. Developers couldn't use it because many of Ruby's existing libraries were thin wrappers over native code, and we couldn't get them to work for many reasons.

It turns out that the project was more of a demonstration of our ability to get dynamic languages to run efficiently on the CLR. To that end, I think we were successful. But once we achieved that there was not much of a path forward so the project was eventually shuttered.

Devasta · 3 years ago
We use IronRuby for a monitoring application at my job. Its provides dashboards with hundreds of red/green annuciator tiles that users across the enterprise can create and customize. They can make a call to an API or run an SQL query or whatever and then as part of the tile configuration they include a few dozen lines of Ironruby to determine if the query results are good or bad and what messages to display on TV screens around the offices.

We couldn't have made it user customizable without something like IronRuby, thank you so much for implementing it!

localhost · 3 years ago
Wow. Thanks for sharing this! I had no idea that it was still being used somewhere. I'll share with folks on the team that I'm still in touch with!
rohansingh · 3 years ago
I remember IronRuby. It was a great demonstration and I think you inspired a lot of folks who came after.

Maybe it didn't accomplish your original goal, but props for what you did accomplish. Quite impressive.

aardvark179 · 3 years ago
IronRuby may not have succeeded but it and the DLR were inspirational, and I don’t think I’d have been working on JVM based language implementations for the last decade and a bit without initially being to point at things like IronRuby and say, “We know it’s possible.”
seanmcdirmid · 3 years ago
I got so much mileage out of the DLR they built to support those languages even if things didn't work out afterwards. To this day, I don't think anything as effective exists anywhere in language tech land.
ska · 3 years ago
Was this basically what doomed IronPython also?

I remember a conversation ages ago about how you couldn't really get a (common?) lisp running properly, irrc due to limitations in the way CLR modeled classes amongst other things, but FFI came up there too.

localhost · 3 years ago
Yes. The problem was that the interpreters for both languages did not have a well-defined FFI. From a native library you could reach up into the interpreter and party over the AST to your heart's content. We couldn't in any practical sense emulate those data structures from the CLR which meant that native libraries couldn't run. That meant that existing scripting code that used those libraries would need to be rewritten to use an equivalent .NET library (e.g., regex). We naively thought that was what people would do and that turned out to be a mistake :(
int_19h · 3 years ago
I think it was in part because in 2010, Microsoft was already switching gears to Windows 8. A part of that was DevDiv getting sidelined by Windows. Windows was not a fan of .NET in general since Longhorn/Vista, but more importantly, the grand plan for Win8 involved the brand new application framework, WinRT. So when it came to VS 2012 and .NET 4.5, the emphasis was on WinRT interop - which is not a scenario where DLR is useful.

It's a good thing that DLR is still there, though. While undeniably niche, sometimes it makes things so much easier. For example, I've used it to support dynamic reloading of C# code in a game, for rapid prototyping of mods.

localhost · 3 years ago
Our funding was gone by April 2009 IIRC, which was before Windows 7 shipped. Jim Hugunin and I shopped the team around and eventually landed in the Technical Computing org. The only thing that survived from that era was Python Tools for Visual Studio.
physicles · 3 years ago
> respect developers' existing code investments

As a former Microsoftie myself, it saddens me that the company seems to have forgotten this.

el_benhameen · 3 years ago
For what it’s worth, I’m pretty sure we still have a little bit of iron ruby deep within some of our build tooling.
michaelcampbell · 3 years ago
FWIW I remember IronRuby quite fondly. If not the outcome, the effort.
turtleyacht · 3 years ago
Does this mean a version of VB6 (classic ASP) could run on .NET Core (Linux)? That would finally liberate the language from the platform (IIS on Windows).
int_19h · 3 years ago
Classic ASP used VBScript, not VB6. These two are closely related but not quite the same.

And the answer really depends on what you mean by "run on". .NET already supports two-way COM interop, and it does work with DLR to handle stuff like IDispatch. But the COM code in that scenario is still native (or, in case of VBScript, intepreted by its Active Scripting provider).

Implementing VBScript, or even VB6, as a language running entirely on top of .NET, is certainly possible, although it would be somewhat awkward because the object model in VB pre-.NET was specifically designed around COM. You can port the templating engine, as well. But the real hurdle is not the language - it's all the APIs. ASP itself was pretty basic, but most web apps would also need to talk to the database - so now you need ADO. And then there are all the third-party components, most of which were proprietary binary blobs compiled for 32-bit Windows.

And, well, why? There are many better languages running on top of .NET these days, starting with VB.NET.

password4321 · 3 years ago
andix · 3 years ago
No. But in theory you could implement a wrapper, sure. But do yourself a favor, and just rewrite your application with a modern framework.
natbro · 3 years ago
ever heard of ActiveX? you know, arbitrary code installing and running in your browser on Windows and available to be scripted by javascript? like, instead of Java? sorry. I'm not solely responsible, but sorry, pretty responsible. we were young. code-signing as a means of validating origin was a great idea. though it needed additional infrastructure to prevent abuse and allow global revocation, and that wasn't perfectly thought through or executed. live and learn. :grinning-emoji:
gw98 · 3 years ago
Just like to say a big thank you for this. When ActiveX was no longer acceptable I wrote some desktop integration technology which replaced it for web apps with an http based background messaging protocol and activation via URL handler. This was sold to some large corporates. This made me a fuck load of money over the last decade or so. If you hadn't built ActiveX this wouldn't have been possible.

You wrote me a house.

everdrive · 3 years ago
If it helps, you guys are still way more popular than the folks who work on Teams.
baxtr · 3 years ago
I hate Teams so so much. It’s by far the worst piece of software on my Mac.
zhenyakovalyov · 3 years ago
<3
creakingstairs · 3 years ago
ActiveX had been EVERYWHERE in South Korea and it was the main reason behind IE being used even into early 2010s.

It feels surreal to come across someone who was responsible for something I hated so much back then. But now I’m just fascinated for some reason. I’d buy you a drink if I could :p

unsupp0rted · 3 years ago
Early 2010s? Up until about 5 years ago if you wanted to do any banking you’d be doing it through IE and about half a dozen “security” activex plugins.

Except on mobile, which is what everybody preferred for obvious reasons.

int_19h · 3 years ago
I actually miss the parts of ActiveX that weren't tied to the web. Like the ability to write UI widgets in different PLs and then integrate them in one app. Or the ability to embed arbitrary documents into other documents, complete with a near-seamless rendering and editing experience. It's too bad that the idea didn't catch on.
bachmeier · 3 years ago
I'd like to thank you for your work. Without it, I might not have had the motivation to move completely to Linux.
localhost · 3 years ago
Hi Nat! Long before I joined the company, I remember fondly the COR Design Review meetings from ... 1998(?) after you ruined the world with ActiveX :)
rr808 · 3 years ago
That was pretty cool. I worked for a project that used ActiveX controls on webpages, via a private site you could only access through a private dial in number. Worked great.
CodeWriter23 · 3 years ago
I almost forgive you and your team mates.
DonHopkins · 3 years ago
Mozilla hated ActiveX so much they cloned it with XP/COM.
JoeOfTexas · 3 years ago
So glad I entered the game as ActiveX was being phased out haha.