Hacker Newsnew | past | comments | ask | show | jobs | submit | wx77's commentslogin

Because depending on the size of what you are running PaaS can be very expensive.


Relevant comment on reddit as to why this isn't exactly accurate:

http://www.reddit.com/r/politics/comments/npj2q/godaddy_lost...


Aren't they still applicable to SOPA if they are .com .net .org .us domains such as homeland security taking down domains previous example shows.


This is correct. They're not foreign if the registry is controlled by the US.


Which is why I prefer eu for my own stuff.


Would one also need a non-US registrar to go with that .eu domain?

Right now i'm using Dreamhost, but what would you recommend for a completely non-US solution with decent quality?


At least for this website it isn't your data but it is their data.

They are backing up their curated photos (which seems to pretty much be the whole business as they say in the article).

It appears they are using Akamai services to server their images so hopefully their is some extra redundancy there already.

Other than that it seems like it would be a steal to use s3 as a backup system at this point because from this article it looks like they need to hire another employee to tell them why this backup solution seems a bit silly (I mean having trouble setting up the hardware).


How realistic is it for these things to actually happen though, the only seemingly realistic thing is the DOS attack.

I'm not saying it isn't smart I am just wondering if you have any examples of the others actually occurring.


Depends on what you mean by realistic. All of the examples I gave were things that have happened, or could plausibly happen.

Police Raids: http://www.wired.com/threatlevel/2009/04/data-centers-ra/ http://www.theregister.co.uk/2011/06/22/fbi_data_centre_raid...

Shutdown Registrars: http://domainnamewire.com/2009/10/12/directnic-picks-up-red-... http://blog.domaintools.com/2007/03/registerfly-terminated-b...

You can never know what the company executives or managers might be getting up to, so -- as basic risk management -- you should prepare for catastrophic events.


List of improvements: https://codex.wordpress.org/Version_3.3

Since I didn't spot the link right away.


For amazon cloudfront at the most expensive tier it buys close to 42 GB but then there would be no profit in sending the file 34 times (someone said it was a 1.2 GB file).

It makes sense to me why he is only allowing a few downloads otherwise a few extreme users could take up all his money just by streaming.


> (someone said it was a 1.2 GB file)

I confirm that it is a ~1.2GB file (the file is precisely 1,199,666,893 bytes)




Which was strictly the video feed from the first generation predator drones. If you look into the linked USAF docs, you'll see the actual telemetry and control channels are encrypted.

Wired is about as reliable about security reporting as Fox News is about the DNC. They know their audience, and want to sell eyeballs.


It's evidence that they don't always get COMSEC right though.


I am not sure how exactly I would do it, but my first approach would probably be almost purely mechanic.

Lets assume the drone is more or less blind to whatever happens above it as most of its sensors are pointed down and being stealth reduces its need to be aware of other planes (and forbids active radar). It should be feasible to approach it without being noticed and somehow entangling it (a net?) on its return flight, slowing it down (a parachute) until it runs out of fuel, and do it while jamming its communications so its owners won't have a clue of what's going on.

I think the worst problem is detecting it in the first place.


It's large, and powered by a jet engine(s) - I'm not sure how feasible 'just trap it in a net' would be.

It's also, from what I understand, VERY slow - so much so that other aircraft have trouble going slow enough to keep pace with it.


I'd expect it to be easier with a jet engine than propellers? Just use a steel cable net. Speaking of which, maybe if you use a close-mesh metallic net (maybe in addition to a coarse one for trapping), you'd break its uplink without any need for active electronic warfare?


All you'd have to do is to damage the propeller. A jet engine would probably run until there is no more fuel. I don't know how they did it, but, with the right incentive, any reasonably clever engineer would manage to do it.

It's a very unfortunate mistake to underestimate your opponents enough to give them your secret stealth drone.


They're optionally encrypted and the grunts in the field don't use it for the same reason grunts in the field have "password" as their password.

http://www.washingtonpost.com/wp-dyn/content/article/2009/12...


The WP is a much more responsible and accurate article than Wired's sensational summary -- the salient points there are "Video is unencrypted", "Pentagon has tolerated this for years" and "Predator."

Getting back to the actual focus of my comment -- the original article leaps to "obviously, the Iranians have broken our encrypted controls" from an Iranian press release, without bothering to give even speculative support. I consider it far more plausible that something simpler has happened, such as dumb old software failure, or GPS spoofing.


That article only discusses the video feed, as the grandfather comment noted.


It is immature it is dumb but I can tell you this there are plenty of college kids that would live for games like this.

Drinking is immensely popular in many colleges and drinking games are one of the most common forms of college drinking (see beer pong and others).

The real problem is that their really isn't a shop that wants to carry a game like this I would think if there were a novelty shop it might be the best bet (maybe spencer's gifts style) it is just there are so few of these kind of shops that the market reach for this kind of game is limited.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: