Hacker Timesnew | past | comments | ask | show | jobs | submit | buschkowitz's commentslogin

Thank you for making this! I was using StayFocusd until now. The look and feel of Intention feels so much fresher and easier to use. Also, having a lot more flexibility for blocking is a great feature. And of course privacy. Much appreciated.


It is free during beta. Then essentially a freemium model: https://nextdns.io/pricing.


Thanks for the interesting link to Espen Haug!

For non-financial engineers, there is a subtle difference between the two option flavors. Holders of an American option can exercise their right to buy/sell the underlying asset at any time while European option holders can only exercise at expiration date.


I find myself coming back to this guide whenever I set up a new project: https://sourcery.ai/blog/python-best-practices/


A general ignore_missing_imports=True in mypy.ini is very bad advice. This will hide lots of real errors. It's surprisingly easy to set up mypy such that it will silently not check types in many files.

Additionally I can't be the only person who utterly despises pipenv. It is confusing for most people who don't know python packaging internals, phenonomially slow for everyone else and besides discourages building proper distributables (or:wheels).


What do you do instead of pipenv?


Pipenvs attempts to replace all other tooling to the answer is: all other tooling. Specifically, setuptools via either setup.py or setup.cfg. pbr, virtualenvs, tox, pip-tools, pip, etc are all useful. Anything that does not take 5-10 minutes to recompute dependencies basically!


That is a big weakness, I agree. But the mental tax of having to remember how to use >5 cli tools vs one is definitely pro pipenv for me.


Yes, good apps that provide value should cost money.

Edit: actually the app is free, there are some additional features that require paying, though.


Sorry I confused it with “stoa”


Fear, uncertainty, doubt


You want to wear a helmet. The risk-reward ratio is highly in favor of wearing one. What is the burden of wearing one vs. having some protection in case you fly?


Do you wear helmet while driving a car? What’s the burden of wearing one vs. having some protection in case you have an accident? Car drivers are much more likely to die of head injuries than cyclists. Do you also wear a helmet while walking, especially in winter? What’s the burden of wearing one vs. having some protection in case you slip and fall?

Why don’t we do that? Because while the burden is low - it’s mostly dragging the helmet around wherever you go and ruining your hardcut - the actual probability it might help is quite low. And with good infrastructure, the same is true for cycling. If you look at this years stats for causes of death for cyclists in Berlin for example, the leading cause is “crushed by a truck”.

Note: if you do cycling for sports at high speeds or rough terrain: wear a helmet.


Wearing a helmet in a steel cage seems kind of redundant. Wearing a helmet walking at 5 km/h pace, likewise. I am wearing a helmet commuting daily, travel speed around 30 km/h. If you don't want to destroy your haircut, fair it's your choice.

Edit: To be clear, I was riding years without a helmet until a crash made me reconsider my priorities. Also, I am not in favor of mandating helmet usage on bikes.


> Wearing a helmet in a steel cage seems kind of redundant.

All kinds of race car drivers were helmets - and their steel cages are much much more sturdy than the ones that commuters have. Statistics als indicate that many car drivers suffer head injuries. So by all available evidence, wearing a helmet in a car is not redundant. Still, people don’t do it - unless they engage in particularly dangerous activities.

The parent poster that you refer to explicitly gave his speed as about 20km/h for commuting, which is neither particularly fast nor particularly dangerous on good infrastructure. So why wear a helmet?


So now you are comparing race car drivers to the typical commuter driver, apples to apples. You can cite all the evidence you want. When shit hits the fan and you don't have protection, you can only wish for not regretting your decisions.

For me this discussion is done. I have this particular perception, you have yours. We are both happy with it. Stay safe.


Had commuter cycling without helmet was really so dangerous as you claim, there would be way more head injuries of commuter cyclists. As is, they are quite rare.

I understand fear of someone who actually was in one, but please stop forcing your fear on everybody else. Just because you are afraid does not mean not being afraid is irresponsible or any more irresponsible then not having helmet in car crash.


Do whatever the fuck you want. But please be careful with what accusations you are throwing at people.


Using the rear brake will not cause your rear wheel to lift up, unless you are using the front brake at the same time.

Ideally, for an emergency brake you want to use 70% front brake, 30% rear brake, get off the saddle and move your bum as far back as possible.

Safe riding everyone.


It does though, regardless of which brake you use. I think this is because the forces are applied at the contact point on the road. It is like applying brakes to the left side of a car, it is going to turn left. The effect is less pronounced in a rear wheel because the braking is naturally limited by the tipping.

Shifting weight might help a bit, but you still need to grip.


If I were an exchange and would earn tons of cash from Goldman on trading commissions, I would bail them out too, I guess.


Why do this bring to mind how casinos treat big name gamblers...


This in itself sounds like a phishing attack. Is the mail authentic?


Not a mail.you get that message when logging in to Google.

I first thought that too.and tried another browser ( got that message in Vivaldi first,than tried IE) Same result.

Here are some old articles about that:

https://www.recode.net/2017/3/24/15054954/google-reassures-u...

http://www.zdnet.com/article/google-heres-why-you-shouldnt-f...


Yea, it does look legit after reading the articles you posted. I am not a hacker per se, but I guess uncovering what a gov hacker did in your account is highly difficult. In terms of safety, use a password manager that creates and stores hard-to-crack passwords for you. I am pretty happy with Dashlane, 1password has a good reputation, too.


What ! Don’t use a password manager and turn on 2 factor Authentication


Absolutely use a password manager, and a strong passphrase for the master password [1]

Why would you say not?

I'm not trying to be rude or anything. Let's have a discussion, and if I can convince you to do use one, I'd have made one more person safer.

[1] I made this for a dead simple way to make passphrases: https://amingilani.github.io/password-maker/


Not OP but open for a chance. Last time I checked the popular password managers saved the passwords in one way or another. Which personally simply sounds like a bad idea to begin with.

Even if in theorie they are safe. Even the slight chance that a single failure could lead to all my passwords getting in the wrong hands at once just is to scary.


How do you propose one memorizes a properly random/secure/long password, let alone multiple ones, without trusting 'something' with it, whether a password manager of good repute, a hand-rolled version with potentially bigger security issues, or a piece of paper somewhere?


I've memorized multiple long passwords, and routinely memorize new ones. Also phone numbers, poems, mailing addresses, digits of pi, etc. It's not really that challenging. Especially if you do it often.


Your password doesn’t need be a long random string, just a long unguessable one and safe from dictionary attacks Ilikeapples! Is fine But You know I’m not a security researcher


They do, but that's not such a bad idea. For an exhaustive read, I wrote this[1] a while back, but I'll try to make the point here too:

1. Are all your passwords unique?

2. If I discovered some of your passwords, will the rest of your passwords stay secure?

3. Were all your passwords created using at least 32 bits of entropy?

4. Are your passwords stored only in encrypted form?

5. Do you perfectly remember every single password you’ve used when signing up?

6. Do you turn up positive for a password leak at this website?

If you answer "no" to any of these questions, you'll benefit from a password manager.

About storing passwords, I use LastPass and they use client-side encryption[1], which means even they don't have the decryption key to read my passwords. So, you'll be fine as long as you have a secure passphrase and 2FA :)

https://lastpass.com/support.php?cmd=showfaq&id=6926

[1]: Please skip to "Strategy No. 1: Proper Password Management" @ https://www.toptal.com/remote/best-security-practices-for-re...


So, you'll be fine as long as you have a secure passphrase and 2FA :)

And nobody hacks into your machine...


Ofcourse, but at that point it doesn't matter what method of password management you're using. It's too late.


Password managers use client side encryption. They are not stored unencrypted on the manager's servers.


I must admit, I use Apple’s Keychain, I wouldn’t trust a third party app.


Do you have citations for this? AFAIK state of the art is to put the password through some password stretching algorithm (like PKBDF) and to encrypt the database with that. No need to store the password. I think NaCL offers out-of-the-box support for this.

EDITED to add: I am using Password Safe which is recommended by Bruce Schneier. What you describe would be an absolute noob mistake. He would be pretty embarrassed if you were right.


I think herbst is saying that password managers store the passwords being managed, not the master password used to encrypt the DB.


Not parent but I'm guessing the rationale is that a password manager could undermine the concept of 2fa.

Some believe that the "something you know" should be stored inside your head. I personally use a password manager, but can understand the viewpoint.

Password managers lie somewhere between 2 different factors, "have" (the password DB) and "know" (only your master password). For those who use a laptop as their 2nd factor (yubikey plugged into a USB port, a token on the system itself) and get their laptop stolen, a compromise of the password safe could result in both factors being breached.


Because The security of your passwords depend on the security of the password manager and the security of their infrastructure ... the big password managers have had issues, in code, design and even last pass was attached by hackers.

trusting your bank / email and other important password is an unneeded risk.

Your turn why should I rely on someone and their servers to save my passwords why a good password and 2fa will protect my account?


interesting. does anyone know how ProtonMail handles such situations and whether they alert their users?


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: