Hacker Newsnew | past | comments | ask | show | jobs | submit | mimsee's commentslogin

I didn't know you could SEND mail with Hide My Email feature, but apparently this is a feature directly in the Mail app. Tapping the From in the mail compose screen opens a dropdown of possible addresses to use or create a new one with Hide My Email.

> So perhaps a better solution was to teach them to setup their own git repo in a cheap or free uni server.

And then lose access after graduating. Great idea!


Tell the students that they will receive a one week notice during the middle of the semester that they need to migrate their git repo to a new server, then teach them the 2 or 3 commands they will need to enter to do this.

They will then understand that it is extremely easy to move a git repo.


It's just an educational exercise to teach students to setup and mantain their own git server.

Obviously students don't expect to use uni servers forever. They can setup their own with the lessons learned.


Probably but I never got why that is. It seems a school could be there in all kinds of ways for the entire duration of the career.


Any Git clone is also technically a Git server, so no, they don't lose access to their own filesystem after graduating.


IMO there isn't a cookie nightmare but rather a tracking nightmare. I'm not fully up-to-date on if there is a separate EU directive on cookies on the internet specifically, but the GDPR is the _General_ Data Protection Regulation. Meaning that if I go and collect your info on pen and paper, I must then ask your permission on how I process and share that data, especially if sharing that data is not necessary to complete the main transaction but is somehow done auxiliary to the main purpose. (e.g. I buy a pillow online, my info is used to target ads for me.)

GDPR itself doesn't require consent for functional cookies. For example, Apple.com does not have a cookie consent box _at all_.

On tracking specifically, I feel there are at least two levels. One that happens in-browser by third party companies. These are your classic advertisements. The other is more first-party backend-heavy. These would be your local grocery store using your purchase history linked to your membership card and using that data to create analytics and targeted ads etc.

So creating a browser setting would likely not toggle all tracking away, just the ones that are "annoying" while browsing.


There is no legislation on cookies. The legislation is on tracking, or more generally, personal data collection. It doesn’t matter if websites use cookies or other means for those purposes.


"According to Wikipedia..." aargh Wikipedia is not the source!


Maybe in 2005, but in 2025, Wikipedia is more reliably accurate than many more-official-sounding sources.


I mean Wikipedia is referenced and well sourced so it is a perfectly valid source in this day and age. I read papers weekly and they are full of more lies or dishonesty than Wikipedia nowadays where there is a desire to publish often.


If I wanted to achieve the same result, that is to serve assets of others from my own domain, I'd just create a custom endpoint like /api/user-avatar/:userId and an action proxies the actual image from google, maybe keep a cached copy for some time to not have to redownload the image on every request.


Especially since, if you were doing this on CloudFlare—which you can with OpenNext—it's incredibly simple to work with CloudFlare's caches in Workers. For example: https://developers.cloudflare.com/workers/examples/cache-usi...

Plus there's their Images service which could come in handy to transform them a bit, too, if you wanted.


This. Only needs a couple lines of nginx config.


Apple also built a custom video element for web they use for their events. See the Apple Events page[0] and click "Watch the event". It also seems to dim the video when mousing over. I kinda like the design, but the animations seem a tad bit slow.

[0]: https://www.apple.com/apple-events/


Wouldn't deprioritizing interfere with regular web traffic these days, given that close to one third of non-bot traffic reported by Cloudflare is over UDP with HTTP/3[0]?

[0]: https://radar.cloudflare.com/adoption-and-usage?dateRange=52...


I'd certainly hope ISP follow your reasoning. BTW that was why I put my WireGuard server on port 443, hoping it would avoid the tragic QoS…


The costs were already studied in 2023 and were deemed cost ineffective[0]. The report contained three main strategies (VE1, VE2, VE3) with A & B plans for the first two. Costs would be in the range of 10-15+ billion with 15-20+ years allocated for construction time[1, p. 47].

[0]: https://valtioneuvosto.fi/en/-/1410829/report-shows-that-cha...

[1]: https://api.hankeikkuna.fi/asiakirjat/697c1f25-332b-40ed-9d6...


I agree that a new line at least from Tornio to Oulu would make sense. There's also a lot of heavy industry in the Gulf of Bothnia, like Raahe and Kokkola.


If this reminder app to take meds can't access this API, how can HomeAssistant's iOS app access it where, I the user, can base the trigger for a critical notification on virtually anything?


Yeah. That's why I am so confused.


So if AI research is dual-use tech, would an AI researcher be dual-use human, and get travel restricted because of weapons export controls. Dude is a weapon!


in a manner of speaking that is a feasible concept [e.g. paperclip]


Are the humans working on current dual-use tech dual-use humans? The current ITAR-restricted algorithms are also developed by humans.


you might try to make a joke

but US courts had done rulings which where basically like that


A popular T-shirt among computer scientists featured the RSA algorithm, along with the label "WARNING: This shirt is classified as a munition and may not be exported from the United States, or shown to a foreign national."


...then there's the tattoos of rsa lines that were non-exportable (ITAR)


His public papers are mostly white hat focused so it would stand to reason that he has lots of black hat research that is not published.


That's not how it works in academic computer security research. If a researcher has good attack papers, there are plenty of top venues that would accept them.

Please don't speculate from a position of ignorance.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: