Hacker Newsnew | past | comments | ask | show | jobs | submit | bas's commentslogin

Extending on that era’s TV programming (born in the late 70s), even if it wasn’t “your show”, there was only one screen in play. Secondary devices came much later.


Very informative. Thank you!


Day 1 led me to a deep(ish) dive into the CPython implementation of the abs(...) builtin. Good times!


Indeed. 5th Circuit -> SCOTUS will easy mode for right-wing causes (if it isn't already).


Your FreeBSD on AWS work is appreciated, @cperciva.


^ seconding this



Thank you, for putting many of my frustrations to words.


This was the lead story on 60 Minutes tonight, right after the final Elite Eight game of March Madness. Increased visibility, at least.


Consider: if your adversary is the NSA, CIA, or (maybe) FBI, you’ve already lost the game you’re playing.


You would be surprised at how easily they can be thwarted by simple technical maneuvers.

YMMV, but ime a lot of people have this bogeyman caricature of who the feds really are. The reality is that these are government agencies that pay significantly below market rate for really intense, highly demanding work shrouded with multiple layers of government grade red tape.


I think it's not a bad idea to overestimate the power of the government to track you; the common wisdom on the internet to make this assumption is probably a good thing so people are motivated to be as safe as possible.

On the other hand, it seems like the Tor users who get caught make clear, glaring mistakes in their opsec. And I always remember how long it took to catch the Unabomber, and how they apparently only managed to catch him because of his brother.


The issue is they have time. Lots and lots of time. And they keep records.

So if you get high enough on the list, it’s like those ‘immortal snail’/snail assassin scenarios.

Even Bin Laden got taken out and dumped in the ocean eventually.

So like Jan 6th - it had better work, or your goose is very likely cooked eventually.


I think the biggest trick is to move around, so it isn't as simple as getting a single address. Like with Bin Laden, a lot of the work was figuring out where he was. And Ross Ulbricht, maybe he wouldn't have been caught so easily if he changed hosters occasionally and the VPN had listed 100 internet cafes in different cities as connecting IP addresses instead of just 1. Certainly that's the way Tor works, always hopping around routers. It's maybe a bit pointless though, once they get your legal name it's pretty much a matter of time.


Damn, the snail assassin analogy works a lot better than I expected!


That's no reason to make it easy on them. Their ability to do bulk surveillance is limited by resources. Don't lower their resource requirement.


They're not trying to get everyone.

They just have to make it painful enough for enough people to get the vast majority of the rest to "fly right."

I'm certain that this is not terrorism.


It entirely depends on how motivated and how much resources they're willing to dedicate to finding you. They're probably not going to go to great lengths to catch a single copyright violation, so simple precautions may be good enough.

If you're a legit threat to national security, then yeah, they're probably going to find you no matter what you do.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: