Hacker News new | past | comments | ask | show | jobs | submit | solanav's comments login

The problem is not new TLDs, the real problem with phishings in 2024 is that the free Cloudflare layer allows phishers to be protected from automatic phishing detection tools like the ones I develop at my current job.

They also don't offer any programs for trusted third parties so we have to spend a lot of time bypassing and paying for services that skip Cloudflare instead of taking down phishing sites.


Calling a person "computer/internet/phone native" is perhaps the worst thing ever said. I think "addicted computers/the internet/phones" would be a more apt phrasing.

Sure thing grandpa!


> I think "addicted computers/the internet/phones" would be a more apt phrasing

I mean yeah, I totally agree with "addicted to computers/the internet/phones" as a problem facing a lot of people and should probably be the proper term instead of "internet native".

They were born in meatspace not in VR.

Somoene who spends the majority of their waking hours in Call of Duty or World of Warcraft to the detriment of their real lives aren't CoD or WoW natives; they have a videogame addiction.


Is it me or is the introduction written in a very chatgpt-esque style?


It didn't invent this corp-chipper style. It just read all of it.


This is why I started to learn Common Lisp a year ago. This is the kind of power I miss when I have to go back to Python…


I don't think there's anything in the post that you can't do in python. You can definitely get at the AST for a function using the inspect module, and similarly finding the file it's declared in and on which lines is entirely something you can get at from python.

Looking it up quickly it seems that inspect.getsourcelines[0] is just about perfect. Combining that with a slight misuse of inspect.cleandoc[1] and you've basically got the OP reproduced without even needing to resort to anything especially tricky.

[0] https://docs.python.org/3/library/inspect.html#inspect.getso... [1] https://docs.python.org/3/library/inspect.html#inspect.clean...



Cool! I use selenium to do phishing detection at my company and I use javascript declared variables as a source of data to analyse. It’s specially useful for links that are obfuscated by concatenating two variables into another one.


Do share them please!



is it better than something like shadowsocks?


for anonymity, yes (if using a "private" snowflake). for daily use or basic firewall circumvention, not really. as others have mentioned, it is more convenient and faster to just use shadowsocks to a digital ocean droplet or other vm.


Yeah, we should restrict the creation of emulation software to authorized parties only. /s


I mean, they are now the default. Whether we like it or not.


We should like it, because they are just so, so much better. Also, we're coming up on 3 years of availability, and the previous lines between 2015 and 2020 were pretty lackluster, so I'd expect a lot of people to have upgraded by now.


I still have an intel model, upgrading would cost me an ARM!

But I am a fan, have used em at work.


Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: