Hacker Newsnew | past | comments | ask | show | jobs | submit | donnachangstein's commentslogin

Ben is a hipster Elton John. To put him in the same league as Brian is insulting.


Ben probably wouldn't be offended by that. He described Ben Folds Five as "punk rock for sissies". Further he said that he was always compared to Billy Joel, but hadn't heard him until he was much older, he always cited Elton John as an influence.


Feh, more music about middle class white boy pain. I like his older stuff, but producers with computers fix all his shitty tracks these days.

Seriously though, it's often fraught with peril to try to compare two artists directly, especially across time, styles, and genres. For me, I just try to weigh how much enjoyment their respective catalogs have given me, and I've enjoyed the hell out of both Ben Folds and Beach Boys records. It's all good.


WTF, it's not insulting at all.

Ben is a master writer of story-driven songs, with a very wide range and top-notch musicianship. There is definitely a similarity.

Perhaps you're not familiar with his full catalog?


Ben is eminently and deeply talented, but it's just a different aesthetic that is mostly very literal and conventional. Brian Wilson's songwriting and production technique was a one-of-a-kind imprint.


I never said Ben wasn't talented. He's very talented. I like Ben.

That said, they are leagues apart. It's like claiming Eric Clapton is as good as a guitarist in some shitty bar band.

Perhaps you're not familiar with who Brian was and what he's done.


To me Wilson and Clapton are in the same league mainly due to rather unpalatable personalities, Wilson insisting on breaking the boycott of an apartheid state and Clapton throwing racist tantrums and profiting off a tragedy in his family.


calling someone Elton John also seems like a compliment?


People bringing their pet dogs into grocery stores is an especially egregious societal ill. It's a major problem in places like Seattle where dogs outnumber children.

I once watched a woman hold her little dog over the glass at the pizza bar in Whole Foods. Was waiting for the dog to drop a free sausage link onto the pizza below.

Placing dogs into shopping carts is another one. Dogs rub their dirty buttholes on the same surfaces where you later place your fruits and vegetables.


I too dislike extreme dog people - the kind of people who treat them as a human equal. I grew up with dogs and cats, nowadays just two cats, after they go, no more pets for me. I deeply love my animals and they make great companions.

But make no mistake, they're still animals and are not predictable. I would never bring a dog with me outside to do anything other than go for a walk, always on a leash. They really dont belong in public spaces. I've seen and heard too many stories of dogs suddenly not being the perfect precious animal their owner claims and it bites or attacks another animal or person. Then when they do the owners insist the victim must have done something wrong and take zero responsibility.


> the kind of people who treat them as a human equal.

No, they treat them as better than people.

Because in their value system, animals are moral objects but not moral subjects. By that, I mean that actions done to animals can have moral weight. If you take a sick kitten and nurse it back to health, you are a good person. If you kick a puppy, you are a bad person.

But the animal itself (according to this culture) carries no moral responsibility. If a dog bites someone, it's not an evil dog. It's not the dog's fault. It was just raised poorly, or traumatized as a puppy, or the owner should have kept it leashed better, etc.

Thus animals are always morally pure, but people can be bad people. I kind of get where the value system is coming from: animals really are on the bottom of the totem pole when it comes to power and agency, so it does make sense to think of them as mostly receivers of moral actions. But some people take that really far.


Yes, it extends to the realm of absurdity. When people post videos of animals doing good things, invariably comments are posted affirming how much better animals are than humans and "we don't deserve #{animal}s". At the same turn completely forgetting that in the wild, animals eat other animals (and humans) alive, engage in tribal wars, play around and torture their prey before eating them, commit infanticide, rape, etc.


When they aren't abused, nearly all dogs are extremely loyal and affectionate. When they see you after even the shortest of absences, they act like a kid on Christmas morning just because you're there. They understand basic feelings and will try to comfort you when you're not feeling great. Most are patient to a fault with children. Many if not most will act as guardians, protecting you from threats without hesitation, even in cases where it is obvious it is likely to cost their lives.

We absolutely don't deserve them.

With no cognitive dissonance, I can also recognize that some dogs can be dangerous, and in extreme cases, need to be put down. However, I would point out that the vast majority of misbehaved dogs can and should be trained out of their bad behavior, so it's nearly always their owners' responsibilities.


You are simply delusional with your dog fetish.


> I would never bring a dog with me outside to do anything other than go for a walk, always on a leash. They really don't belong in public spaces.

This seems a bit extreme. I think dog owners have a responsibility to make sure their animal is trained and able to be controlled near people, but outdoor public spaces (parks/plazas, cafes with outdoor seating whose management is dog friendly), seem fine.

However, the responsibility for your dog's behavior extends even outside of public space. I was bitten by a dog in the lobby of a friend's building. The dog was leashed and presumably just returning from a walk. Later, I heard that some inspections in that building had to be rescheduled because a dog bit one of the inspectors while inside one of the condos (not sure if it was the same dog). Being in a non-public space in no way reduces the owner's responsibility.


Yes, it's truly disgusting. It's one of the only common anti-social behaviors that will actually make me verbalize my annoyance.


> a free sausage link

I’m in tears.


> and maintaining a dedicated three stage filter spout next to my kitchen faucet costs me approximately nothing

Calling bullshit on this one. I have one, it's positively wonderful, but the filters are expensive and per the manufacturer's recommendation you're supposed to change them all simultaneously. So when one times out, they all time out. This runs approximately $150 a year minimum depending on usage.


> This runs approximately $150 a year

$150 per YEAR at american prices is approximately nothing. That's a measly 41 cents a day.

People spend far far more than that on far far more frivolous things without thinking twice.


People spend an order of magnitude (and much more) on coffee every day, never mind smokers or drinkers who spend crazy amounts just to hurt themselves.

Not that I don't love and respect Wirecutter (I don't), but I'm on team "I like how my water tastes when it's filtered."


I suspect for most people posting here, $150 per year is "approximately nothing".


> So when one times out, they all time out

Some units give you different fixed timespans for each. For that reason, I just use the Reverse Osmosis stage and ignore the rest. RO is the last step, and in theory it renders pure water meaning the only reason to have the previous ones is to pre-filter somewhat the water and extend the RO cartridge lifespan. Problem with that is, first, there's no way to gauge when each filter is spent. Second, they're priced the same anyway, so why even bother. Just go straight from tap to RO! Keep the post re-mineralization stage if you want.


pre-filters typically have specified "capacity" in gallons. which is measurable. also if water is very dirty filters get clogged and pressure dropped. it's also measurable.

"post re-mineralization stage" is actually "ph adjustment".


I know pressure drops. The problem is knowing which filter is the one causing it in particular. Also, filters that are spent at different rates are a PITA. What I mean is if you are going to feed it nominally clean tap water, there's no reason to protect a catridge with equally or more expensive cartridges. Just use the RO filter and be done with it.


you can put pressure guages in between or one of $10 flow meters before system.

RO membrane doesn't remove chlorine iirc or vocs. On the other side chlorine degrades membrane. "nominally clean tap water" can have enough dirt to clog membrane if you don't auto backflush it frequently


It isnt merely ph adjustment... You want some amount of minerals in water for your health, plants, and taste. Changing the PH isnt the concern in most cases, its just part of the result.


All those filters are specifically made for PH adjustment (you are welcome to look at specs). There are bunch of different formulations depends on how much PH adjustment is needed.

RO makes water more acidic. if water was somewhat acidic to start with, it can get more acidic or become corrosive.


The spec doesn't tell you intent it tells you the resulting product performance.

Ph change is one part of the result, not the goal. The goal is water purification.


i am talking here about post-filters for PH adjustment. their goal is PH adjustments

those for example https://www.freshwatersystems.com/collections/specialty-cart...

or those https://www.freshwatersystems.com/collections/filters-media?...


Are you sure that it makes it more acidic? AFAIK it only outputs pure H20, should be neutral. If you feed it alkaline water you'll get "more acidic" water, but the other way if you feed it acidic water.


yes. it removes calcium and magnesium and it makes water more acidic. also i think it starts absorbing CO2 making it even more acidic.

RO doesn't output pure water. if you want pure water you slap DI filter after RO membrane.


you're right, a little oversight from me.


Food gives you all the minerals you need. Matter of fact food can cover most of your hydration needs.


True. But have tasted distilled water? Tastes metalic. Probably just my imagination but I feel like it pulls stuff from the mucous in your mouth and tastes like blood.


It is your imagination. I drink distilled water all the time and it tastes great, not metallic at all.


you sure it's distilled? if you measure dissolved solids with a water quality tester does it read 0?


What system are you using? My five stage filter system has me replace the charcoal filters once a year and the RO every... three? Maybe five?

But let's assume it costs you $150 a year. Thats less than $0.50 a day for drinking and cooking water. I doubt you could buy any significant amount of bottled water for fifty cents.


filters are cheap if you don't use fancy branded system that came up with it's own filter that incompatible with anything else


You generally want to avoid cheap filters as they apparently can be tainted with formaldehyde


standard, 2x10 filters from well known brands (pentek, apec or membranes from dow filmtec) are "cheap" compared to non-standard filters.


> but do people brew green tea or good coffee with tap water?

I use filtered tap water (under-sink type) which removes most of it.

A lot of the higher end coffee makers like Keurig have built-in filter cartridges in the water tank.

Most commercial coffee maker setups I've seen (hard-plumbed) in offices have a filter attached to the plumbing behind the appliance.

Water can be safe/potable and taste terrible, and vice versa.


> But hey, at least it's not bottled water, which is basically tap water that has been put in a single-use plastic bottle and trucked across the country.

Everyone acts like bottled water is evil until there is a water crisis, then it's the lifeline.


I don't understand your point. That $8/gal water next to the Starbucks checkout is not addressing a crisis when the baristas are rinsing out people's cups with equivalent water for free. The bottled water isn't next to the prepper-sized cans of dehydrated food in your supermarket.


> The modern Mac is a sea of Allow/Don't Allow prompts

Remember when they used to mock this as part of their marketing?

https://www.youtube.com/watch?v=DUPxkzV1RTc


Windows Vista would spawn a permissions prompt when users did something as innocuous as creating a shortcut on their desktop.

Microsoft deserved to be mocked for that implementation.


MacOS asked a permission dialog when I plug my AirPods in to charge. I have no idea what I’m even giving permission for but it pops up every time.


Asking you if you trust a device before opening a data connection to it is simply not the same thing as asking the person who just created a shortcut if they should be allowed to do that.


How do you know the person created the shortcut and not some malware trying to get a user to click on an executable and elevate permissions?


I once encountered malware on my roommate’s Windows 98 system. It was a worm designed to rewrite every image file as a VBS script that would replicate and re-infect every possible file whenever it was clicked or executed. It hid the VBS extensions and masqueraded as the original images.

Creation of a shortcut on Windows is not necessarily innocuous. It was a common first vector to drop malware as users were accustomed to installing software that did the same thing. A Windows shortcut can hide an arbitrary pathname, arbitrary command-line arguments, a custom icon, and more; these can be modified at any time.

So whether it was a mistake for UAC to be overzealous or obstructionist, or Microsoft was already being mocked for poor security, perhaps they weren’t wrong to raise awareness about such maneuvers.


A user creating a shortcut manually is not something that requires a permissions prompt.

If you want to teach users to ignore security prompts, then completely pointless nagging is how you do it.


Programs running during the user session are often running as that user.

The "correct answer" to this is probably that there isn't a good answer here.

Security is a damn minefield and it's getting worse every day.


There is no universe in which it makes sense to ask the very user who just created a shortcut if they should have permission to create that shortcut.

This is why Microsoft was so widely mocked for just how bad their initial implementation of UAC was.


"iPhone Shortcuts always asks permission to access file"

https://discussions.apple.com/thread/254931245

iOS Shortcut danger

https://cyberpress.org/unveiling-risks-of-ios-shortcuts/

But anywho, cve.org lists 78 shortcut vulnerabilities across many platforms.

I know you'd like to believe the world we live in shouldn't require permissions for a user to create a shortcut and then access it, but that... Is actually the world we live in, and have been in for a very long time.

Security is hard and it's not getting any easier as system complexity increases.

If you don't believe me, ask your favorite LLM. I asked Gemini and got back what I expected to.


If the user manually creating a shortcut is so dangerous, why did Microsoft remove that permissions prompt when they fixed their terrible initial UAC implementation?


> Can anyone explain to me if there is any way to determine whether an inbound IPv6 address is "local"?

No, because it's the antithesis of IPv6 which is supposed to be globally routable. The concept isn't supposed to exist.

Not to mention Google can't even agree on the meaning of "local" - the article states they completely changed the meaning of "local" to be a redefinition of "private" halfway through brainstorming this garbage.

Creating a nonstandard, arbitrary security boundary based on CIDR subnets as an HTTP extension is completely bonkers.

As for your application, you're going about it all wrong. Just assume your application is public-facing and design your security with that in mind. Too many applications make this mistake and design saloon-door security into their "local only" application which results in overreaction such as the insanity that is the topic of discussion here.

".local" is reserved for mDNS and is in the RFC, though this is frequently and widely ignored.


It's very useful to have this additional information in something like a network address. I agree, you shouldn't rely on it, but IPv6 hasn't clicked with me yet, and the whole "globally routable" concept is one of the reasons. I hear that, and think, no, I don't agree.


Globally routable doesn't mean you don't have firewalls in between filtering and blocking traffic. You can be globally routable but drop all incoming traffic at what you define as a perimeter. E.g. the WAN interface of a typical home network.

The concept is frequently misunderstood in that IPv4 consumer SOHO "routers" often combine a NAT and routing function with a firewall, but the functions are separate.


It is widely understood that my SOHO router provides NAT for IPV4, and routing+firewall (but no NAT) for IPV6. And provides absolutely no configuability for the IpV6 firewall (which would be extremely difficult anyway) because all of the IPV6 addresses allocated to devices on my home network are impermanent and short-lived.


You can make those IPv6 IP addresses permanent and long-lived. They don't need to be short-lived addresses.

Also, I've seen lots of home firewalls which will identify a device based on MAC address for match criteria and let you set firewall rules based on those, so even if their IPv6 address does change often it still matches the traffic.


There’s something about ip6 addresses being big as a guid that makes them hard to remember. Seem like random gibberish, like a hash. But I can look at an ip4 address like a phone number, and by looking tell approximately its rules.

Maybe there’s a standard primer on how to grok ip6 addresses, and set up your network but I missed it.

Also devices typically take 2 or 4 ip6 addresses for some reason so keeping on top of them is even harder.


A few tips:

When just looking at hosts in your network with their routable IPv6 address, ignore the prefix. This is the first few segments, probably the first four in most cases for a home network (a /64 network) When thinking about firewall rules or having things talk to each other, ignore things like "temporary" IP addresses.

So looking at this example:

   Connection-specific DNS Suffix  . : home.arpa
   IPv6 Address. . . . . . . . . . . : 2600:1700:63c9:a421::2000
   IPv6 Address. . . . . . . . . . . : 2600:1700:63c9:a421:e17f:95dd:11a:d62e
   Temporary IPv6 Address. . . . . . : 2600:1700:63c9:a421:9d5:6286:67d9:afb7
   Temporary IPv6 Address. . . . . . : 2600:1700:63c9:a421:4471:e029:cc6a:16a0
   Temporary IPv6 Address. . . . . . : 2600:1700:63c9:a421:91bf:623f:d56b:4404
   Temporary IPv6 Address. . . . . . : 2600:1700:63c9:a421:ddca:5aae:26b9:a53c
   Temporary IPv6 Address. . . . . . : 2600:1700:63c9:a421:fc43:7d0a:7f8:e4c8
   Link-local IPv6 Address . . . . . : fe80::7976:820a:b5f5:39c3%18
   IPv4 Address. . . . . . . . . . . : 192.168.20.59
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : fe80::ec4:7aff:fe7f:d167%18
                                       192.168.20.254
Ignore all those temporary ones. Ignore the longer one. You can ignore 2600:1700:63c9:a421, as that's going to be the same for all the hosts on your network, so you'll see it pretty much everywhere. So, all you really need to remember if you're really trying to configure things by IP address is this is whatever-is-my-prefix::2000.

But honestly, just start using DNS. Ignore IP addresses for most things. We already pretty much ignore MAC addresses and rely on other technologies to automatically map IP to MAC for us. Its pretty simple to get a halfway competent DNS setup going on, so many home routers will have things going by default, and its just way easier to do things in general. I don't want to have to remember my printer is at 192.168.20.132 or 2600:1700:63c9:a421::a210 I just want to go to http://brother or ipp://brother.home.arpa and have it work.


Helps, thanks a lot!

But as you can see this is still an explosion of complexity for the home user. More than 4x (32 --> 128), feels like x⁴ (though might not be accurate).

I like your idea of "whatever..." There should be a "lan" variable and status could be shown factored, like "$lan::2000" to the end user perhaps.

I do use DNS all the time, like "printer.lan", "gateway.lan", etc. But don't think I'm using in the router firewall config. I use openwrt on my router but my knowledge of ipv6 is somewhat shallow.


At home, with both ip v4 and v6. For any device exposed on the Internet, I add a static IPv6 address with the host part the same as the IPv4 adress.

example: 2001:db8::192.168.0.42

This makes it very easy to remember, correlate and firewall.


Ok, that parses somehow in Python, matches, and is apparently legit. ;-)

    >>> from ipaddress import IPv6Address as address
    >>> address('2001:db8::192.168.0.42')
    IPv6Address('2001:db8::c0a8:2a')
    >>> int('2a', 16)
    42
Openwrt doesn't seem to make ipv6 static assignment easy unfortunately.


Oh yes, it is part of the spec for IPv6 addresses text representation :)

https://www.rfc-editor.org/rfc/rfc4291#section-2.2


That makes sense. I do love the idea of living in a world without NAT.


I don’t: NAT may have been a hack at first, but it’s my favorite feature provided by routers and why I disable ipv6 on my local network


Why do you like NAT?

Does your router being slower and taking more CPU make you feel happy?

Do you enjoy not seeing the correct IP in remote logs, thus making debugging issues harder?

Do you like being able to naively nmap your local network fairly easily?


Perf concerns over 32bit numbers ended in the nineties. Who at home cares about remote logs?


I like all the computers in my house appearing to remote servers as a single remote host. Avoids leaking details about my home network.


@donnachangstein:

The device is an IoT guitar pedal that runs on a Raspberry Pi. In performance, on stage, a Web UI runs on a phone or tablet over a hotspot connection on the PI, which is NOT internet connected (since there's no expectation that there's a Wi-Fi router or internet access at a public venue). OR the pi runs on a home wifi network, using a browser-hosted UI on a laptop or desktop. OR, I suppose over an away-from-home Wi-Fi connection at a studio or rehearsal space, I suppose.

It is not reasonable to expect my users to purchase domain names and certs for their $60 guitar pedal, which are not going to work anyway, if they are playing away from their home network. Nor is ACME provisioning an option because the device may be in use but unconnected to the internet for months at a time if users are using the Pi Hotspot at home.

I can't use password authentication to get access to the Pi Web server, because I can't use HTTPS to conceal the password, and browsers disable access to javascript crypto APIs on non non-HTTPS pages (not that I'd really trust myself to write javascript code to obtain auth tokens from the pi server anyway), so doing auth over an HTTP connection doesn't really strike me as a serious option either..

Nor is it reasonable to expect my non-technical users to spend hours configuring their networks. It's an IoT device that should be just drop and play (maybe with a one-time device setup that takes place on the Pi).

There is absolutely NO way I am going to expose the server to the open internet without HTTPS and password authentication. The server provides a complex API to the client over which effects are configured and controlled. Way too much surface area to allow anyone of the internet to poke around in. So it uses IP/4 isolation, which is the best I can figure out given the circumstances. It's not like I havem't given the problem serious consideration. I just don't see a solution.

The use case is not hugely different from an IoT toothbrush. But standards organizations have chosen to leave both my (hypothetical) toothbrush and my application utterly defenseless when it comes to security. Is it any surprise that IoT toothbrushes have security problems?

How would YOU see https working on a device like that?

> ".local" is reserved for mDNS and is in the RFC, though this is frequently and widely ignored.

Yes. That was my point. It is currently widely ignored.


Grandparent explained that a firewall is also needed with ip6.

I understand that setting it up to delineate is harder in practice. Therein lies the rub.


> can't even agree on the meaning of "local"

Well, who can agree on this? Local network, private network, intranet, Tailscale and VPN, Tor? IPv6 ULA, NAT/CGNAT, SOCKS, transparent proxy? What resources are "local" to me and what resources are "remote"?

This is quite a thorny and sometimes philosophical question. Web developers are working at the OSI Layer 6-7 / TCP/IP Application Layer.

https://en.wikipedia.org/wiki/OSI_model#Comparison_with_TCP/...

Now even cookies and things like CSRF were trying to differentiate "servers" and "origins" and "resources" along the lines of the DNS hierarchy. But this has been fraught with complication, because DNS was not intended to delineate such things, and can't do so cleanly 100% of the time.

Now these proposals are trying to reach even lower in the OSI model - Layer 3, Layer 2. If you're asking "what is on my LAN" or "what is a private network", that is not something that HTTPS or web services are supposed to know. Are you going to ask them to delve into your routing table or test the network interfaces? HTTPS was never supposed to know about your netmask or your next-hop router.

So this is only one reason that there is no elegant solution for the problem. And it has been foundational to the way the web was designed: "given a uniform locator, find this resource wherever it may be, whenever I request it." That was a simpler proposition when the Web was used to publish interesting and encyclopedic information, rather than deliver applications and access sensitive systems.


Ironically, Chrome partially supported and utilized IE security zones on Windows, though it was not well documented.


Oh yeah forgot about that, amazing.


> what are you even doing?

Forensics, among a hundred other things.

> Literal amateurs can launch a WooCommerce site from nothing in a weekend

Selling low-volume horseshit out of your garage is in no way comparable to running a major eCommerce site.

> two Stanford grads in YC can do a hundred-fold better than that.

No they literally can't.

> Yes, a big site is more complicated, maybe there will be some frazzled manual data entry in Excel sheets while your team gets the "real" site back up

Great idea, we'll have Chloe in Accounts manage all the orders in a million-row Excel sheet. Only problem might be they come in at 50 orders a minute, but don't worry I hear she's a fast typist.


> whereas startups building new products often get by with relatively few people

90% of startups fail within 5 years so probably not the best example of how to run things.

The few that do "succeed" often carry over mountains of cruft and garbage code into perpetuity (for example Reddit).


Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: