Hacker Newsnew | past | comments | ask | show | jobs | submit | ImJasonH's commentslogin


Comments moved thither. Thanks!


Is anybody working on making building specialized things easier and cheaper?


Yes! At https://RunRL.com we offer hosted RL fine-tuning, so all you need to provide is a dataset and reward function or environment.


yes! check out https://distillabs.ai/ – follows a similar approach except the evaluation set is held out before the synthetic data generation, which I would argue makes it more robust (I'm affiliated)


...so how do you keep it secure?

I didn't see a lot of detail at https://ethoslabs.space/ besides a Contact Us form, but it sounds like a fascinating problem.

Is hosting a RPi in space different from hosting one on the ground, reachable over the public internet? I assume it is, but tell me more!


> ...so how do you keep it secure? > Is hosting a RPi in space different from hosting one on the ground, reachable over the public internet? I assume it is, but tell me more!

It is somewhat different from a security point of view, but the gap between them is getting smaller. The main "obstacle" to hackers taking over your satellite is that it is somewhat difficult to set up a UHF/VHF/S-band ground station with enough transmit power to reach the satellite. And you need knowledge of the command protocol that the satellite uses. But ground stations are getting cheaper every day, IMO you can build a fairly capable transmitting setup for ~1000€. So the remaining protection is a form of security by obscurity: "we invented this command protocol, so nobody knows how it works". But that can obviously be defeated by recording ground station signals and some dedicated reverse engineers.

When those protections fall away, you'll find that a lot of satellite/CubeSat software out there is quite vulnerable (see https://jwillbold.com/paper/willbold2023spaceodyssey.pdf). You often find things like commands that are literally "arbitrary memory read/write". While they are a nightmare from a security point of view, they are extremely useful for operators of experimental satellites, e.g. to patch software in memory to fix bugs or read variables that are not exposed as telemetry. I have written a few of these patches myself, and my friend PistonMiner used them brilliantly to hack in a software update capability and revived a 15 year old CubeSat that was assumed to be dead - see their 38C3 talk: https://www.youtube.com/watch?v=KdTcd94pVlY

If you ask me, the way to keep satellites secure is to basically apply the lessons that we have learned in terrestrial computing to space applications. Things like using encryption/authentication, process isolation backed by a MMU, memory safe languages, etc. That's what we're trying to do with RACCOON OS btw. You can take at the flight software of CyBEEsat, a 1U CubeSat that is launching soon(tm): https://gitlab.com/rccn/missions/cybeesat


> So the remaining protection is a form of security by obscurity: "we invented this command protocol, so nobody knows how it works".

ChaCha20-Poly1305 authenticated encryption is cheap for low-resource systems and trivial to implement. There's no reason not to use some form of encryption, if at least to prevent forged commands. (Preventing replay attacks is left as an exercise to the reader.)


There are some reasons. As a satellite operator, the worst thing that can happen is getting locked out of the satellite for any reason. So the risk of implementing a “new” technology that has a high risk of locking you out if you lose the keys for some reason sometimes outweighs the benefit of increased security. So I think there’s some work to do in building generally applicable key management practices and backup ways of reestablishing a command link.


Embedded guys don't like command authentications, I think because it's an SPoF with probability attached that are repeatedly tried. They know bits flip and program counter skips, and so they even avoid use of "or equals to" conditions for loops. But they're using signature enforcement in cars nowadays, so that particular fear should be slowly subsidizing.


I would imagine the overriding reason people resist encryption is that it’s a pain in the ass.

You have to worry about long term key storage and security. You introduce a whole new class of failure mechanisms. It’s always going to lurk at the bottom of the todo list.


Maybe they are using plain simple TLS. Lol.


We had the same annoyance, and wrote https://pkg.go.dev/github.com/chainguard-dev/clog/gcp to bridge the gap.

It's a slog handler that formats everything the way GCP wants, including with trace contexts, etc.

We've had this in production for months, and it's been pretty great.

You can add this at your main.go

    import _ "github.com/chainguard-dev/clog/gcp/init"
(the rest of the library is about attaching a logger to a context.Context, but you don't need to use that to use the GCP logger)


This link doesn't seem to work for me for some reason, but here's the same article in the local paper:

https://www.dispatch.com/story/news/local/2025/09/08/ohio-to...


I wish the Dispatch was still local but it was bought out a while ago. They pretend to be but it's gone significantly downhill since.


I think you raise a good point. Everything from local newspapers, local TV news, HOA and rental management, and even community sports programs are increasingly run by national organizations that have no connection to the local community and no interest in the community aside from extracting money.

Focusing on just the media side of things, you already see how easy it is to spread propaganda and it's only getting worse with SkyDance's merger with CBS. Not sure I have any answers here, but it's definitely a problem we need to solve sooner rather than later.


Not at all the same caliber but one of the Dispatch editors left to go make The Clintonville Spotlight and other local neighborhood papers if you want some actually local news.


Thank you - I'm not sure what happened. I know the Dispatch is owned or affiliated with USA Today, and given the paywall I copied the link to post it here with an Archive URL too, but somehow USAToday.com was copied to my clipboard from their site.


This now 404s.


Similar to this, a long time ago I tried to make some CSS that rendered HTML as Markdown: https://gist.github.com/imjasonh/c00cdd7aece6945fb8ea


What incentive does a bank have to support this? The site and the user get what they want, and from the bank's perspective they got to freeload on the age verification the bank has performed (though admittedly they already had to anyway)


Same reason banks offer free checking.

Initially they could charge as a premium service, but eventually it would become a commodity. Not offering it would be weird.


This is cool!

This gave me the questionable idea of doing the same sort of thing for Go: https://github.com/imjasonh/gos

(Not necessarily endorsing, I was just curious to see how it would go, and it worked out okay!)


That's fun. I gave this a try myself. I took a different approach to the solution and used a bash script.

https://gist.github.com/JetSetIlly/97846331a8666e950fc33af9c...


> Get More From KBB.com / Simply choose the content you'd like to receive below and we'll send it straight to your inbox.

The irony.


I built a similar PoC using Workers+R2, before Cloudflare released theirs, in case you find it useful: https://github.com/chainguard-dev/crow-registry

We eventually built our own registry in Go running on Cloud Run, which now serves all our images on cgr.dev.

Zero egress fees is really a game changer.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: