Hacker Newsnew | past | comments | ask | show | jobs | submit | tech234a's commentslogin

Firefox crash reports are public though unfortunately I was unable to find their crashes: https://crash-stats.mozilla.org/

EDIT: if they still have the profile they can actually find the crash ID for their crash report: https://support.mozilla.org/en-US/kb/troubleshoot-firefox-cr...


All those extensions probably crashed the crash reporter

Alternatively you may be able to list the extensions using the sitemap: https://addons.mozilla.org/sitemap.xml

Chrome Web Store has something similar: https://chromewebstore.google.com/sitemap

And Edge: https://microsoftedge.microsoft.com/sitemap.xml


Other examples I recall when looking into this: Zotero browser connector for Firefox, Chrome Remote Desktop for Firefox (I think it adds a few features for connections to remote desktops)

I have seen some demos online such as WebVM [1] that use ephemeral devices to enable networking within the browser. It sounds like there is now a limit on the total length of ephemeral sessions on an account that last less than 240 minutes. While I'm not currently affected by this limit, it does seem rather arbitrary.

[1]: https://labs.leaningtech.com/blog/webvm-virtual-machine-with...


Hi, lead dev of WebVM here. Can you link to the specific change that affects ephemeral devices? I cannot find this reference in the article.

Keep in mind that we also plan to offer builtin networking in the near future, we are developing the infrastructure to do so as part of our newest product (In-browser sandboxes): https://browserpod.io


https://tailscale.com/pricing says "1,000 mins per month for ephemeral resources"

Thanks for sharing. I see how this could impact heavy user, but there is always the option of authenticating via a non-ephemeral auth key as a potential workaround. It's not integrated in the public WebVM UI, but it is supported by the underlying engine (CheerpX).

This article is about another one of Microsoft’s Copilot products.

However you can disable the AI chat window on the GitHub homepage in settings: https://github.com/settings/copilot/features


This is an app published by Google itself


It’s currently March


Oops. Thank you for correcting me!


That page was written by Jason Scott in 2011 and has barely been changed since then.


Why mess with perfection?


Notably these exploits were originally patched for newer devices in 2023 and 2024. However, the Coruna exploits are now publicly available because some of the IOC URLs mentioned in Google's recent blog post [1] were found to still be live. Jailbreakers are already repurposing the code to make web-based tools [2].

[1]: https://cloud.google.com/blog/topics/threat-intelligence/cor...

[2]: https://x.com/Little_34306/status/2031823581513204009 (Note: the link in this tweet goes to an exploit page that uses code repurposed from malware)


So when the exploit was discovered these phones were supposed to still receive security updates? And Apple decided to not patch these because what?

Thanks Google for forcing their hand.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: