Hacker News new | past | comments | ask | show | jobs | submit | atfzl's comments login

Reminds me of the danish movie "Another Round".

> Four high-school teachers consume alcohol on a daily basis to see how it affects their social and professional lives.


Exactly. "[A Norwegian philosopher] claims humans are born with a blood alcohol content that's 0.05% too low." A movie directed by Thomas Vinterberg. The trailer: https://www.youtube.com/watch?v=bj8Jmz_srDg


Hey, I wanted to try this out but I am seeing a lot of performance issues. There are forced reflows of >1s on normal interactions. I ran it on my MacBook Air M1.


Hi, co-creator of acreom here. It's known issue and we are shipping M1 build very soon.


Vite uses esbuild for transpiling and rollup for bundling. esbuild (written in go) is already pretty fast for transpiling but there might be a lot of possibilities to optimize in rollup as rollup is written in JavaScript.


Coincidentally, the primary maintainer of Rollup mentioned plans for a rust rewrite in his recent talk at Vite Conf.


All the devices with Apple silicon are supported, even the first MacBook Air 2020 with M1.


Resident Evil Village is launching on 28 Oct with Apple Silicon support!


Any word on No Man's Sky?


Try https://fasterthanli.me/articles/a-half-hour-to-learn-rust which is also written by the same author.


Wait a bit, it takes some time.

This tool needs better UX:

- A loading bar, or some feedback that it is "analyzing data"

- clicking on "Reddit" or "Hacker News" doesn't select the radio buttons


It's not just not loading, it's not even making any network requests. Seems broken.


The requests seem to go through a websocket which won't show in the dev tools unless they're open when you open the page


I don't have a lot of comments on hn but the result is still super accurate. FML.


The person who posted the link says they were the one who broke into Uber recently.

> My previous work: https://www.nytimes.com/2022/09/15/technology/uber-hacking-b...


> The hacker, who provided screenshots of internal Uber systems to demonstrate his access, said that he was 18 years old and had been working on his cybersecurity skills for several years. He said he had broken into Uber’s systems because the company had weak security. In the Slack message that announced the breach, the person also said Uber drivers should receive higher pay.

Seems like a nice kid. I hope he doesn't get caught in litigations.


> I hope he doesn't get caught in litigations.

If you ever discover vulnerabilities, responsible disclosure seems like the only way to try to keep yourself out of trouble and even then only if ignorant people in the company/lawmakers won't misconstrue what has happened and want to put you in jail regardless.

Going on the company Slack, announcing that you're a hacker who has stolen data and finishing your messages with something negative about the company does not seem to be a good way of doing that:

> Hi @here

> I announce i am a hacker and uber has suffered a data breach.

> Slack has been stolen, confidential data with Confluence, stash and 2 monorepos from phabricator have also been stolen, along with secrets from sneakers.

> #uberunderpaisdrives

That feels like opening yourself up to being treated as a criminal, especially if you post about it elsewhere (like social media) and the "breach" gets attention, which might negatively impact the stock price of the company in question.

It's good that many companies out there have bug bounties and hopefully InfoSec will be improved as a consequence of this, but there are better ways about achieving the same result, without putting yourself at so much risk.


Well, considering what they did was a crime. Being treated like a criminal seems fair.


Indeed, which is unfortunate, since there already is a better way to go about this (in most cases): https://hackerone.com/uber?type=team

Except for the social engineering aspect, in regards to acquiring the credentials, however.

Which makes the situation even more problematic.


This kind found a power shell script on a shared drive with plain text admin credentials to practically every internal Uber system. How exactly is anyone supposed to submit a bug bounty for that?


I sometimes do these bug bounties and some of these are just...

I mean Uber critical max payout is... $15.000. These are bugs that leak out client data and could possible damage the company for millions. I've had companies that argued with me that loss of client data wasn't critical but minor. Some even just give a bounty of $250.

Not that this excuses the behavior of hackers leaking confidential data but companies easily pay millions for anti-virus software that only detects well-known viruses but skimp on zero-days in their own software.


I’m not sure why people are acting like this was anything but a criminal act that was from beginning to end anything but a security researcher.

Just because it was a teen whole wrote that they stole things.


It should be clear that the user you're replying to was using humor.


They also apparently posted the n-word in company chat and redirected all internal tools to a graphic shock image. Nice kid indeed.


Screw that kid.

Not even grey hat activity.


I am kind of skeptical - the original author of the GTA 6 leak left a Telegram username to contact him, but that Telegram account was only registered today/yesterday (ID 5731422660), so it might as well be someone else who's trying to impersonate that Uber hacker.

Or it could simply be that his older account got lost/blocked/something else so he made a new one :)


The code with this method looks a lot ugly for the basic binary search where you return -1 when an element isn't found.

https://leetcode.com/problems/binary-search/

JavaScript code:

  function binarySearch(arr, target) {
    let left = 0;
    let right = arr.length - 1;
  
    // empty arr, so we won't find anything
    if (!arr.length) {
      return -1;
    }
  
    // the target is less than the smallest number in arr
    if (target < arr[left]) {
      return -1;
    }
  
    // the target is greater then the smallest number in arr
    if (arr[right] < target) {
      return -1;
    }
  
    // These two `if` are needed for the case when there are only 2 elements
    // in the array.
    if (arr[left] === target) {
      return left;
    }
    if (arr[right] === target) {
      return right;
    }
  
    while (left + 1 !== right) {
      const middle = left + Math.floor((right - left) / 2);
      if (arr[middle] < target) {
        left = middle;
      } else {
        right = middle;
      }
    }
  
    if (arr[right] === target) {
      return right;
    }
    
    return -1;
  }


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: