Hacker Newsnew | past | comments | ask | show | jobs | submit | tommieb's commentslogin

Lovely article, that brought back memories! A wee pedantic bit here, to exit the program, it was the school of thought, to use the following instruction - set the exit code to zero and issue terminate.

mov ah, 4ch mov al, 00h ; Or combine both mov into mov ax, 4c00h int 21h


As a user of hearing aids, profoundly deaf from birth, I am against the philosophy of purchasing hearing aids over the counter, unencumbered from audiology prescription fittings and diagnostics. There is absolutely no come-back on this. Sure, hearing aids have come on in leaps and bounds since the digitization of the chip, and it was not so long ago either, two decades ago there was a switch over from analog to digital, well, in Europe that is. This is just opening up potential lawsuits against hearing aid manufacturers - "I bought this hearing aid from place X for Y dollars and now my hearing has detoriarated, am going to sue for damages", this could be unprecedented and sustained damage to the manufacturer's reputation. Each and everyone who does endevour to purchase over the counter, it does take at least a few weeks for the brain to adapt to the new sounds and could raise false hope "I bought this hearing aid X days ago and not noticing any improvement". Not to mention, that audiologists have spent years to study and how to fit/diagnose/troubleshoot hearing aids based off manufacturers specifications. The human side of getting a skilled opinion from a qualified audiologist on the diagnosis for loss of hearing will be effectively lost. Just no, this is just a recipe for disaster.


This change doesn't prohibit hearing-impaired patients from seeing an audiologist to get set up with a hearing aid. It's just no longer compulsory. I can't imagine understanding that this requirement is an encumbrance, and being "against the philosophy" of unencumbering access to hearing aids.


After more than two decades - never knew ip had the --color switch, TIL and thanks! :)


I really wish there were a unified environment variable to enable colors for everything instead of having a separate one for everything or having to clutter your bashrc with a trillion aliases.


I decided to clutter the filesystem instead and have my bashrc source a bunch more files.

It helps me, at least.




Same! Thanks

I wasn't used to ip over ifconfig until a few years ago anyway lol


Interesting, what was the consensus for the split?


I did not follow the events closely, but it seems that one guy, not particularly involved in the development, took charge of the repo and the website and essentially locked it from all the core developers. The story is told here, very interesting read!

https://lunduke.substack.com/p/the-wild-events-that-nearly-t...


Thanks for the reply, that's a real shame about the project.


the ol' hunter2 ... haven't seen this irc dialogue in years, thanks for the laughs


What I find concerning is PKDBF was used, even https://en.wikipedia.org/wiki/PBKDF2 quotes PKDBF1 and PKDBF2,and that is recommended to use PKDBF2. Is there any evidence to show that they indeed rolled their own encryption rather than use a de-facto standard AES algorithm? Or is there something that is missing.


PKDBF is just the password derivation function to better protect the vault against dictionary attacks. The vaults are still encrypted with AES-256.


Reminds me of the old days of running this tool - kitchen sink, https://forum.xda-developers.com/t/kitchen-android-kitchen-v... those days of cyanogenmod/rolling your own rom based off Gingerbread 2.3.7 and hacking... happy memories :)


I was into reverse engineering android apps in the same period, My toolchain at that time was -

Java Decompilation:

Method 1: Dare + JD Decompiler +Cavaj (or) DJ Decompiler

Method 2: dex2jar + JD Decompiler + Cavaj (or) DJ Decompiler

Method 3 : AndroChef Java Decompiler

Accessing Apk Resource Files:

Apk Tool.

Selecting Decompilation of System Files:

Smali, Backsmali

Later a tool called Procyon replaced many of the aforementioned tools.

P.S. Not including links for any of those tools as apart from being obviously outdated, Many of those tools started flagging for malware in later days; Perhaps they're just false positive considering their feature set but I don't want to risk it.


dex2jar + JD Decompiler was my go-to as well, but I spent a long time staring at Smali directly.


You recommend any projects that are similar to this and up to date?


LineageOS build guides are a great resource to get started: https://wiki.lineageos.org/build_guides


+ 1.

In case anyone wants to use Play store apps with push notifications(GCM) on LineageOS, I highly recommend MicroG+F-droid bundled version[1].

If not for privacy, De-googling results in excellent power backup.

[1]: https://lineage.microg.org/


I don't really know much about this, but since microG reimplements the GooglePlay API.. doesn't that mean it must phone back to Google servers?

If you want privacy, I assume you shouldn't use any of these?


For absolute Privacy (If that's even possible without going off-grid), Then yes.

But if you need to use apps which you trust but it depends upon proprietary Google bits then microG is the best alternative now.

microG > Open Gapps > Gapps

e.g. Signal needs GCM to send notifications, If it doesn't find one it will revert to pull notifications. Pull notifications are unreliable and are subject to being killed by battery management due to power consumption. Not to mention missing notifications during emergencies could be dangerous.

microG is totally configurable, You don't need a Google account to use it. So even if Google knows about your device, It would require parallel construction to identify you personally. I think that's even better than using any Google app on iOS.


One thing that not many people know: you don't need to have a Google account to use GCM/FCM even with official Gapps. You can simply not sign in to Google play and push will still work.

It's still running tons of spyware yes but it's an alternative on phones where MicroG is not an option. Eg Samsung phones with Knox enabled.


Okay, I was just checking. I thought maybe they run their own servers and thought it'd be worth trying

Yeah, I'm not a privacy fanatic, but literally having all my notifications funneled through one ad company .. that's on the far end of creepy/dystopian .. Thanks but no-thanks

I keep hearing this myth about how notifications can't work seemlessly without GCM. I don't believe it :)

I currently have GooglePlay disabled and I've never had issues with Signal notifications. However Instagram doesn't work at all. And Messenger is very inconsistent

If apps like WeChat do it then I don't believe it's impossible


> I thought maybe they run their own servers and thought it'd be worth trying

Unless the app you're using use the alternate push notification system e.g.Unified Push, There's no point in microG having their own servers. Demand your favorite app publisher to release a Non-GCM version of their app on F-Droid.

> I currently have GooglePlay disabled and I've never had issues with Signal notifications

Good for you, As I said its pull notification. In simple terms a scheduled local service asks the app's server whether you have new messages. The service needs to be active all the time consuming power, You'd probably seeing a pinned notification for it; Every pull notification app needs its own such service.

> I keep hearing this myth about how notifications can't work seemlessly without GCM. I don't believe it :)

Nothing to do with myth (or) belief system. Push (or) Pull is the technical fact w.r.t notifications.

[1] https://unifiedpush.org/



Why is the media insisting on the vernacular "child porn" in usage and references to articles? It is child abuse, plain and simple. Something that is often ignored in favour of the former descriptive wording. Editors need to take note of it.


I don't know any details about this, but is child porn or child abuse an actual problem on the platform or is the problem underage (i.e. 17 yr olds) posting their own nudes on the platform? Because, while not legal, I would not consider it quite the same as child porn or child abuse.


How would you distinguish between someone voluntarily posting/selling nudes and someone being coerced?


Child abuse is a much broader term than child porn, which is a subset of child abuse. Twitter had a more specific issue with child sexual exploitation as opposed to the many other forms of child abuse.


Child porn is much more specific and descriptive than child abuse. Yes, it's abuse, but when reporting on a story one usually tries to convey the most information possible, and using a broad, ill-defined term like child abuse would not cut it.

Also, historically in the US 'child abuse' has been the term used to describe beating a child.


I agree with your statement. To elaborate, the appropriate, though somewhat recently coined term, is CSAM - child sexual abuse material. Other coinage normalizes it or minimizes the damage from it.


> It is child abuse, plain and simple.

It’s “child porn” specifically because the vast majority of child abuse (including child sexual abuse) is not captured on video and distributed.


Been using it for a number of years, worth while and have donated on occasion in support of their work.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: