Hacker Newsnew | past | comments | ask | show | jobs | submit | more failTide's commentslogin

Agreed - but if they're no longer able to effectively testify in court, they'd presumably no longer be able to do real police work - at best they'd be put in some administrative duty.


True enough - and sadly this complexity and subtlety is sometimes taken advantage of in order to create propaganda, such as to create sympathy for various issues.


I wonder why this mentality doesn't apply to other parts of society, like our police forces (i.e. shut a department down when an officer kills an innocent), or corporations that cause death/disaster? Is it because in those situations, the deaths aren't too big a price to pay?


you'd still be exposing the database system itself to the public regardless of the credentials you were using for the email service, as opposed to keeping it all within a VPC which seems to be what most guides recommend.

I assume the difference would be that having your database exposed presents additional surface area for attacks. A rube-goldberg style setup probably presents its own risks, but personally I just use AWS SES for my transactional/marketing emails and it's a one-way pipe that doesn't present any significant risks as far as I can see.


Using a public facing database, but using an IP address allow-list to restrict access is pretty secure. cc should publish the IP addresses they use.


It’s listed on the Data page! No need to open the database up to the whole internet. Just whitelist one IP.


Doesn't matter. The database still is on a public subnet on customer's network. All it takes is for someone to jack up some kind of white list or access rule and the entire database is exposed. It's an attack vector. You can't do this nearly as easily when the database is in a private subnet w/ no access to internet.


I mostly agree, but do want to emphasize that it really depends and there are multiple ways to secure this that range in complexity and maintenance overhead.

The top thing that comes to mind is creating a separate ‘read replica’ DB that logically replicates target table(s) from the source DB, creates a materialized view with a subset of the replicated data in the replica db, and then exposes only the materialized view to a specific 3rd party user.

That way you:

1) Run your primary db in a private subnet — addressing your concern with ip whitelisting

2) Run the replica in a public subnet with extremely limited access(ip-whitelisting and limited access controls to data).

This is definitely a more complex setup to reason about and creates more moving parts that can fall out of sync, but it does greatly decrease the blast radius of a breach, and for some orgs, that may be a worthwhile trade-off. In my opinion, the OP would probably benefit from some basic security walkthroughs on these different implementations to help engineering teams get onboarded/make a better case for their solution if they hit friction with legal or security teams.


All it takes is someone to both “Jack up some kind of whitelist” and leak their production database credentials.

Your private IP database isn’t unhackable either. A simple phishing attack can probably get someone’s VPN creds a nonzero percentage of the time.


I believe the alternative is a VPN, secure tunnel, authenticated proxy, or similar. Those also have accidental failure modes that would permit access to the DB regardless of which subnet it's in. I'd consider each of those as a second factor, in addition to the DB password.


That 16K Sphere in vegas could be worth checking out


> To be clear Russia is already using cluster munitions in Ukraine.

I'm not sure what your point is. Are you implying it's justified because Russia is using them?


> I'm not sure what your point is. Are you implying it's justified because Russia is using them?

What I think they are saying is there no reason to get worked up over cluster munitions in Ukraine because they already are.

The main difference between the cluster bombs given to Ukraine and the ones fired by Russia, is the Russian ones are much more likely to have landed in populated civilian areas.


Pretty sure your opponent committing war crimes doesn’t mean you get a free pass to commit war crimes.


> Pretty sure your opponent committing war crimes doesn’t mean you get a free pass to commit war crimes.

Using cluster munitions is not a war crime.

Intentionally targeting civilians with cluster munitions on the other hand is.

I don't think Ukraine is going to intentionally target their own civilians with cluster munitions.


Using cluster munitions is not a war crime.

Technically true, but just barely, and only because neither US nor Russia is not a signatory to the CCM.

But (as mentioned just now in a sibling post), in moral terms the issue is a bit more complicated, because the rest of NATO is a signatory to the CCM. So if we were to refactor the statement as "The US is supplying Kyiv with munitions that would be a war crime for its NATO partners to use" -- then it does have validity.

However the infinitely large issue remains: this war is utterly insane, and entirely lopsided, with no shred of excuse or justification, and needs to stop, now. Allegations of "hypocrisy" as such, while fine for the debate club, are tantamount to fiddling while Rome burns.


> in moral terms the issue is a bit more complicated, because the rest of NATO is a signatory to the CCM

This is not entirely true a large amount of NATO is a signatory to the CCM but there are a few members that aren't outside of the US, they are.

- Poland - Finland - Lativa - Estonia - Romania - Turkey - Greece

> So if we were to refactor the statement as "The US is supplying Kyiv with munitions that would be a war crime for its NATO partners to use" -- then it does have validity.

Outside of the 7 countries in NATO outside of the US that aren't a signatory to the CCM.

And outside the fact that war crimes are strongly defined and using a weapon that is banned by the CCM even if you have signed it doesn't make it a war crime.

This is entirely a moot anyway, Ukraine is already littered with UXO from both Russia and from it defending itself.

I cant imagine that the DCIPM that the US provided will make a real difference in the UXO compared to whats already been going on.


You're right, I was skimming.

So the closer countries are to Russia - the less likely they are to indulge in the moral luxury of signing the CCM. And Greece and Türkiye have each opted out because, well, the other has, so they must also. Makes sense in a way.


It's also disturbing that they might be tracking who your friends and family are even though you never told them.


Do we ever learn what the 'racist remark' was supposed to have been?


iPhone user since the original version. I'd take him up on the offer in a second.


and another great opportunity to tell everyone what OS you use


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: