Hacker Timesnew | past | comments | ask | show | jobs | submit | simonklitj's commentslogin

Yes, but the question is how it makes money, not whether it could make more money by expanding into other OS’s.

I don’t know that it should be a generation specific thing. I’m a millennial, and I like their look.

For me its the first product that caused a sensation of instant repulsion. Which made me think I'm falling outside the target audience.

Strongly assume most tech marketing is focusing on the newer generations of impresionables.


It looks to have near identical design to the initial iteration from 5-6 years ago ¯\_(ツ)_/¯.

Well, sure, but they’re both in the entertainment space.

I think I have to agree with HN User Blell here.

I mean, the NFL, at root, is in the business of entertainment also, and it makes more than Hollywood as well all in.

But why would Hollywood care?


It’s funny in tech it’s generally understood that that attention economy apps are in competition even though they ostensibly are not direct competitors. But when it comes to entertainment (the original attention economy) we don’t think of it in the same way.

NFL and related sport are, at least putatively, unscripted.

Which might be raised in relation to gaming as well, but I'd argue that gaming elements share much more in common with cinema, particularly in the contexts of world design, character development, backstory, and of course, CGI.


Man, you've got to be a real low-life to sell all of that.


You've got to be a real low-life to collect all of that and put it in a database that is not air-gapped.


It's something akin to a service provider in SAML parlance, if we are to believe reporting. How can it be air-gapped?

And if we are to believe the hacked company, it is a development environment with test data in it. That remains to be seen, but is a risky thing to lie about. If there is production data in the leak, we will surely know about it.


At the high end you can use data diodes to isolate critical data.


The point of a system like this is specifically that it’s accessible and not air gapped.

Being able to validate that a citizen is a citizen and their ID is valid inherently requires the system be accessible


If you can't implement it securely then perhaps such an undertaking wasn't a good idea? In the vast majority of cases I don't see why PII ever needs to be available over the network for remote queries. For the purpose of verification isn't it sufficient to verify hashes or better yet to attest via smartcard?


You can, they didn't; big difference.


By "can't" I mean "not capable" or "not going to in practice".

If you need the data, you cannot have it air gapped. And if it is air gapped, it is still easy to make misstakes.


"misstakes", love it, almost peotic


> it is still easy to make misstakes.

That's not an excuse though, any system handling data like that should be continuously reviewed and pentested by professionals. Hopefully they can show that this has been done otherwise it's just negligence.


It was mainly an explanation, that "airgapping" does not magically provides better security, or is required (or possible) to use at all here.


And it's pretty clear to me that they were criticizing storage of sensitive data in a database that isn't properly secured and they simply misused the term "airgapped". The database in question was easily accessible from poorly maintained development infrastructure.

> Please respond to the strongest plausible interpretation of what someone says, not a weaker one that's easier to criticize


Imagine if the bank took such a cavalier attitude with the contents of my account.


No one seems to want to answer your practical question. As I understand it, you receive an email with a payment link. When paid, your email is received by recipient.

I am unsure whether you could use e.g. Apple Pay to pay directly, or if you’d have to follow the microtransaction playbook to buy a greater amount of currency which you can spend.


I do think I answered his general question, which seemed centered around his bitcoin skepticism.

The more detailed answer on how this works can be found by going to the site and clicking "How It Works"

1 Someone Emails You 2 The Gate Catches It 3 Sender Sees the Payment Page - The sender clicks the payment link in the reply. They see exactly what's being held and what it costs: 4 Pay with Lightning — 15 seconds 5 Email Delivered


Nah, you’ve got to go to Chaucer to get the really hard to parse but still understandable stuff.


Depends on the firmware of the device. Latest firmware (anything after version 5.18.5.01 - which released in October 2025) is currently not jailbreakable.

Jailbreak of any firmware after version 5.16.2.1.1 (June 2023) requires the Kindle to be connected and registered.

Anything prior to, and including this version, can be jailbroken with no registration.


Damn, how so?


A small percentage goes to Yandex because they use Yandex as an index: https://kagifeedback.org/d/5445-reconsider-yandex-integratio...


Thanks, I'll keep from recommending Kagi in the future.


Thanks for this! That’s incredibly disappointing.


Ah, was just finishing a geography quiz game with this as one of the fact sources. Oh well!


I don’t live nearby, but thank her for baking gluten free!


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: