Hacker Newsnew | past | comments | ask | show | jobs | submit | more sjtgraham's commentslogin

This restructuring is essentially a sophisticated maneuver toward wealth and power maximization shrouded in altruistic language.


There is nothing wrong with a sponsor if it affords cash to spend on food and refreshments for attendees. I believe there are right and wrong ways to sponsor these events. You have to keep in mind developers are one of the most marketing skeptical audiences extant, but it’s possible for it to be done well.


The issue is if that sponsor becomes too pushy, which a lot of them did become after a short amount of time.


```

<TextA> Some document </TextA>

<TextB> Some other document heavily influenced by TextA </TextB>

Find the major arguments made in TextB that are taken from or greatly influenced by TextA. Provide as examples by comparing passages from each side by side.

```

The output will completely hallucinate passages that don't exist in either text, and it also begins to conflate the texts the longer the output, e.g. quoting TextB with content actually from TextA.


$2/month is way too cheap. What's the realistic market size here? How much of that is achievable to capture within 24 months? It doesn't seem like it would even support a single developer's salary within that time. Things like this make me worry that this will not be around for long. Even an extremely talented and motivated solo founder will run out of steam earning a fraction of what their skills are worth serving the most fussy, demanding and ungrateful audience imaginable: nerds.

OP increase your prices!


You can also use the kernel task port to flip the bit on the proc struct. You can also do the same to allow unsigned code pages and RWX to enable JIT-ing.


No, but you can use Frida (which replaces an inline syscall with a JMP to a handler) but it quickly becomes complicated if the app verifies its own integrity at unpredictable points during runtime. When this happens hardware breakpoints are your friend, however the developer can still make your life hard by inlining all over the app, and then you quickly run out of hardware breakpoints.


> PT_DENY_ATTACH seems like a feature specifically invented for the purpose of serving the latter

You're exactly right. It was literally invented by Apple for iTunes as part of its DRM solution back in the day.


> There's no "personal information" here, but honestly this amount of data shared with an arbitrary list of 3rd parties is scary. Why do they need to know my screen brightness, memory amount, current volume and if I'm wearing headphones?

> I know the "right" answer - to help companies target their audience better! For example, if you're promoting a mobile app that is 1 GB of size, and the user only has 500 MB of space left - don't show him the ad, right?

Author jumps to the incorrect conclusion here. The answer is fingerprinting.


The mention of a "right" answer, quotes and all, makes it clear they understand this argument is a farce, doesn't it?


The “right” answer is not the one I end up with but rather the version sold by the vendor. this is what Apple and Google would say.


I think they are pretty clear if you read the documentation. Accessing to the exact value of these always need some privacy-related privilege on ios and android.

Without those privilege, all you can get is an approximate.


Yeah my mind also immediately jumped to fingerprinting. Somewhat required for anti-fraud to some extent, but also obviously used for more than that.


I say this half-jokingly, but only half: Zuck's on TRT now and thinking much more clearly.


Isn't it the opposite? Testosterone causes high-risk behaviour.


That’s a bad framing. Testosterone makes you less likely to place consensus above all else, which is what you want from a leader. Some will mischaracterise that as risky.


What makes you think adversarial AIs can't do the job of bug hunters and security professionals too?


Some people are using AI to generate bug reports and have been getting banned because they're hallucinated spam. The bugs don't actually exist. The curl dev wrote a blog post about this issue.

Generative AI can't think, it can only mimic.


This is like one grandparent with dementia correcting the other grandparent with dementia at Thanksgiving dinner.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: