Hacker Newsnew | past | comments | ask | show | jobs | submit | worthless-trash's commentslogin

I saw this concept only 8 days on this very site ( https://news.ycombinator.com/item?id=46517458#46523962 )

Looking forward to it.


Missed that! Thanks for the link. Definitely feels like this kind of idea is zeitgeist rn.

Coincidental that the domain was registered on the same day... it's fine to say you were inspired to build from the discussion.

Why do your privacy and terms state they were updated on February 28, 2025?


It's fine, I would say it if it were true. Independent invention tho. Copied privacy/terms from another of my products, did not review prior to launch.

> You don't see people taking care of their surroundings because you only get to see a snapshot of it's current state, not what others have done in the recent and not so distant past.

I think that is what observation actually is, you get to see what others have done in the recent and not so distant past, or am i missing your point.


Most Linux malware is low quality garbage with easily exploitable bugs in itself.

In the eyes of the law, it clearly does.

Are you sure? Judges and juries consider the perpetrator's character beyond the bad deed all the time, both to reduce or increase the penalty.

Yes, pretty sure, there are repeat offenders of up to 30 times that get exactly the same punishment as they did the first time.

Sadly, I no longer have access to that dataset.


IIRC one of them actually introduced a memory corrupting problem. I don't know if it got accepted or not. I remember seeing the issue and rejecting the patch for rhel.

I rarely serialise every type in my gleam code, My quick back of the napkin math is less than 5%.

But 100 percent of projects writing the same stuff

I don't think anyone is serializing exactly the same stuff that i'm doing.

People have all kinds of bad experiences with tech. The kids write off any thing they didn't invent or adopt as inadequate.

It usually comes from the bad experience or poor exposure.

Its hard to hate on them when it comes from a position of limited exposure.


Yeah, any outright dismissal of a perfectly reasonable idea like this smells of market opportunity.

Or only allow signed kernel modules. Aka secure boot.

This doesn't solve all vectors but afaics this will prevent non signed modules from loading.


Once you have memory write as ring0, all protections are dubious at best.

Why bother loading a module when you can inject code into any function you want.


The encrypted page memory manager hardware in some ancient Sun systems prevented a lot of these context isolation problems. However, the modern IT landscape chose consumer grade processor architecture and bodged GPUs as the cloud infrastructure foundation.

Thus, there currently is economic inertia entrenching vulnerable system design. I don't think there is a company large enough to change the situation anytime soon, as the market has spoken. =3

Rule #3: popularity is not an indication of utility.


I could be wrong. But operation by design isn't considered a bug.


It is if some other condition is violated that is more important. Then the design might have to be reconsidered.


If it is faulty, then it's not a bug, it's a flaw.


It is possible to design a security vulnerability.

Oh, now that is an exciting area.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: