Hacker Newsnew | past | comments | ask | show | jobs | submit | cyphunk's commentslogin

Actually it's been reported very widely in Germany as well with exactly this headline.


Is the connectivity layer considered: Is the 3rd party "proxy" handler uploading the information using an Apple ID? Does Apple record, store IP information? It seems to me that by using this system you volunteer to send data to Apple constantly which may not reveal your GPS location but will reveal your network location.

I'm happy to see someone trying to innovate in this space. I still wonder if it is okay for journalists and risk affected users to use this or if they should be advised to avoid it.


Buying max RAM from start is a $200 extra which may validate saved space. Not justified is soldered SSD. Ive doubled SSD size once a year to extend laptop life by 6 or 7 years.


The comments in this thread indicate clearly, I think, why we should never listen to engineers on social topics and questions.


Note that these models are created in an era of great inequality. You can expect that if at any point a correction is made to this disparity these numbers will also be effected.


Additional information about the companies use of slaves.

https://en.wikipedia.org/wiki/Dutch_East_India_Company#Slave...


also if in the future we actually make cellular standards where encryption isn't demarcated at the tower and instead setup e2e between consumer devices, some risks are mitigated

it's really a shame that with both 4g and 5g standards bodies did not already work on this.


> instead setup e2e between consumer devices, some risks are mitigated

Only some, though. The metadata will still be there to be collected, which I understand is more valuable than you'd assume on first glance.



most abuse mitigated by their limits on the number of downloads allowed and how many days it can stay online. Currently at 7 days max and 100 downloads. If they see abuse they could reduce this further.

about revenue, there are so many valuable directions this can go. It could undercut competitors in ways they cannot sufficiently respond to. (google responding in kind would leave them less reason to not add encrypted storage for drive) By stabilizing this platform they can start to build new privacy-enhancing apps on top. Calendar, contacts, etc. With more dependency on the platform, they will find areas where more storage, longer retention, will be income generating.

privacy may be the only frontier that can displace google,apple,microsoft.


There are many use cases where compromise through code-interdiction after warrant is a perfectly acceptable risk. Also considering what it replaces may further increase the weight of privacy gain. Absolutism is definitely not the way to go, and looking at the state of the tech community (eg. npm, apt, pip, pacman, check that sha256 sum) we left the design-it-right-first a long time ago. A valid argument, though I wouldn't defend it to the death, is that we need to work slowly back toward more secure behaviors rather than chasing absolutely secure technologies. I think send.firefox is a step back from dropbox for some.


Could someone explain why this is on HN? I ask because this comes up often on other non-tech topics. Personally I'm happy these topics can be discussed here.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: