Hacker Newsnew | past | comments | ask | show | jobs | submit | mbag's commentslogin

It was probably done using RFDs (Requests for discussion),. You can read more on the process here [1].

But someone from Oxide would need to tell you exactly how many RFDs took to desing and implement Hubris.

[1] https://oxide.computer/blog/rfd-1-requests-for-discussion


There was an RFD for Hubris; it laid out the basic concepts and design goals, as well as non-goals. But after that, it's largely just iterating. When I joined there were four or five people working on Hubris regularly; we have weekly meetings where we sync up, talking about what we're working on, and discuss things.


Another win is for the local economy, where remote workers will spend their money.


Unless "Hygiene"-Restrictions force you to spend all on "un-local" orgs:

- Clicking on an ad likely sends ad-spending to Google/Amazon/FB/Twitter

- Using the web will increase cloud-costs, money goes to AWS

- buying stuff online likely hapens on Amazon, maybe ebay, maybe etsy

- buying stuff online likely makes your local merchants pay transaction fees to Amazon, PayPal, Visa or Mastercard

In that case "Local economy" means more money goes to tech-hubs. Your rural plumber, baker, brewer, dentist etc. will be skimmed more not less.


There's local groceries though, also local services that can't be remote or online. Groceries alone is a big part of my budget after rent. Clothes & stuff I have managed to bring to the minimum: one or two online purchases per month at most (some months even zero)


My local grocer is a Safeway (a nationwide American store chain). For most of the year, fruits and vegetables are imported from other states or countries, like cherries from South America and lettuce from California. And I doubt my Cheerios and Nutella are cooked locally. Pretty much the only local impact of grocery shopping is all the low-paying jobs they create, like shelf stockers and Instacart people.


But that's really a transfer from the local economy around the office to the local economy around their home.


No it makes local economies possible where previously all the money was sucked into the nearest city


Glad to see this is being updated. I have used Beej's Guide to learn network programming back in 2013 or 2014, and it was such a great resource.


To mitigate this kind of supply chain attacks for python, we have created following tool [1], that will check python packages on Artifactory instance you specify and create packages with the same name on the PyPi.

[1] https://github.com/pan-net-security/artifactory-pypi-scanner


Uploading dummy packages to PyPi isn't the solution. It just pollutes PyPi and a nuisance to others.

You have always been able to specify the `index-url` when installing packages using pip. This can also be added to `requirements.txt` files as well.


Yes, if you have packages on the artifactory the `index-url` is always a way to go. However, if you forget to specify `no-index`, you might not get what you wanted, see [1] for how packages are found. And it's easy to make such mistake when using local resources (you forget to set proxy or internal DNS, new developer is not familiar with the setup and does plain `pip install`, internal server is temporarily unreachable).

>It just pollutes PyPi and a nuisance to others. I agree, but so are the packages that are no longer maintained. You also reserve pakcage name if you decide to opensource it. Furthermore, by creating package you are leaking metadata about your organization, i.e. some functionality can be inferred from package names.

And sure you can train and try to enforce security awareness, but your people need to be right 100% of the time, while attackers need them to make only one mistake. Similar with namesquatting of the popular packages.

https://pip.pypa.io/en/stable/reference/pip_install/#finding...


The thing that just happened is like a catastrophic chain-reaction collision in space. Now we will have to use guids for everything. Nothing has meaning.


Here is one interesting project that lets you see in almost real time leaked secrets (or suscpected secrets there might be fasle positives) across Github, Gists, Gitlab, and Bitbucket: https://www.shhgit.com/

You can also run your own instance: https://github.com/eth0izzle/shhgit/


It's useful but yeah a ton of false positives :) Most common false positives appear to be the test values.


you could add those checks to pre-commit hooks. However, the problem with those hooks is that they need to be added locally by user. There are already modules/libraries with sets of regexes that are able to perform filtering you are suggesting.

Another option is to use pipeline to perform those checks. Sure, by the time pipeline runs, the secrets are already in the repository, but at least you caught them early. However, in this case you should definitively do secrets replacement.


Can you please share a link to ansible playbook and Kubernetes manifest for comaprison?


You can find the Kubernetes deploy here:

https://github.com/hashicorp/vault-helm

I can't share the Ansible stuff because it isn't public.


Thanks. Too bad Ansible playbooks are not public. To be clear I'm not defending Hashicorp, as I have played quite a bit with their tools (only opensource versions) and getting deployments production ready, can be painful, especially setting up security correctly, with so many moving parts.

I know about Helm chart for Vault (btw also created and maintained by Hashicorp). It's quite handy for quick deployments, but getting it to production will require changes, as most security things are disabled. All Helm chart does, it gets Vault up and running, unsealing has to be done either manually or via third party (cool thing, if your use-case allows storing such secret on third party HW). Not to mention, that if you want to use Consul as storage backend, you will have to deal with that using separate chart.

Without knowledge what Ansible playbook does, it's hard to compare the two. If ansible is configuring host OS from scratch (updates/tools installation etc) then yes, it might take much longer, then deploying to fully managed K8s cluster.


There are a handful of Ansible Roles that are community-maintained that might be of interest to you:

- https://github.com/ansible-community/ansible-consul - https://github.com/ansible-community/ansible-nomad - https://github.com/ansible-community/ansible-vault

(These were originally started by brianshumate who did an amazing job that makes starting out from scratch easy)


True, I think the nice thing about Vault Helm chart (and Consul) is that you can swap in the enterprise image. You can customize the image to your liking as well. It is lightweight and easy to scale comparably. There is definitely extra work involved, but the Ansible playbook is just sequential tasks that could be baked into the container and make it a lot faster.

I'm a big fan of Kubernetes and Helm/Kustomize as a whole, though there are times where Terraform and Ansible makes sense too.


Thanks for the links, those projects look cool. I'm not a beekeeper, but one day I would like to become one. For now I'm just reading on the subject And of course I stmbled up on the mite problem.

Do you by any chance know of anyone doing something similar to this article [1] It's noted as WIP, but I didn't manage to find any follow up papers, or some open source projects doing something similar. apic.ai looks similar but I don't think it's using lasers to remove mites from them.

[1] https://www.researchgate.net/publication/313808393_Basic_alg...


I don't know about removing mites.

From what I've seen the best practices are around ideas that seem like "the best defense is a good offense" -- or providing the bees the best possible chances and situation and letting them take care of themselves, which they do white well when fed a range of foods and not squeezed too tightly for profits and trucked across country.

Rev. Langstroth's work on this is dated ( 1850s and 1860s ) but still incredibly relevant. He's given a lot of credit for his work on moveable-frame hives, but 'd say he did a lot to advocate for the practice of bee keeping as a practice that could be engaged, as gardening, by anyone with interest.


No expert, but just happened to watch a video this morning.

According to a talk by Paul Stamets [1], common viruses transmitted from mites to bees may be managed better by adding mushroom derivatives to sugar water feed.

[1] Paul Stamets: Mycology and Mushrooms as Medicines https://m.youtube.com/watch?v=1Q0un2GPsSQ


This spooked me as well. I never used any of the Samsung apps on my phone and never created the Samsung account. Since apps come pre-installed, it was in the back of my head that Samsung could access the data anyway, but I dismissed it as company suicide to do something like this.

Since so many people received notification, it could be that some "Samsung God mode" exists.


On the idea that taking and sharing your personal data without an opt-in would be company suicide:

Samsung has already hit this sort of scandal with its smart televisions and nobody really cared.

https://www.cnet.com/news/samsungs-warning-our-smart-tvs-rec...

The expectation that the free market will keep companies from spying on us...well, it would be nice, but increasingly it seems to be wishful thinking.


Samsung can already do OTA updates. Their software runs on the phone. You already have to put some trust on them.


hi, I'm one of the contributors to this plugin. Thanks for the feedback, I'll try to make README more clear to people landing to this repo without prior knowledge of the ACME DNS or certbot plugin system.

For more on ACME DNS server the source repo can be found here [1]. The link you pasted to wiki seems to be a kubenetes how-to guide. I'll add direct link to ACME DNS repo to README as well.

[1] https://github.com/joohoi/acme-dns


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: