Hacker Newsnew | past | comments | ask | show | jobs | submit | scarhill's commentslogin

Or a good way to avoid having party guests trash your house.


Can't have party guests trash your house if nobody comes to your party!

taps finger on temple


Because these objects are moving fast, you would need to look a long way out. Long range radar is hard because the inverse square law applies in both directions, so you need 16x the power to double the range.


Maybe a solar powered array on the dark side of the Moon, to restrict any interference from Earth systems, and you get a nice sweep of the ecliptic for free.


I know that residential ISPs block outgoing port 25 because of the spam issue. Is it common for them to block it incoming as well? You don't really need outgoing port 25 to run your own mail server.


> You don't really need outgoing port 25 to run your own mail server.

You do need it to send mail


Directly, yes, but not via a smart host, which is how most SOHO mailservers (where used) are configured.

It's not quite a full-fledged, full-privilege system, but it continues to provide major benefits over Webmail or client-based (POPS, IMAPS) configurations.


You definitely need outbound port 25/587 if you want to send email to others.


You need an outgoing mail server, but ISPs provide those, and typically don't block port 587.


Yes. Some allow it after a shibboleet phone call.


The US has the first amendment. Can you give an example of something the US government wouldn't let Apple publish?


Classified information, threats, bomb making instructions (borderline), categories of pornography, pirated media, libelous statements, trade secrets. Like I said, we may all agree that those things shouldn't be published--almost the entire world would--but some of them may be legal in some jurisdictions and not others, and there's a whole lot of grey area around the edges.


Classified information is regularly published in the news media, including through Apple News.

Bomb making instructions are available in books on the iTunes Store. https://itunes.apple.com/us/book/u-s-army-special-forces-gui...

In general you can legally publish pretty much anything in the USA besides child porn or copyright infringement, everywhere else has stricter laws though.


There are numerous examples that have been given and I think all of them are disingenuous. Every single one of the examples harms people directly in some way. Burying a countries history intentionally is far different than censoring information that can harm people. Even under the 1st amendment we can actually get some of those examples. For example the media can publish classified but leaked material. The act of obtaining it without permission and releasing it to the public is illegal, but journalist are protected when reporting whistle blowing.

America is far from perfect, case in point the Red Scare, Japanese interment, civil rights atrocities. But that's not the issue. The issue is the tech companies specifically are forces that span the globe and those decisions and the ethical stances WILL and DO spill over into all societies they are apart of. Just look at oil companies, our desire for cheap oil and their desire for our money has driven wars, exploitation, corruption, etc.

It's easy for first world countries to ignore that because it happened else where, with tech companies though, those decisions leak into every country. Those policies are applied across the world. Apple's and other tech giants' stances on following the law regardless of morals and rights is applied everywhere. If that same law was here, they'd do it here.

That's the issue, not whether or not someone is putting medical information or classified information up for sale.


About 9% of Lebanon's parliament is the political party Hezbollah. They have a satellite TV station, Al-Manar. Americans hooking up satellite dishes to be able to watch it have been jailed, like Javed Iqbal.

As far as what the specific question is - what has Apple tried to publish that the US tried to publish, the answer is the same with regards to any of the PRC's giant domestic corporations vis a vis China. None of them tried to publish things blocked by their governments.

It's an odd thing to say amidst Assange's extradition, to bipartisan celebration. Of course they will get him for some technicality, as opposed to the attack on WikiLeaks - China is just less hypocritical about such things.


Trade secrets of other companies. HIPAA protected medical information. Classified information. Information related to the location of a person in the Witness Protection Program.


National security letters. And anything covered by an NDA we're including civil law.


His resume includes:

- FAA ATP AMEL and ASEL certificate with CL-65 SIC rating and Part 121 experience; CE-510S rating (single pilot, Cessna Mustang)

- Helicopter ATP

- single-engine seaplane rating at the commercial level

- FAA Flight Instructor certificate with airplane single-engine, airplane multi-engine, helicopter, instrument airplane, and instrument helicopter ratings

He has also worked as a commercial pilot for Delta/Comair. See https://philip.greenspun.com/flying/resume


WRT to the safety note, it's not as bad as CRT TVs where you had to worry about discharging voltages of 25 kV or so, but point taken.


Does knowing that you're running or contributing to Open Source code count? The AWS Open Source blog posted elsewhere in this topic implies that Elastic is making it hard to tell.


> all commits in the github repositories are made by AWS staff.

Given that it was just made public this morning, it would be surprising if it were otherwise. The real question is what the contribution model looks like going forward. The blog post says "Contributions are welcome, as are bug reports and feature requests"[1], but of course the devil is in the details.

1 - https://aws.amazon.com/blogs/aws/new-open-distro-for-elastic...


Copyright law has nothing to do with "reputational harm," assuming Java in fact suffered any.


Making credential stuffing harder is the main reason to do this. Credential stuffing works because users reuse credentials across sites. If someone attempts to use a password from the HIBP database, the two most likely cases are that it's extremely common or the same person is reusing it. Extremely common passwords are bad for all sorts of reasons and the same person reusing a breached password makes the account vulnerable to credential stuffing.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: