Hacker News new | past | comments | ask | show | jobs | submit | haloboy777's comments login

I can confirm everything he's saying.


I have been using rclone for over two years now. Typically, I run cron to copy any new files in the directories that are most important to me. The combination of rclone and B2 storage is quite effective, especially considering its ease of use and cost efficiency.


Schools and many many data entry shops..


https://ayushsingh.dev Not at all regular with this but try to keep this as fast as possible just out of habit.


They didn't even mention the alternative to this statement. I've only ran applications with environment variables. And since they're allowed everywhere (lambdas, docker images, heroku and whatnot), It's hard to imagine how passing credentials into code, could've been done otherwise.


The two other ways I’ve seen is a direct dependency on the secrets manager or injecting files.

Environment variables seem to be the standard.

Direct dependency is usually bad and injecting files violates the immutable nature of a container.


I wouldn't consider binding files to be a violation of container immutability, which is how K8S secrets work.


I know many services that do this. And even if you fight with customer care for RCA they go silent and pass you around to other team members to whom you need to tell the problem again and again.


Still down. I'm waiting for RCA on how Chaos Monkey[1] was not able to save them.

[1]: https://netflix.github.io/chaosmonkey/


Does anyone know whether they will be compatible with iOS?


From what I've seen Volvo has it isn't like Apple Carplay or Android Auto. Rather it's a self contained android device


Correct. Poorly named, but Android Automotive is the equivalent of the iDrive software that runs in the BMW center panel (in the absence of any other user device)...CarPlay or Android Auto could still overlay that assuming the carmaker supports it.


Yes, but Volvo/Polestar have just started the OTAs to add CarPlay support.


Yes, it does support CarPlay.


https://ayushsingh.dev

Made it with Zola.


End to end encryption is not beneficial to any big tech other than some marketing. Then why are they implementing it? Has anyone figured out any reason behind it?


So they don't have to deal with law enforcement. Law enforcement requests tie up a bunch of resources, while also being bad publicity; E2EE lets them wipe their hands of the problem.

At least until governments start implementing laws like Australia's Assistance and Access law, which compels companies to add back-doors on request.


As with everything that involves user data, it’s much easier to implement something that doesn’t have access to it. Otherwise you run the risk of data breach, FCC fines, government abuses (around the world), and so on.


It would help in not having to deal with court orders for data... being able to reply to all requests with "unable to comply" would save time.


Marketing.

Sometimes it matters. Also, it doesn't always have to be some malicious thing. Could just be that there's a visionary executive with altruistic intents who convinced a higher-up that it's the right move.

But in the case of Signal, remember that it's a nonprofit. And in the case of whatsapp, it's looking more and more like the case above.


Doesn't even have to be a visionary executive. This is one of the decisions where a senior engineer writing the design doc one way or the other can easily make the difference in how the final product looks like.

Also, besides marketing, reduced compliance costs. Once police etc. realize that you can't provide useful data, they stop asking.


When the Snowden leaks came out it was a surprise to Google that the government had tapped the data center to data center connections, as these were private and not thought to be tapped. Eventually all traffic between data centers was encrypted to prevent eavesdropping.

Internally there was a lot of animosity towards the three letter agencies for tapping our lines, so part of the rational was sticking it to them.

Also, once you hire a security engineer for one thing they tend to be pretty vocal about other security issues. They can often stir up enough trouble that it's easier just to add the extra encryption.

Adding this encryption to Google's messenger was probably a couple person-years of effort. So, like, 0.00001% of the budget?


> When the Snowden leaks came out it was a surprise to Google that the government had tapped the data center to data center connections

I guess I haven't been keeping up, but I did not know this.

Can you point me to a short documentary or document where I can learn more about what Google says it didn't know?


Google started encrypting communications across its data centers (even though they were on private lines) because of this revelation. Here’s a news report from 2013 [1] about this.

[1]: https://www.washingtonpost.com/business/technology/google-en...


https://www.techdirt.com/articles/20131030/09554125066/nsa-b... (probably not the best source, but was quick to find and has the infamous diagram)


It can't be proved that Whatsapp's implementation wasn't tampered with, however. Both server and client are proprietary. It's easy to claim OpenWhisper was implemented while there was someone looking over their shoulders there.

And when dealing with proprietary software, we can't assume benevolence by default, ever. The most defenseless link in the chain, the end-user, needs do be defended.


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: