Hacker News new | past | comments | ask | show | jobs | submit | steveplace's comments login

Twitter has keyword filtering at the user level and it's magical.


I'm sure there forex market rules that account for this.

Like buying EUR/USD then going into EUR/AUD


Yup. Get video apps from actual companies that have at least a semblance of QC.

PBS kids, Disney Jr, Nick Jr.


Maybe dollar weighted volume would be a better comparison.


I thought it was SOP to not bring your phones to DEFCON


Right - there's that, too.

Maybe next time, Salesforce should think twice about sending its executives to DEFCON. Without some basic introduction as to what it's actually about.


I used burners at DEFCON 2016. Eventually moved back to my actual phones. But, I talked with other people and according to them there were cell sites that were suspect. Never found out if it was true or not. But, as others have stated I turned off my WiFi.


Before DEF CON there are about 20 cell towers in the area, during DEF CON there were almost 130 (rumour I heard, while gooning in the contest area)...

Pretty sure some of those are FBI and other agencies ;-)


I was at this past DEFCON, we had cell sites named "Arnold's Biggest Scam" and "AT&T Totally 1337 Tower". There are others, but those two were prominent because I could access them in my room lol.


From what I’ve read, all you really need to do is turn off wi-fi, which is already fairly paranoid given that no one is realistically going to burn a serious chipset zero-day on random people at a conference. Fake cell towers do occasionally happen but rapidly lead to arrests.


Why wouldn’t they burn a chipset 0-day? It’s unlikely that only one exploit has been and will ever be uncovered. Imagine the shitstorm if you phoned all of DEFCON with a recording to attend your talk, on their radio “off” devices, because you powered them back on at the right time. Imagine the respect. That would be worth a 0-day.


"random people" who with high probability may have undisclosed 0day exploits stockpiled on other devices.... yeah if I'm an APT author DEFCON attendees are (the hardest to exploit and most paranoid [read: likely to get caught by]) the ideal target for any nation-state. not to mention that the conference is often attended by multiple state agencies which makes the target even juicer. yes it's an extremely hard and dangerous group of people to attempt to exploit, but that doesn't detract from the potential value and payoff of a successful APT exploit on said group of people


That's not how Nation State actors work. One of the things that makes Nation State actors dangerous is they have the patience and resources to attack a high value target at the most likely to succeed point. Backing that up, they generally have the intelligence to know when that best time is. And they for sure know that it's not at defcon when everyone is, as you say, paranoid and on the alert. They're going to get you at home, at happy hour with your non-security friends, in that bar with the great but insecure wifi and no 4g.


Or they'll get you while you're in the security line at the airport on your way home.


I guess it depends which State we're talking about, but yes.


You just made that up. There are fake cell stations every year, and there has never been an arrest.


I might be wrong, but I most certainly did not make it up. Will Strafach and Dan Tentler would at least appear to disagree with you: https://twitter.com/chronic/status/884434768380776448


There are no arrests listed for cellular activities at Wikipedia’s “Notable Incidents” list for DEFCON, so if you have direct confirmation of any such arrests, you should add them to the page at https://en.m.wikipedia.org/wiki/DEF_CON


You just pasted a conversation full of people saying that there are rogue base stations. And I don't see anyone reporting arrests!



> all you really need to do is turn off wi-fi, which is already fairly paranoid given that no one is realistically going to burn a serious chipset zero-day on random people at a conferenc

I know very little about security or defcon, but I was under the illusion that stuff like running Wifi Pineapple to trick people to connect to their hotspots was common and doesn't require any 0-days.


There are more advanved tricks which are less overt, but you are correct, none require zero days.


> chipset zero-day

The concern is man-in-the-middle attacks. Easy, no user interaction required, and works very well. No chipset zero days involved.


Not really. Folks usually switch between LTE-only and airplane mode if they're trying to be cautious.


Weight Change = CI - CO

Where CO has a CI input.

This has been known for while. Protein has a thermic effect which can change your CO.

But the equation still works.


On the useless tautological sense. If you can't measure CO to within 20%, can hardly measure CI to within that range - then for all practical purposes, the equation does not work.

You may want to read about (lack of) precision in Atwater factors, to the tune of 50%, if you believe CI is easy to compute.


Reactionary contrarian skepticism is kinda the MO of hacker news comments.


What makes you think "trump" is the stock market?

The graves of investors have been dug with political shovels.


"The graves of investors have been dug with political shovels." awesome quote! hadn't heard that one before. reminds me of the old 'the market can stay irrational longer than you can stay solvent' line.


It matters because we make it matter. It's psychological anchoring and it's a very real thing.


Just make sure not to share what you made on hackernews


Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: