<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: ben509</title><link>https://news.ycombinator.com/user?id=ben509</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 17 May 2026 10:37:53 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=ben509" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by ben509 in "The top-ranking HTML editor on Google is an SEO scam"]]></title><description><![CDATA[
<p>Talk to a lawyer.</p>
]]></description><pubDate>Tue, 08 Jun 2021 01:59:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=27429814</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27429814</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27429814</guid></item><item><title><![CDATA[New comment by ben509 in "Intel and AMD Contemplate Different Replacements for x86 Interrupt Handling"]]></title><description><![CDATA[
<p>GHC[1] is almost there >_<<p>[1]: <a href="https://www.haskell.org/ghc/blog/20210309-apple-m1-story.html" rel="nofollow">https://www.haskell.org/ghc/blog/20210309-apple-m1-story.htm...</a></p>
]]></description><pubDate>Fri, 04 Jun 2021 21:04:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=27399058</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27399058</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27399058</guid></item><item><title><![CDATA[New comment by ben509 in "Intel and AMD Contemplate Different Replacements for x86 Interrupt Handling"]]></title><description><![CDATA[
<p>The CPU doesn't know what processes are, that's handled by the OS. So there still needs to be a fault.</p>
]]></description><pubDate>Fri, 04 Jun 2021 20:58:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=27398995</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27398995</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27398995</guid></item><item><title><![CDATA[New comment by ben509 in "Why we should end the data economy"]]></title><description><![CDATA[
<p>> because I am ... most likely to have a functional dishwasher and even if yours is better I am not going to buy one more.<p>Break the population into groups:<p>1. Have a working dishwasher / don't need one<p>2. Old dishwasher is failing, looking for a new one<p>3. Just bought a new dishwasher, it works great<p>4. Just bought a new dishwasher, going to return it<p>I suspect group 4 is who they're targeting.</p>
]]></description><pubDate>Fri, 04 Jun 2021 19:55:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=27398394</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27398394</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27398394</guid></item><item><title><![CDATA[New comment by ben509 in "Why the ransomware crisis suddenly feels so relentless"]]></title><description><![CDATA[
<p>The main narrative is the usual war mongering. You're doing it in your post.<p>These are criminal actions, as they're not endorsed by the state.<p>But it doesn't have to reach the scale of war to be bad. The broader narrative is We Have To Do Something. And that Something is always grant the government more power. Why is it a good thing, for instance, that we're taking "unprecedented" steps?<p>The US has been dealing with ransoms, piracy, extortion since its founding. "From the halls of Montezuma, to the shores of Tripoli," the latter was one of our first expeditions to deal with piracy.<p>As there is plenty of precedent for dealing with this stuff, we should be very skeptical when the government insists it needs new powers.</p>
]]></description><pubDate>Thu, 03 Jun 2021 16:22:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=27383641</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27383641</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27383641</guid></item><item><title><![CDATA[New comment by ben509 in "In praise of --dry-run"]]></title><description><![CDATA[
<p>I noticed that after I posted and had read a bit more; but you're also using F# which has proper ADTs. I'm typically writing support scripts in Python or the like, and even very good libraries like click[1] nevertheless reflect the idioms popular in the language.<p>I really came back to this post because I was struggling with Gradle and if there is a more perfect illustration of how a dry run mode could help than that, I don't know what it could be. Gradle builds are a fucking mystery, every time, and there's no excuse for it.<p>[1]: <a href="https://palletsprojects.com/p/click/" rel="nofollow">https://palletsprojects.com/p/click/</a></p>
]]></description><pubDate>Wed, 26 May 2021 04:03:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=27286167</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27286167</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27286167</guid></item><item><title><![CDATA[New comment by ben509 in "Complexities of e-mail validation logic"]]></title><description><![CDATA[
<p>Same here. I send everything that is firstlast@gmail straight to junk.<p>> I also get a lot of email from idiots who don't know their own address<p>Holy crap there are a lot of them. I've got one bank sending me the dude's statements. He's also been on some interesting trips, seen all his hotel stays, etc.</p>
]]></description><pubDate>Mon, 24 May 2021 15:18:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=27265342</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27265342</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27265342</guid></item><item><title><![CDATA[New comment by ben509 in "In praise of --dry-run"]]></title><description><![CDATA[
<p>I've done that and called the counter option --for-real, but I'd like both args so runbooks can spell out:<p><pre><code>    1. do-step-one --dry-run
    2. (do validation)
    3. do-step-one --real-run
    4. (do validation)
</code></pre>
Many commandline parsing libraries assume you're doing booleans, and I think --dry-run and --no-dry-run is confusing. And, internally, you have a boolean flag so there's always the possibility of some code getting it backwards.<p>Internally, I'd like an enum flag that's clearly dry_run or real_run, so the guards are using positive logic:<p><pre><code>    switch(run) {
      case dry_run:
        print("Would do this...");
      case real_run:
        do_real_thing();
    }</code></pre></p>
]]></description><pubDate>Mon, 24 May 2021 14:51:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=27265034</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27265034</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27265034</guid></item><item><title><![CDATA[New comment by ben509 in "Companies may be punished for paying ransoms to sanctioned hackers"]]></title><description><![CDATA[
<p>Sometimes it can be covered by business owner's policy[1], but there are specifc policies covering cyber extortion, e.g. [2] [3]. As you suggested, they are generally paired with risk management.<p>[1]: <a href="https://www.investopedia.com/terms/business-owners-policy.asp" rel="nofollow">https://www.investopedia.com/terms/business-owners-policy.as...</a><p>[2]: <a href="https://www.thebalancesmb.com/insuring-against-ransomware-and-other-cyber-extortion-4060470" rel="nofollow">https://www.thebalancesmb.com/insuring-against-ransomware-an...</a><p>[3]: <a href="https://www.robertsonryan.com/2021/05/18/ransomware-insurance/" rel="nofollow">https://www.robertsonryan.com/2021/05/18/ransomware-insuranc...</a></p>
]]></description><pubDate>Tue, 18 May 2021 23:32:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=27202685</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27202685</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27202685</guid></item><item><title><![CDATA[New comment by ben509 in "Apple Readies MacBook Pro, MacBook Air Revamps"]]></title><description><![CDATA[
<p>He's not understanding that in the normal operating environment for Macs, there's an additional fan he's not seeing.<p>The person who bought it.</p>
]]></description><pubDate>Tue, 18 May 2021 15:49:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=27196300</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27196300</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27196300</guid></item><item><title><![CDATA[New comment by ben509 in "Colonial Pipeline Paid Hackers Nearly $5M in Ransom"]]></title><description><![CDATA[
<p>US law derived from common law, which recognized a right to self defense. All 50 states, DC, and federal jurisdictions then codified that right as law. While the 2A is not directly about self-defense, it plainly guarantees an individual right to maintain the means for self-defense, which implies a right to self-defense.<p>There are cases covering a justifiable use of force because intentionally killing or harming a person is illegal, and self-defense is a defense against those charges.<p>It's normally perfectly legal to pay someone whatever you want. You don't need a defense against something that's not a crime. There's no conflict in paying a ransom, so there's no case law.<p>Regarding OFAC, as your link points out:<p>> One issue is that victim organizations are required to check the list of sanctioned entities; however, many times the true identity of the cybercriminals are not known.<p>I'm guessing there's no case law regarding paying ransoms to SDNs because nobody has an identity they can check.<p>But do we need case law when OFAC says:<p>> OFAC will consider a company’s self-initiated, timely and complete report of a ransomware attack to law enforcement to be a significant mitigating factor in determining the enforcement outcome if the situation is determined to have a sanctions nexus.<p>If someone wanted to make a law against paying ransom, it would be quite novel and courts would have to look for applicable doctrine. I think the doctrine of self-defense would be a roadblock.</p>
]]></description><pubDate>Mon, 17 May 2021 12:35:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=27182727</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27182727</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27182727</guid></item><item><title><![CDATA[New comment by ben509 in "Framework Laptop pre-orders are open, starting at $999"]]></title><description><![CDATA[
<p>The relevant blurb seems to be:<p>> Build it Yourself<p>> The DIY Edition is the only high-end laptop you can customize and assemble yourself from a kit of modules. Coming in at just 15.85mm thick and 1.3kg, the Framework Laptop delivers the modularity of a desktop in the form factor of a thin and light 13.5” notebook.</p>
]]></description><pubDate>Thu, 13 May 2021 17:51:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=27145068</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27145068</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27145068</guid></item><item><title><![CDATA[New comment by ben509 in "Vue 3 drops IE11 support plan"]]></title><description><![CDATA[
<p>They probably had to rotate their password three times while writing that memo.</p>
]]></description><pubDate>Thu, 13 May 2021 17:10:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=27144588</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27144588</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27144588</guid></item><item><title><![CDATA[New comment by ben509 in "Colonial Pipeline Paid Hackers Nearly $5M in Ransom"]]></title><description><![CDATA[
<p>Don't rely on technical details from Bloomberg.</p>
]]></description><pubDate>Thu, 13 May 2021 17:06:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=27144545</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27144545</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27144545</guid></item><item><title><![CDATA[New comment by ben509 in "Colonial Pipeline Paid Hackers Nearly $5M in Ransom"]]></title><description><![CDATA[
<p>I don't think people here are considering all forms of ransoms, but you hit on an interesting aspect of it all the same.<p>It's why, I think, such a law wouldn't pass Constitutional review.<p>If your person is threatened with imminent danger, you have a right to self-defense, we'll even let you commit intentional homicide if the threat is serious enough.<p>And self-defense also covers your property and livelihood to a lesser extent.<p>I think it'd be extremely hard to convince courts that this right to self-defense doesn't include negotiating with an attacker. Imagine if it were a crime to toss some money at a mugger and run away, for instance.</p>
]]></description><pubDate>Thu, 13 May 2021 16:55:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=27144427</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27144427</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27144427</guid></item><item><title><![CDATA[New comment by ben509 in "Colonial Pipeline Paid Hackers Nearly $5M in Ransom"]]></title><description><![CDATA[
<p>Yeah, I was pushing that all under "recovery." Say it all sums to $C.<p>Arguably the bigger problem is you don't know that the ransomer will actually give you a valid key, but suppose you guess a likelihood P that they do.<p>Now you have some scenarios:<p>1. Don't pay. We're out $C.<p>2. Do pay, and get a valid key. We're out $R.<p>3. Do pay, and get no key. We're out $R + $C.<p>So the limit is at scenario 1 being equal to the combination of 2 and 3.<p>Set C = PR + (1-P)(R + C), and your max ransom R = CP<p>(You could probably work in additional costs for cleaning up even if the ransom is paid.)</p>
]]></description><pubDate>Thu, 13 May 2021 16:47:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=27144331</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27144331</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27144331</guid></item><item><title><![CDATA[New comment by ben509 in "Colonial Pipeline Paid Hackers Nearly $5M in Ransom"]]></title><description><![CDATA[
<p>It'd have to be an international effort as there are big mining operations are in Russia, Switzerland, China, Iceland as well as the US.<p>Being legal means that you can run big mining operations, so you could clamp down on those and slow mining. That would not stop it, though.<p>Being legal means that it can be used to trade goods and services, and you could clamp down on that and harm its value as a currency.<p>And being legal means that legal businesses can exchange it for other currencies, so clamping down on that harms its liquidity.<p>Even if you can make it broadly illegal across the globe, it's hard to see how effective that would be. Illegality has made anything else on the black market go away, after all, and the whole point of a crypto-currency is to thrive despite government suppression.</p>
]]></description><pubDate>Thu, 13 May 2021 16:32:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=27144156</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27144156</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27144156</guid></item><item><title><![CDATA[New comment by ben509 in "Colonial Pipeline Paid Hackers Nearly $5M in Ransom"]]></title><description><![CDATA[
<p>Part of the problem is it's very hard to value security because, frankly, so much security is theatrics and snake oil.<p>For instance, look at the consumer market, which is where an executive without security knowledge is coming from. All the big VPN vendors make security promises that are, frankly, false advertising. AV products are notorious for including warnings for viruses that pad their counts. That's not counting all the security applications that are malware.<p>And if they talk to someone familiar with the industry side, they should hear some skepticism. All the static analyzers are full of flags for things that are there to drive up their numbers. There have been a few HN stories on junk CVEs that are filed so people can put them on their resume. I had to set up a WAF at work that proudly said it mitigated the OWASP top-ten (why the top ten? is #11 not important?) which include recommendations like logging that a WAF is plainly not doing. And then I tested its defense against SQL injection and it was trivial to bypass.<p>And if a business that isn't a tech company hires contractors to fix security issues, most of the time, those guys will do a lot of check the box BS. It's fundamentally difficult, from a business operations perspective, for a company to do security because: 1. the horizon problem that you bring up 2. it's a cost-center 3. it's not their core expertise 4. if you even ask what secure looks like, you either get filibustered with long lists of best practices, or a lot of hand waving but strident proclamations.</p>
]]></description><pubDate>Thu, 13 May 2021 16:07:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=27143755</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27143755</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27143755</guid></item><item><title><![CDATA[New comment by ben509 in "Colonial Pipeline Paid Hackers Nearly $5M in Ransom"]]></title><description><![CDATA[
<p>No, there's a hard upper limit on ransoms; the cost of recovery.</p>
]]></description><pubDate>Thu, 13 May 2021 15:48:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=27143458</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27143458</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27143458</guid></item><item><title><![CDATA[New comment by ben509 in "Pyre: A performant type-checker for Python 3"]]></title><description><![CDATA[
<p>No, multiple checkers will drive you crazy because one type checker will support one feature while another will report errors for it.</p>
]]></description><pubDate>Mon, 10 May 2021 18:22:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=27109132</link><dc:creator>ben509</dc:creator><comments>https://news.ycombinator.com/item?id=27109132</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27109132</guid></item></channel></rss>