Hacker Newsnew | past | comments | ask | show | jobs | submit | middleca's commentslogin

This feels like a very bizarre propaganda / pro-military opinion piece. Google isn't a defense contractor, its employees aren't any more or less patriotic if they don't want to build software that goes in killbots.


But Google wants to be a defense contractor and the employees are emotionally blackmailing it from not being one.

If those employees had a fucking conscience, they wouldn't slice and dice every online interaction of a user and serve ads. Stop pretending to be on a moral high-ground by refusing to serve the very entity tasked with securing YOU and the nation


You think it's irreconcilable for an individual to be okay with farming data, but not with indirectly killing people?

Everybody has a slightly different moral compass. Every "good" person does "bad" things.

I highly doubt, for instance, that everyone who commits check fraud would be okay with murder; I also doubt every murderer would be okay with committing check fraud.


>>> "but not with indirectly killing people?"

I'm absolutely not OK killing (innocent) people, and clearly, the pentagon isn't too. The aim of the program is to increase accuracy to prevent and minimize collateral damage.

If you truly cared about protecting the lives of innocent, you'd support this program.


> refusing to serve the very entity tasked with securing YOU and the nation

Google is refusing to support the militias? Given so many companies are supporting the military, google not supporting the militias does seem pretty negligent in securing us and our rights.


Particle.io is hiring! We're a fast growing, close knit team building awesome things. Tons of opportunity to work on open source projects, learn new technologies, work with hardware and software, etc. Check us out!

https://www.particle.io/jobs

We have tons of remote positions, as well as positions in San Francisco, and Minneapolis.


The jobs page only mentions three Platform positions, and none of them is remote. Are there more jobs listed anywhere?


Google and all the other mega-tech corps do a similar tech phone screen where they're reading off an answer sheet. (powers of 2, sort these functions, linux kernel calls, etc).

Sounds like you dodged a bullet, this sort of thing speaks volumes to how the company is run internally and how you'd be treated there.


Came here to say +1 to this, definitely employ a bastion host and make sure that's the only way to SSH to your servers. This can be a little tricky to do correctly if you don't have someone on your team, but it's a valuable way to reduce your surface area to monitor.

Installing fail2ban is also a very basic / smart way to discourage brute force SSH attacks on your boxes. Also you could try piping your SSH logs into something like papertrail / slack, so you have clear visibility into who's logging into your servers, etc.


On fail2ban, I have had more success in being able to stop attacks quickly by using SSHGuard. Quicker easier setup, easier to understand, etc. Is there a significant reason to use fail2ban over sshguard?


fail2ban still doesn't have IPv6 support.

If you use IPv6 (and you should, if possible), it's better to use an alternative that supports it (e.g. SSHGuard).


cool project, thanks for sharing!

It'd be interesting to see a wind speed sensor, temp sensor, or light sensor or something on the AC unit so you could know when it's on!


That's actually where I want to take this, I'm thinking a wind speed sensor to recognize if it's on/off and a temperature sensor to turn it on/off automatically.


Schneier's estimate assumes rented hardware time, but purchased hardware and multiple attempts would drive down the cost dramatically over time. This estimate also doesn't include optimizations by leveraging previous cycles or spends, or the impact of storing something like a rainbow table.

Given a government budget and time-scale, and ignoring sunk costs, I would think a collision attack could already be in a negligible cost range for any well funded sophisticated attacker that has setup shop.

edit: also that opinion post is 2 years old


Very easy to publish an event stream from your code, and to pipe those wherever :) http://docs.spark.io/firmware/#spark-publish


You can actually do this with a usb cable, or flash your own firmware over the air, you'd only need a jtag programmer if you wanted to replace the open-source bootloader :)


It's nuts, I think I hear about a new Spark company, product, or service every few days. Where's the company name version of this? http://jezebel.com/imagine-typing-it-a-couple-hundred-times-...


Cool hack! How are you driving the furby?


Essentially, we fed audio out from an Android phone through a mini audio amplifier, then soldered from the amplifier directly in the Furby's speaker.


Ahh, cool, that makes sense :)

For a second I thought you guys might be related to this connected furby project I saw recently:

http://vimeo.com/106770438

https://community.spark.io/t/internet-chat-furby-with-spark-...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: