1. 4

    So, uh… I see that Passing the torch is tagged as “meta” and Migration Date and Plans is tagged as “announce” but otherwise, there’s nothing to distinguish these threads as anything particularly special. They aren’t, like, pinned to the home page, or listed at the top of the index, or highlighted as anything fancier than the rest of the stuff under their respective tag markers.

    I guess this means these threads are roughly as significant as any of their peers. Or, maybe I should just decide for myself, based on all the information I have available, and go with that, whether my hunch is right or wrong, and everyone else can just point and laugh, as usual.

    Anyway, figure they’ll get buried in a day, and we can all just move on with our lives.

    1. 2

      Lobsters doesn’t have any thread/comment pinning features - this thread is at the top of the homepage solely due to upvoting of the story and its comments.

      FWIW, I originally tagged this thread meta and jcs retagged it with announce, as visible in the moderation log.

      1. 12

        Actually, I cheated and made the hotness_mod of the announce tag really high so it will stay at the top of the front page for a considerable amount of time. It was already falling down to number 3 the other day.

    1. 2

      In a perfect world, there’d be a rationale for founding a somehow-related Sis project, and in the spirit of backronyming software project names, come up with clever initialisms for each of these projects.

      Bonus points for also founding a related Cis project, for added, cheeky pun cred. (nudge, nudge, wink, wink, say no more)

      1. 1

        The most disturbing aspect of this bug is that Guitar Hero was 10 years ago.

        1. 0


          1. 2

            4. It’s not about refactoring: Optimize up front

            Hmmm… I guess everything moves in cycles. [0]

            [0] http://wiki.c2.com/?PrematureOptimization

            1. 2

              Someone is definitely going to lose a finger/arm/head hanging around that thing.

              1. 8

                People who mess around with exposed engines on test stands are familiar with those kinds of hazards, and (usually) operate them in controlled environments (garages), where catastrophic failure is a calculated risk. Full scale afterburner tests probably represent the extreme end of this, but here’s an example of a hobbyists small scale mock up:


                Here’s a full-scale afterburner test:


              1. 6

                Cue the emergence of a new “slc punk” diy/zine/crust subculture as an unintended side-effect of this choice in naming.

                1. 1

                  My first thought was SLC flash memory

                1. 1

                  …the probability of a failure with loss of vehicle and of human life. The estimates range from roughly 1 in 100 to 1 in 100,000.

                  Dated June 9, 1986, I think the 1 in 100 figure is very obviously accurate at this point, given 2 losses amid 135 missions. [0]

                  [0] https://en.wikipedia.org/wiki/List_of_Space_Shuttle_missions

                  1. 35

                    ‘lobster fire’

                    I suggest ‘lobster boil’ as the ideal term to describe any future lobste.rs hot topics :)

                    1. 5

                      I was debating between “train wreck” and “dumpster fire” when the present term was suggested on IRC.

                      I’ll be using this suggestion from now on though…

                      1. 2

                        Boiled lobster is delicious, though….

                        1. 1

                          Not for the lobster! (;

                      1. 9

                        The share numbers are slightly deceptive figures, in the sense that they largely demonstrate more the decline of Desktop and Laptop usage, and less the decline of Firefox adoption or relevance.

                        Those Chrome and Safari numbers really point to a huge migration of casual, everyday browsing via mobile devices, which, often being used as appliances by the hoi polloi, trend in the direction of never modifying browser choices, once a certain degree of usage satisfaction is achieved by default. So, with Chrome on Android and Safari on iPhone, there’s a ton of mobile device inertia that attaches itself to those names, simply due to platform default status within the appliance context. This is especially true on premium high-end devices, where the default, stock, out-of-the-box experience is carefully crafted to not suck.

                        The same way Windows and Linux operating systems have less general reach than mobile platforms (you usually need to be sitting down, in a controlled environment to use the system), Firefox will only grab as much usage as is available on those kinds of systems. It doesn’t mean Firefox is any less relevant, as much as it really means that this behavioral detail is not completely obvious when looking at bald HTTP request data.

                        1. 1

                          It’d be really neat to be able to tune into altitude data, if it were available in the data set. I’m not sure what the best option is for trying to express that dimension of information on a 2D canvas though. At a fixed altitude, as the author mentions, vertical winds are simply expressed as low or zero movement, and tend to indicate what looks like shear boundaries for converging fronts.

                          Maybe a depth-fade render would look nice, with particles fading into high saturation and brightness as they move toward the viewer, and out to transparent (but not completely invisible) as they move toward the ground?

                          1. 1

                            Windy gives altitude data, though it just does it by letting you select a given altitude to slice. What would be really neat is if nullschool let you rotate the globe and showed 3d airmasses.

                          1. 2

                            Muah ha haaa!

                            Finally, someone willing to acknowledge that the fluid, murky quicksand of security-through-obscurity can demonstrate an occasional amount of utility, when planned as a known quantity within one’s security stance.

                            1. 4

                              I don’t understand. They have a coffee machine that can connect to two WiFi networks at the same time and bridge traffic? What kind of coffee machine is this?

                              1. 2

                                From further down in the reddit thread:

                                Yhea, It’s a coffee machine the size of a vending machine. It needs the IOT functionality for billing and maintenance. The company I work for gets billed for every cup of coffee it makes, but the upside is that the coffee machines are never broken, dirty or empty. Because a coffee tech comes by every 1-3 days to clean, fill and maintain it.

                                1. 1

                                  Ahhh, this makes way more sense! ( …almost)

                                  It makes more sense, in that the firmware or OS of the brewing machine would require greater versatility negotiate payment processing, and that contaminating the air-gapped production network with an untrusted host represents an unforced technical foul up, as end-user error. A coffee pot running a full-featured consumer operating system (such as an unpatched Windows release) would then represent an understandable risk, simply by establishing a connection to the same subnet as other similarly vulnerable machines.

                                2. 1

                                  It would appear that most of these machines let you create and modify the typical “alarm clock” style functions that many ordinary coffee makers support, except this time with a smartphone app. One example being:

                                  Mr. Coffee Smart Wifi-Enabled Programmable 10-Cup Coffeemaker, BVMC-PSTX91WE, Amazon Link

                                  Screenshots of the phone app:

                                  https://images-na.ssl-images-amazon.com/images/G/01/aplusautomation/vendorimages/c75656a0-6004-4851-b1c8-1e8fc69eed69.jpg._CB317479782_.jpg https://images-na.ssl-images-amazon.com/images/G/01/aplusautomation/vendorimages/39b18dbb-cdec-46da-878b-95fd5dd31bd1.jpg._CB317479778_.jpg

                                  It also lets you know if it’s unable to brew, due to lack of grinds or water or whatever, which is maybe kind of “convenient” I guess… Or at least if you discount the amount of effort it takes to set up the app, and still probably remember to supply the machine yourself most of the time, anyway. Oh, and so long as you’re not running insecure air-gapped Windows XP hosts as mission critical infrastructure, and accidentally expose them to the internet through a coffee pot wormhole…

                                  1. 2

                                    I understand the idea of a smart coffee pot. But what kind of smart coffee pot routes traffic between two networks?

                                    coffee pot wormhole…

                                    Yeah, exactly. How does that work? The malware on one side of the coffee pot discovers there’s a vulnerable XP machine on the other side how exactly?

                                    all the coffee machines were showing the same ransomware attack message.

                                    I mean, what??? The newly installed coffee machines were also running an ancient unpatched version of XP?

                                    1. 2

                                      I think it’s completely possible that the coffee machine stored copies of the credentials for the other network, even though it was no longer connected to it. This sort of ransomware is very aggressive about searching for vectors to traverse from one machine to another, because its creators won’t get any money unless the backups are destroyed too. Once it has control of a machine, it really doesn’t matter whether the machine was previously configured to do routing - the machine becomes a new source of infection.

                                      1. 1

                                        My interpretation was the coffee pot was on the regular wifi, it was infected, and as part of “troubleshooting” they switched networks.

                                    2. 1

                                      Sounds more like it had two interfaces, WiFi and Ethernet and once the machine itself was infected it used the Ethernet connection that shouldn’t have been connected, to infect the control computers on the otherwise air-gapped network.

                                      1. 2

                                        This explanation, while sensible, raises so many more questions.

                                    1. 1

                                      If I can’t kill -9 ‘your app’, then I don’t want ‘your app’ on my phone.

                                      1. 7

                                        Ha! This is the first time I’ve ever seen anyone (other than enterprise IT departments) serve an out-of-band root CA trust certificate, in case someone needs it for their blog.


                                        Pretty awesome!

                                        1. 1

                                          How does one become their own Certificate Authority?

                                          1. 7

                                            To start, I followed the instructions in openbsd ssl man page. https://man.openbsd.org/ssl.8

                                            Then there’s some extra options you need in an extensions file. https://www.openssl.org/docs/man1.0.2/apps/x509v3_config.html

                                            Then to sign the leaf, instead of the x509 command used to self sign, there’s also some -CAkey -CAserial options. OpenSSL also provides a “ca” command because why not, but I used x509 with extra arguments.

                                            1. 1

                                              It’s rather easy to start: https://wiki.archlinux.org/index.php/Easy-RSA. The certificate signing protocol seems complicated at first, but it is logical.

                                              On the other hand, I don’t have any further experience and I’d like to learn what it’s like to run a CA for more audience than myself, what are best practices for this, etc.

                                          1. 7

                                            No true Scotsman would call this “teleportation.”

                                            The transfer of state between entangled photons (after transmission) is pretty interesting to say the least, but no material mass is being made to traverse distances at or beyond the speed of light, which is what teleportation used to mean. Teleportation of state really needs a more specific term, since it’s somewhat dry, when compared to the idea of actual teleportation. Maybe coin a new term, like “luminous antireplicaportation” to emphasize that the state of a standing photon is induced by a counterpart altered elsewhere.

                                            Someday, when we have entangled energy soup as a commodity raw material or feedstock for matter replicators and holodecks, maybe the ramifications of this sort of thing will become more tangible.

                                            1. 3

                                              The basic concept behind the idea of “Windows Defender” is dubious to begin with. (yo dawg, we heard you like anti-virus software, so we put anti-virus software in ur anti-virus software so you can scan while you scan)

                                              Meanwhile, color me unsurprised that arstechnica elects to promulgate the very premise that encryption is outlandish at all…

                                              1. 3

                                                Number of photos it can hold (avg 4MB)

                                                What a bogus metric. I wish people would refrain from using it.

                                                1. 4

                                                  Wrong article? That comment fits contextually with the comments under this article - https://lobste.rs/s/horqtr/how_big_were_first_hard_drives

                                                1. 2

                                                  Anything that isn’t a bernoulli box[0] (e.g. solid state disks) probably side-steps this sort of problem. What I find a little unsettling about this, is that spinning platter hard drives have a history of use in ICBM guidance systems. [1,2]

                                                  [0] https://en.wikipedia.org/wiki/Bernoulli_Box

                                                  [1] https://en.wikipedia.org/wiki/LGM-30_Minuteman

                                                  [2] https://en.wikipedia.org/wiki/D-17B

                                                  1. 1

                                                    Anything that isn’t a bernoulli box[0] (e.g. solid state disks)

                                                    the e.g. works on anything and not bernoulli box its a little ambiguous.

                                                    1. 2

                                                      The standard interpretation for the syntactic decomposition of natural language phrases containing parenthetical inclusions mandates reading the whole sentence, ignoring all brackets, regardless of curvature, and then returning to the brackets as an addendum to the logical predecessor.

                                                    2. 1

                                                      For what it’s worth, I’d be more worried about those discrete components and their solder joint failing before the very low density hard drive did.

                                                      1. 1

                                                        I’d be more worried about the VAXen failing since they’re buying parts off eBay. ;)


                                                        EDIT: Submitted it since surprisingly nobody has.

                                                    1. 13

                                                      Whenever I read about people’s first hand encounters with Steve Jobs, I’m always impressed by what a jerk he was.

                                                      1. 1

                                                        I’m more impressed by the crystal clear memory of their sensitivity to control, authority, and power dynamics. If this many people can recall vivid memories of just one such interaction and the contest over power differential between peers, regardless of the fame of the individual involved in the incident, then what does that mean about our lives on a daily basis?

                                                        1. 2

                                                          “ then what does that mean about our lives on a daily basis?”

                                                          I’d say it means more about people’s lives working at Apple or any managers trying to emulate him. People doing demos expect conflict. They have to be ready to justify something or offer a fix. Ingalls was brilliantly capable of doing that.

                                                          1. 1

                                                            I vaguely suspect that people who are sensitive to these factors are more likely to end up getting interviewed.