Hacker Newsnew | past | comments | ask | show | jobs | submit | pkaeding's commentslogin

Yes, and get requests with the sensitive data as query parameters are often used to exfiltrate data. The attackers doesn't even need to set up a special handler, as long as they can read the access logs.

But similarly to you recommending the Osprey backpack to your friends because you are a happy customer, happy/successful customers of a dating site will spread the word.

I've always thought of it as: Stallman wants the code itself to enjoy freedom, more than caring about the freedom of the people who create and use that code.


See https://thisxdoesnotexist.com/ for some ideas!


Because the employers are 'complicit' in paying these payroll taxes, and the employees are 'complicit' in supporting them by showing up for work.

/s


They don't need to make the ban public. But not stating publicly that a person did something, they cannot have defamed that person.


This is interesting. Can you explain? What leads you to believe that? Do you have any references, or is this your area of expertise?

Cell networks are not my area of expertise, but cybersecurity is, so I am genuinely interested to learn more.


I work directly with telcos. All text messages, calls, etc go through telco systems that are in data centers far from the towers. There is no benefit for one cell phone being geographically close to another to send spam messages.


They aren't really talking out of both sides, it is just all full-court-press marketing.



They also used to offer source downloads to paying customers, but never claimed to be open source, because the licence they gave to customers to access that source did not allow for distribution. (It was meant for auditing, and help in building extensions, I think)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: