Hacker Newsnew | past | comments | ask | show | jobs | submit | IngvarLynn's commentslogin

Can't find the following argument in the replies: respect your visitors by not showing cloudflare's spinners and other bs in their faces.

If your site is static, a VPS would carry it a long way. I once hosted a tiny video site - 500 daily visitors, 100GB, 10$/month. Worked better than youtube, 0 issues.



I've experienced something similar and I believe D3 is not to blame.

I took 5k iu oil softgels and got a unique and indescribable BAD feeling. It crept up very gradually over the course of a month and a half and I had a hard time realizing what was happening. It took me over a month to recover after I stopped.

Another time I've taken 2k iu dry D3 and had zero side-effects.

A couple of years after that D3 mishap, I tried some omega-3 and after a two weeks I realized that that unique bad feeling was making a comeback.

Again, another time I tried a different brand of omega-3 I had no side-effects.

I have a bunch of food sensitivities. So I believe that was a reaction to some contaminants in the oil.


> 25 an hour - the bottom decile wage for software engineering

You should be aware that most software engineers in the world live outside of US. Most of them make less than that. But that's just nitpicking.

The problem with your logic is that you suggest to feed the beast that will devour you whole. Youtube is involved in multiple planetary-scale propaganda campaigns.


There is a flood of fake SSDs currently, mostly big brands. I've recently purchased counterfeit 1TB. It passes all the tests, performance is ok, it works... except it gets episodes where ioping would be anything between 0.7 ms and 15 seconds, that is under zero load. And these are quality fakes from a physical appearance perspective. The only way I could tell mine was fake is that the official Kingston firmware update tool would not recognize this drive.


Where are you seeing counterfeits? AliExpress, Ebay, Amazon?


Probably chinese sellers on all those sites. I've noticed a common thread with people who complain about counterfeits is that they're literally buying alphabet soup brand fakes from chinese FBA sellers instead of buying products directly sold by amazon or from more traditional retail channels.


There’s definitely a problem with my grandma or some less-technically educated person buying “alphabet soup” fakes, BUT Amazon does commingle inventory. This means that lots of people can end up with fakes sold by 3rd parties when buying from a reputable brand.

There were even stories of those crazy coupon people reselling on Amazon, and some cases of returned retail products ending up as “new” on Amazon. Which gets problematic with certain things like consumables (the WSJ did an article on toothpastes iirc).


> alphabet soup brand fakes from chinese FBA sellers instead of buying products directly sold by amazon

Does this actually make a difference? I remember the issue was that Amazon would bin devices together regardless if they're from some random third-party or direct sale, so you could have fakes mixed in with genuine and it was basically a lucky dip.

Is this not still the case?

Ultimately, I'd be weary of buying things like this from Amazon and as you suggest go to a more traditional retail channel instead.


Amazon only comingles inventory among FBA sellers, and gives each an option to opt-out from it if they want to. They never comingle 'sold by amazon.com' items. In cases where I've bought amazon.com items and not from FBA sellers I never received bad products, and I've easily bought dozens of SD cards, flash drives, SSDs, etc.


> I've noticed a common thread with people who complain about counterfeits is that they're literally buying alphabet soup brand fakes from chinese FBA sellers instead of buying products directly sold by amazon

AMEN to that !

And the most annoying thing is that those of us who know to avoid FBA is that Amazon have removed the "sold by Amazon" search filter tick-box.

So whilst in the past you could tick a box and be presented with a list of products which are direct-sold rather than FBA, you cannot do that anymore.

According to some Reddit posts, you can still do it if you hack the URL and add an "emi=$obscure_value" GET-param. But I'm guessing sooner or later Amazon will kill this work-around too.


Sold by amazon means "taken out of a box containing fakes and maybe real products". If that's your gamble, may as well buy the fake directly at lower cost.


Did you get the fake in an official box? Or OEM version? This is quite a big claim.


It doesn't strike me as being a big claim, I recently bought some RAM for a NUC a few weeks ago on Amazon only to determine that it was likely counterfeit. It came in an official box with all packaging intact.


Then how did you determine it was fake?


I installed it in my system after which it had severe stability issues.

Running dmidecode showed that the part number didn’t match the sticker on the module.


That's interesting. I have a Samsung 990 pro bought on Amazon and have the random lags. I've only noticed it in the terminal, so I figured something else may be the culprit. Never went to 15 secondes, but it can be around 1s.

The Samsung Magician app on Windows reports it as "genuine" and it was able to apply two firmware updates. The only thing it complains about is that I should be using PCIE 4 instead of 3, but I can't do anything about that.


I have been able to fix these random lags by doing multiple full disk reads. The first one will take very long, because it will trigger these lags. Subsequent ones will be much better.

The leading theory I have read is that maintenance/refreshing on the ssd is not done preventative/correctly by the firmware and you need to trigger it by accessing the data.


I'm going to try that, but I have little hope since this happened ever since the drive was brand new.


If you dig at the vendor data stored on the drive firmware, fakes are easy to spot. Model numbers, vendor ID, and serial numbers will be zero’d out or not conforming to manufacturer spec.

I purchased a bunch of fake kingston SD cards in China that worked well enough for the price, but crapped out within a year of mild use. I didn’t lose data. It was as if one day they worked. Then one day they were fried.


That’s wild. Is this limited to specific distribution channels or can you get them from anywhere?


How do you conclude from a single drive that there is a flood?


It could've been funny, but every second of this video reminds me of my own experiences of dealing with the government services.


I love one of the top comments on the video:

> I love how Kit has evolved over the years to find out the best way of making scammers go crazy is to treat them basically the same way Comcast treats their customers.


hahahahaha


Reason 10001 to abolish taxes.


Double bollocks.

First, you're striping agency from those workers blaming abstract society instead. There is no such thing as "collective guilt". Those particular workers are free to leave such an unsafe industry at any moment, probably even more free than, say, smokers who choose death from respiratory complications. I have exactly zero empathy for either. True that sometimes workers are not exactly free to leave the job and coerced into insane working conditions, e.g. the curse of russian monotowns: https://www.youtube.com/watch?v=HwzP-zr0S0c . That is definitely not the case for california though.

Second, your interpretation of the book is not right. Works of Pelevin, just as many other great writers, are not exactly fiction, but a compilation of a real life contemporary trends distorted by weird observation angle and grotesque style. The core theme of Omon Ra is very basic: government brainwashes people to be literal disposable cogs. AFAIR the book does not reference "society" in any way. I've read the book over 20 years ago though. One great thing about Pelevin is that he definitely had access to people of highest power at some point (early 00's at least) and translated their completely crazy worldviews into his books.


But who is going to make the dangers known to potential and currently employed workers? Companies can sieve through people until they find someone desperate enough or oblivious to the danger and they could not even be aware they're throwing their lives away.


The choice of often being homeless or that. And then you’ll berate them for being lazy.


There is definitely an abundance of low-skill jobs... so far.

So the choice is between different shops, not about homelesness.


In my experience shrinkflated products already use inferior ingredients, so it's a very useful signal that should be boosted, not eliminated. So putting a warning is a good thing, but shaming is not.

To develop the idea further, most grocery shopping should move online, so I could trivially filter out products with shrinkflated packaging, containing palm oil, nestle brands, etc.


DDoS has nothing to do with sybil attacks. DoS happens because limited resource (connection initiation) is provided for free.

They chose memory-hungry algorithm because that would prevent use of specific hardware (ASICs).


Attackers can still outsource the PoWs. The sybil is the assumption that 1 PoW == one PC. But you can force this assumption with provisioning keys at least.


And why do we need this assumption exactly?


Proof-of-work uses resources like memory, CPU, hard drive space, and so on for their challenges which just means that the person with the most resources has a disproportionate impact within the system. A botnet owner has more total resources than anyone else so any PoW challenges that a server issues can be easily outsourced to the system.

Overall, they will have more leverage from these resources than the number of systems they have access to. But you could at least restrict this to the number of systems with provisioning keys. The idea behind memory bound hash functions is that you're trying to make it hard to paralyze the challenge to a farm. But many systems in the farm are still going to have multiple cores and gigabytes of RAM (so they can be used to leverage multiple challenges simultaneously.) The underlying problem to solve here is an identity problem: allowing an individual machine to act as a single identity which various proof-of-work schemes have tried to achieve.

The ideal solution would also limit connections made by the same actors but that is probably not something you can achieve with something like TOR. This is a sybil problem, by the way.


You're trying to solve a straightforward engineering problem with an unfit solution to an ill-defined problem. The solution of sybil problem would not solve the case of coordinated attack by multiple nefarious agents. You can also call this meat botnet owned by master-coordinator. The solution would distinguish this from a normal botnet but in the end your service down in the very same manner and clients gave up most of their privacy for nothing.

Imagine instead the following trivial scheme: instead of burning resources the client would pay to be served in reverse order of payment value. Let's say client is willing to pay 1 cent to be served in the next 10 seconds. The attacker would have to pay more as he have to occupy the whole head of this queue all the time to be successful. Let's say server can process 100 rps - now he's making over a dollar per second, which he can use to scale his serving capacity.


Introducing the requirement to spend money to use the service would drastically reduce its value. It wouldn't be Tor anymore. Payments would make it easier to link identities and filter access to it. It would also mean not everyone could afford to pay for the service.

>and clients gave up most of their privacy for nothing.

Also not really sure how giving up privacy comes into this? Depending on how the scheme is implemented you can still preserve all the same privacy of using Tor with provisioning keys. E.g. you might use enclaves and keep verification hidden inside enclaves (so hosts cannot see the challenge protocol) or use zero-knowledge proofs to hide everything.

There may even be simpler algorithms since the certificate chain would be using something like RSA SHA256 (which have some neat math tricks to modify them more compared to other algorithms.)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: