Readit News logoReadit News
nullindividual commented on Tell HN: Don't Use Apple's Hide My Email to Create Anonymous Accounts    · Posted by u/behnamoh
nullindividual · a year ago
I haven't had it fail once, and I've created many addresses. I do have a custom domain hooked up to my iCloud account, if that is making any difference, I don't know.
nullindividual commented on Ask HN: Learning to interact correctly in online communities as a neurodivergent    · Posted by u/TheLoneCat
nullindividual · a year ago
> I'm at a crossroads and unsure of how to proceed.

Have you considered that perhaps online communities are simply unhealthy and withdrawing (at least to lurking) is the best course of action?

nullindividual commented on Tesla's Cybertruck is outselling almost every other EV in the US   businessinsider.com/tesla... · Posted by u/jdenquin
samatman · a year ago
This appears to be an alternate article, rather than an alternate headline for this one.
nullindividual · a year ago
Cox Automotive generated the data[0] sourced in the second "paragraph" from the original article.

[0] https://www.coxautoinc.com/wp-content/uploads/2024/10/Kelley...

nullindividual commented on AWS data center latencies, visualized   benjdd.com/aws/... · Posted by u/orliesaurus
dopp0 · a year ago
why 443? are you assuming ssl here? serious question, I'm not sure. But if it is, wouldn't it be hard to disregard the weight of SSL in the metric?
nullindividual · a year ago
tcp/443 is likely an open port on the target service (Dynamodb based on the domain name). TLS is not involved.

ICMP ECHO would be a bad choice as it is deprioritized by routers[0].

[0] https://archive.nanog.org/sites/default/files/traceroute-201...

nullindividual commented on AWS data center latencies, visualized   benjdd.com/aws/... · Posted by u/orliesaurus
CountVonGuetzli · a year ago
It would be really cool if it didn't just show the ping, but how much worse it is compared to the theoretical optimum (speed of light in fiber optic medium, which I believe is about 30% slower than c).

I raise this because I've been in multiple system architecture meetings where people were complaining about latency between data centers, only to later realize that it was pretty close to what is theoretically possible in the first place.

nullindividual · a year ago
Doesn't look like this is a ping[0]! Which is good. Rather it is a socket stream connecting over tcp/443. Ping (ICMP) would be a poor metric.

[0] https://github.com/mda590/cloudping.co/blob/8918ee8d7e632765...

nullindividual commented on The Forest Service Is Losing 2,400 Jobs–Including Most of Its Trail Workers   backpacker.com/news-and-e... · Posted by u/iancmceachern
jandrewrogers · a year ago
They literally use tanks to keep avalanches off roads. Here is a video near Seattle of the Dept of Transportation using a couple M-60 Sherman tanks to launch artillery into the snowpack in an effort to control avalanches along the Highway 2 corridor.

https://www.youtube.com/watch?v=FZLfboCceGA

nullindividual · a year ago
Not any longer. They now use a 105mm Howitzer among other means.

https://wsdot.wa.gov/travel/operations-services/avalanche-co...

nullindividual commented on Against /tmp   dotat.at/@/2024-10-22-tmp... · Posted by u/todsacerdoti
gspencley · a year ago
IMO even a home-level, per-user tmp directory isn't ideal (though it is better). In a single-user environment, where malware is the biggest concern in current times, what difference does it make if it's a process running under a different user or one that is running under your current user that is attacking you?

In other words, for many systems, a home-level temp directory is virtually the same as /tmp anyway since other than system daemons, all applications are being started as a single user anyway.

And that might be a security regression. For servers you're spinning up most services at bootup and those should either be running fully sandboxed from each other (containerization) or at least as separate system users.

But malware doesn't necessarily need root, or a daemon process user id to inflict harm if it's running as the human user's id and all temp files are in $HOME/.tmp.

What you really want is transient application-specific disk storage that is isolated to the running process and protected, so that any malware that tries to attack another running application's temp files can't since they don't have permission even when both processes are running under the same user id.

At that point malware requires privilege escalation to root first to be able to attack temp files. And again, if we're talking about a server, you're better off running your services in sandboxes when you can because then even root privilege escalation limits the blast radius.

nullindividual · a year ago
> In a single-user environment, where malware is the biggest concern in current times, what difference does it make if it's a process running under a different user or one that is running under your current user that is attacking you?

In these systems, the responsibility passes to EDRs or similar. But neither a $HOME/.tmp or /tmp matter in these scenarios. _Shared_ systems are where the concept of $HOME/.tmp might be more interesting.

nullindividual commented on Against /tmp   dotat.at/@/2024-10-22-tmp... · Posted by u/todsacerdoti
noirscape · a year ago
That depends on how you view swapspace; on most devices, swapspace is either created as a separate partition on the disk or as a file living somewhere on the filesystem.

For practical reasons, swapspace isn't really the same thing as keeping it in an actual storage folder - the OS treats swapspace as essentially being empty data on each reboot. (You'd probably be able to extract data from swapspace with disk recovery tools though.)

On a literal level it's not the same as "keep it in RAM", but practically speaking swapspace is treated as a seamless (but slower) extension of installed RAM.

nullindividual · a year ago
> On a literal level it's not the same as "keep it in RAM"

I read the GP as 'literal level' in-RAM. If I interpreted that incorrectly, apologies to GP.

nullindividual commented on Against /tmp   dotat.at/@/2024-10-22-tmp... · Posted by u/todsacerdoti
yxhuvud · a year ago
What system operations exist that need temp storage shouldn't have a separate user anyhow?
nullindividual · a year ago
I see where you're going with your question, but like Windows' Services/scheduled tasks, most of those 'users' don't have a $HOME folder.

Not to say they couldn't have one!

nullindividual commented on Against /tmp   dotat.at/@/2024-10-22-tmp... · Posted by u/todsacerdoti
Joker_vD · a year ago
> The fix, way back when, should have been for login(8) to create a per-user temporary directory in a sensible place before it drops privilege, and set $TMPDIR so the user’s shell and child processes can find it.

Something like

    tmpdir := "/tmp/${USERNAME}"
    loop:
        rmdir(tmpdir, recurse=true)
        while not mkdir(tmpdir, 0o700, must-create=true)
    chown(tmpdir, user=$USERNAME, group=$USERGROUP)
    export("TMPDIR", tmpdir)
with /tmp having root:root owner with 0o775 permissions on it? Yeah, would've been nice.

nullindividual · a year ago
Why not both, like Windows?

$HOME/.tmp for user operations and /tmp for system operations?

EDIT: I see from other posters it can be done. Why the heck isn't this the default?!

u/nullindividual

KarmaCake day2175May 16, 2023View Original