<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: o8r3oFTZPE</title><link>https://news.ycombinator.com/user?id=o8r3oFTZPE</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 29 Apr 2026 23:23:30 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=o8r3oFTZPE" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by o8r3oFTZPE in "FOIA requests show Apple’s emails pitching state agencies on IDs and Wallet app"]]></title><description><![CDATA[
<p>Who invented "clickbait". What is the purpose of "clickbait".<p>Non-profits supporting investigative journalism like MuckRock are to blame. MuckRock is not selling advertising, but don't be fooled. Investigative journalism will just create more clickbait.<p>Whereas Big Tech companies have nothing to do with clickbait nor advertising. They are not spreading clickbait like non-profits that submit FOIA requests. Tech companies do not make money from clickbait nor eyeballs. Tech companies have sources of non-advertising revenue and legitimate business purposes that benefit society.<p>In 2012, EFF filed over 200 FOIA requests through MuckRock, for information about drone usage. EFF should stop participating in these clickbait campaigns. EFF should be protecting Apple from low hanging clickbait.<p>We should be thanking Big Tech companies not scrutinising them. They mind their own business, they do not try to learn what their users/customers are doing.  They respect user/customer privacy.  OTOH, these non-profits submitting FOIA requests do not respect the privacy of Apple and governments, who deserve to be left alone, to do their work in private. This is a basic human right.<p>Why don't people trust Big Tech. Tech companies have done nothing wrong.</p>
]]></description><pubDate>Tue, 28 Sep 2021 23:50:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=28688802</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28688802</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28688802</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "Show HN: Age 1.0 – Simple, modern and secure file encryption"]]></title><description><![CDATA[
<p>Fair question.  Im not the author so can only make a guess (other readers of HN surely know far more than I about these subjects). However I suspect the rationale is related to whats been called "Bernstein chaining".<p><a href="https://cr.yp.to/proto/ucspi.txt" rel="nofollow">https://cr.yp.to/proto/ucspi.txt</a><p><a href="http://www.catb.org/~esr/writings/taoup/html/ch06s06.html" rel="nofollow">http://www.catb.org/~esr/writings/taoup/html/ch06s06.html</a><p><a href="https://skarnet.org/software/execline/grammar.html" rel="nofollow">https://skarnet.org/software/execline/grammar.html</a><p><a href="https://www.oilshell.org/blog/2017/01/13.html" rel="nofollow">https://www.oilshell.org/blog/2017/01/13.html</a></p>
]]></description><pubDate>Tue, 07 Sep 2021 09:26:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=28442712</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28442712</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28442712</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "Clarifications regarding arrest of climate activist"]]></title><description><![CDATA[
<p>Heres the issue with Proton's marketing that no one is mentioning.  The CEO keeps making claims about "Swiss law" as if it is something to be desired.  However he never adds any citations to the relevant laws or their interpretation.  This seems strange because #1 How many Proton customers know anything about Swiss law (how many can even read German or French^1) and #2 The CEO is not a lawyer, he is a physicist.<p>It seems prudent that Proton customers would want to have a look at those "Swiss laws" (a) to see what sort of protection they offer and (b) to make sure they dont violate one.  In the case of (b) the customer will potentially lose all privacy protections, as emphasized in this announcement.<p>1 It appears that Swiss law is conveniently published in English however the English translation is not what Swiss courts use.</p>
]]></description><pubDate>Tue, 07 Sep 2021 09:09:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=28442614</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28442614</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28442614</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "Show HN: Age 1.0 – Simple, modern and secure file encryption"]]></title><description><![CDATA[
<p>"An extremely simple CLI that composes well with UNIX pipes"<p>Just for fun, I occasionally experiment with proposed "post-quantum" encryption solutions and one in particular called Classic McEliece, from the same author (more or less) as the encryption used in age.  Its small and compiles quickly.  The interface is elegant and seems impossible to screw up.  I have rarely seen anyone outside of the author and his followers use file descriptors in compiled programs in this way.  I like it.<p>Three programs, each only does one thing<p><pre><code>     usage: cmkeypair 5>publickey 9>secretkey

     usage: cmencrypt <message 4<publickey >ciphertext

     usage: cmdecrypt <ciphertext 8<secretkey >message
</code></pre>
To be fair, I should probably add that McEliece arguably fails the "small, copy-pasteable keys" criteria.  :)</p>
]]></description><pubDate>Tue, 07 Sep 2021 04:48:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=28441032</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28441032</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28441032</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "Rumble, an open source, offline, censorship resistant microblog (2017)"]]></title><description><![CDATA[
<p>"Unfortunately they're solving the wrong problem."<p>Heres the description of Rumble:<p>"Rumble enables the spread of messages in an epidemic fashion using automatically formed and opportunistic local ad-hoc network. Every message sent or received with are stored on the local database and pushed to every other device it meets. By doing so, messages naturally propagates throughout the network using social links as the underlying infrastructure.  Because it doesn't rely on any fixed infrastructure like the Internet, it is naturally resistant against censorship."<p>"About<p>Rumble allows the sharing of messages and pictures without relying on the Internet, in a Delay Tolerant Fashion following the Store-Carry and Forward paradigm"<p>Question: What problem is Rumble solving.<p>Option #1<p>Answer: Requirement for fixed infrastructure in order to exchange messages.  Censorship resistance is just an incidental benefit.<p>Option #2<p>Answer: Censorship.  Formation of ad hoc network infrastructure is just implementation detail.<p>The problem with #2, the parent's interpretation, is that formation of ad hoc infrastructure, i.e., non-reliance on fixed infrastructure, has multiple benefits besides censorship resistance.  Its quite possible someone could use Rumble to solve a problem other than censorship.</p>
]]></description><pubDate>Tue, 07 Sep 2021 00:37:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=28439609</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28439609</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28439609</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "Clarifications regarding arrest of climate activist"]]></title><description><![CDATA[
<p>"No matter what Apple and ProtoMail and similar companies tell you, you cannot buy privacy off-the-shelf."<p>The cost is personal time and effort, not money.  The software needed is generally free of charge.  The goal being not a physical product or a service, but a level of knowledge and proficiency.  To put it another way, "tech-savviness" cannot be purchased, it has to be achieved.<p>The cultural problem we face is that the so-called "0.1%" are leveraging their "tech-savviness" against the rest of the population, working for so-called "tech" companies, websites that make money by exploiting the privacy of the "99.9%" in the service of online advertising.<p>If we take HN comments as true, in some cases, these employees do not even believe in the bottom line they are working to support.1  They are not adopting the behaviour of the "99.9%", i.e., the "expected" behaviour required to sustain their employer's bottom line.  Not sure about you, but that would not give me much confidence they are going to work very hard to protect other users' privacy.<p>The term "dogfooding" is sometimes used amongst tech companies to describe the situation where employees themselves partake in what they offer to non-employees, i.e., "users".2  To persons outside the tech bubble this can be quite amusing. Does this suggest they view their relationship to users as more like "human-to-dog" than "human-to-human".  There is nothing inherently wrong with someone peddling something she does not believe in, however we might consider what is/are the reason(s) for her lack of faith.<p>To be clear, I am not suggesting the cultural problem can be solved.  I am attempting to provide further reasons that digital privacy is, like the parent suggested, generally not something you can "buy".<p>1 Evidence appears periodically in HN comments.  For example, yesterday:  
"Disclaimer: I work at Google. In cloud, not on Android.
I am privacy conscious so I though I would give a try at Graphene OS, it was brutal."<p>2 The term is alleged to have first appeared one the joelonsoftware.com website and to have originated at Microsoft.</p>
]]></description><pubDate>Mon, 06 Sep 2021 21:42:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=28438432</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28438432</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28438432</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "Climate activist arrested after ProtonMail provided his IP address"]]></title><description><![CDATA[
<p>Generally I use custom utilities for HTTP generation, URL extraction, chunked transfer decoding, URL encoding/decoding, GZIP/ZIP/PDF/MP4 extraction, etc.  Thus I can use any TCP client I want to make HTTP requests from the command line.  I do not need a browser to request content.  Nor do I need projects like curl or projects that use libcurl like youtube-dl.  For large downloads I use tnftp.  The shell script I use to download YouTube videos is 424 bytes.<p>For reading HTML I prefer links.  It has the best rendering of HTML tables, IMO, and is for me the easiest source code to work with.  I did use lynx back in the late 90's but would never go back to it.  Its bloated.  Its slow.  Im not sure why anyone interested in text-only browsers would use it other than they are unaware of or have not tried alternatives.</p>
]]></description><pubDate>Mon, 06 Sep 2021 08:55:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=28431746</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28431746</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28431746</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "Climate activist arrested after ProtonMail provided his IP address"]]></title><description><![CDATA[
<p>I wouldnt trust any of them to be honest.  Privacy policies really arent worth anything.<p>I would look for websites that generally do not ask for data.  Then send them the minimum data you can get away with.  I would avoid "signing in" or "signing up" to any website.  There is an immense amount of data and information available from free from the web, no "account" is necessary.<p>For example I dont send any extra HTTP headers like Cookies or User-Agent, I dont use Javascript.  I dont request images, CSS.  I dont automatically follow links in src tags.  Yet I can still read and comment on HN and I can read every website posted to HN.  Thats a lot of websites.  I can read them just fine while not sending them any more data than is needed.  Because I do not use a large, complex graphical browser sponsored by an online ad-supported vendor to make HTTP requests, I can easily control what I send.  This is far better IMO than sending unknown amounts of data (letting the websites control what the browser sends via headers, Javascript and src tags) and then hoping the websites dont do things with the data that we dont like.<p>Privacy policies do not limit websites from collecting data nor do they limit how the data can be used.  They are "policies" not agreements.  If a website operator does things behind the scenes that violate privacy but that it does not disclose in a "privacy policy" what can a user do.  How would the user even know.  Or the website could clearly violate their own "privacy policy", but no one outside the website's operators would know.  Even if users discover the violation, what would be the repurcussions.  Its too late, because a violation means privacy has been blown.<p>Show me a case where a tech company got sued for violating a privacy policy.  How can anyone prove a violation if the operations of the website are not open for public inspection.</p>
]]></description><pubDate>Mon, 06 Sep 2021 04:26:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=28430237</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28430237</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28430237</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "Climate activist arrested after ProtonMail provided his IP address"]]></title><description><![CDATA[
<p>Nothing is even defined.  There is nothing in this policy that obligates the company to do, or restricts the company from doing, anything.<p>This is the way most tech company "Privacy Policies" are written.<p>There is a significant difference between a statement such as "We (Company) do not do X" versus a promise such as "Company shall not do X" or a statement such as "We do Y. We may do Z" versus a promise such as "Company shall do Y."<p>Why not have our own "Policies" as users that we publish for tech companies to read.  In them, we could describe what we do and what we do not do, and what we may or may not do.  Tech companies could rely on these statements.  You can see how silly that sounds.  Yet users are expected to read and rely on hundreds of different "privacy policies", collection of non-binding statements like "We take privacy seriously".</p>
]]></description><pubDate>Mon, 06 Sep 2021 00:56:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=28429228</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28429228</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28429228</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "Climate activist arrested after ProtonMail provided his IP address"]]></title><description><![CDATA[
<p>Devils advocate: Why trust the policy.  Can you enforce it.  If yes, then how.</p>
]]></description><pubDate>Mon, 06 Sep 2021 00:20:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=28429055</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28429055</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28429055</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "Climate activist arrested after ProtonMail provided his IP address"]]></title><description><![CDATA[
<p>"Their homepage says..."<p>Is the parent suggesting that no one should bother to read the Terms and Privacy Policy, linked to from the homepage. <a href="https://protonmail.com/privacy-policy" rel="nofollow">https://protonmail.com/privacy-policy</a><p>Despite the parent's claim, the Privacy Policy says the company may log IP address.  Temporarily.  Irrespective of any request from local authorities regarding a specific user. IOW, they may log anyone's IP address temporarily regardless of whether the particular user is casuing trouble; they can log IP address for everyone.  The policy says they log this data for the purposes of preventing fraud and abuse. The problem for privacy-conscious users is that if they log the data, then that entices authorities to try to successfully request it.<p>The policy, which imposes no obligations on the company BTW, reads as follows:<p>"IP Logging: By default, we do not keep permanent IP logs in relation with your use of the Services. However, IP logs may be kept temporarily to combat abuse and fraud, and your IP address may be retained permanently if you are engaged in activities that breach our terms and conditions (spamming, DDoS attacks against our infrastructure, brute force attacks, etc). The legal basis of this processing is our legitimate interest to protect our Services against nefarious activities."<p>There is nothing that says "By default we do not retain any logs".  This clearly states they may be expected to retain IP logs.  ("IP logs may be kept temporarily...")<p>But wait there's more.<p>"We will only disclose the limited user data we possess if we are instructed to do so by a fully binding request coming from the competent Swiss authorities (legal obligation)."<p>This clearly states the company may disclose the data they possess, e.g., IP logs collected to combat fraud and abuse, if in response to a request from competent local authorities.<p>Further down is a curious statement about decrypting messages.<p>"If a request is made for encrypted message content that we do not possess the ability to decrypt, the fully encrypted message content may be turned over."<p>Why include a statement such as this, specifically the part that says "that we do not possess the ability to decrypt".  The company already specified it may disclose the data it possesses.  This further statement suggests there could be some situation where they may have the ability to decrypt some messages.  Besides their own communications with customers, why would they ever have encrypted messages that they can decrypt.  They could state something like "If the request is made for encrypted communications addressed to us or sent by us, ...", but they do not.   As such, their statement must include other messages, too.</p>
]]></description><pubDate>Sun, 05 Sep 2021 23:53:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=28428894</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28428894</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28428894</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "How did American “wokeness” jump from elite schools to everyday life?"]]></title><description><![CDATA[
<p>Referenced in the article<p><a href="https://www.wsj.com/articles/can-vivek-ramaswamy-put-wokeism-out-of-business-11624649588" rel="nofollow">https://www.wsj.com/articles/can-vivek-ramaswamy-put-wokeism...</a></p>
]]></description><pubDate>Sat, 04 Sep 2021 07:50:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=28413027</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28413027</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28413027</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "Ask HN: Why does validating a user require 14000 files?"]]></title><description><![CDATA[
<p>Why do you need users to sign in.  Do they really want to sign in.  What do they get out of it versus what do you get out of it<p>Using Sign in with Google just encourages use of Google.  Is that really the best thing for users.  Google is a privacy disaster<p>If you and your users truly both need authentication of each other why not let your users use x509 client certificates<p>You are probably already using x509 server certificates<p>The term "SDK" is synonymous with "unnecessary fluff".  Its been that way since the 1990s</p>
]]></description><pubDate>Tue, 31 Aug 2021 02:20:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=28363269</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28363269</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28363269</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "Ask HN: Research on usage of text-only versions of websites?"]]></title><description><![CDATA[
<p>If you make a test page, then post it to HN, perhaps we can provide some "demonstrable popularity" to give you some data to present for your business case. :)<p>I am a heavy text-only web user.  In fact, I view all sites that way with a text-only browser.  I do not use lynx or w3m.
Its so easy to generate simple web pages for text-only viewing.  I have the process automated.  I do not understand why web developers argue "it's not worth it".  The developer time needed to generate such pages is close to zero.</p>
]]></description><pubDate>Tue, 31 Aug 2021 01:58:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=28363162</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28363162</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28363162</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "Ask HN: What cloud providers are suitable for running mail servers"]]></title><description><![CDATA[
<p>But you cannot/will not name the offshore 3d party service</p>
]]></description><pubDate>Tue, 31 Aug 2021 01:49:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=28363108</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28363108</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28363108</guid></item><item><title><![CDATA[Ask HN: What cloud providers are suitable for running mail servers]]></title><description><![CDATA[
<p>Conventional wisdom is that home internet service provider IP address blocks are unsuitable<p>Does same wisdom apply to cloud service provider IP address blocks</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=28360400">https://news.ycombinator.com/item?id=28360400</a></p>
<p>Points: 4</p>
<p># Comments: 7</p>
]]></description><pubDate>Mon, 30 Aug 2021 20:16:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=28360400</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28360400</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28360400</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "My MacBook Pro had over 10k USD in repairs"]]></title><description><![CDATA[
<p>"I had Windows computers back in the day, late 90s, where I only upgraded the hardware, not the OS."<p>How would that be possible since Windows almost invariably came pre-installed by OEMs.  New hardware would have the latest Windows version pre-installed.  Downgrading would be extremely difficult if not impossible.</p>
]]></description><pubDate>Thu, 26 Aug 2021 06:33:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=28311390</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28311390</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28311390</guid></item><item><title><![CDATA[Ask HN: Can Computers Detect Sarcasm?]]></title><description><![CDATA[

<p>Comments URL: <a href="https://news.ycombinator.com/item?id=28137411">https://news.ycombinator.com/item?id=28137411</a></p>
<p>Points: 2</p>
<p># Comments: 1</p>
]]></description><pubDate>Wed, 11 Aug 2021 02:56:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=28137411</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28137411</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28137411</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "Firefox 91 introduces enhanced cookie clearing"]]></title><description><![CDATA[
<p>Advertising targets1 trust Google.  There is no reason for them not to trust this company.  Google has the privacy of its advertising targets as its highest priority.<p>Mozilla gets 90+% of it operating budget via a deal with Google, but Firefox developement is not influenced at all by Chrome.  Totally independent.<p>Big Tech exists for users, not advertisers.  Privacy must come first and money must come second.  Thats why we have  more privacy than ever and Google does not make much money.  Government regulation is totally unnecessary.  All incentives are aligned toward greater privacy.<p>Google will "build a more private web" for its advertising targets.  Sorry advertisers. :(<p>1. Also known as "users".</p>
]]></description><pubDate>Tue, 10 Aug 2021 22:43:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=28135687</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=28135687</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28135687</guid></item><item><title><![CDATA[New comment by o8r3oFTZPE in "The Insecurity Industry"]]></title><description><![CDATA[
<p>"For example, if you want to see Microsoft have a heart attack, talk about the idea of defining legal liability for bad code in a commercial product."<p>That sort of discussion is quickly dismissed on HN.  And probably elsewhere on the web/over the internet.<p>Instead we frequently see discussion blaming users of the software, i.e., Microsoft's customers, or even suggestions to make the customer liable, or comments from "security experts" on how Microsoft has made such amazing strides in securing Windows (a tangent).  In the real world, outside the Redmond/Silicon Valley monopoly space, how many mistakes does someone have to make before we start to suspect there might be problems with relying on that person's work.  Even more, how many times do we hire someone knowing they have made 500+ mistakes in prior work leading up to their application.<p>If Microsoft products are so infallible when used as instructed by Microsoft, then why would Microsoft have a heart attack as Snowden suggests.  What a remarkable state of affairs we have today where employers such as Microsoft can call their employees "engineers", and yet both the employer and employees are absconded from any liability for the so-called engineer's work.   The number of "second chances" Microsoft gets is nothing short of astounding.  A bit like the number of pardons we allow to Google or Facebook for privacy infractions.  Infinite.<p><a href="https://www.nspe.org/resources/professional-liability/liability-employed-engineers" rel="nofollow">https://www.nspe.org/resources/professional-liability/liabil...</a></p>
]]></description><pubDate>Mon, 26 Jul 2021 23:18:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=27966702</link><dc:creator>o8r3oFTZPE</dc:creator><comments>https://news.ycombinator.com/item?id=27966702</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27966702</guid></item></channel></rss>