Hacker Newsnew | past | comments | ask | show | jobs | submit | MisterNegative's commentslogin

Question: Where is text rendered? on the gpu or cpu?


That depends on a lot of factors but regardless even if it's ultimately rendered on the GPU it's first generated on the CPU as in glyphs are rendered and put in a glyph cache. Those might be cached in textures and then used to render text with the GPU as appropriate.


That depends on the browser renderer. However, I suppose most windows browsers use Direct2D for 2D rendering, which is Microsoft's 2D API for the GPU.


Are they trolling? Those are just some glasses with ir light and ir reflective coating. These will make your face more visible to cameras in the dark. Also facial recognition algorithms can easily be adapted to work around the stupid glow. They only need like 10% of your face anyway.


This is just a 1% solution, which may be enough to defeat mass data collection as long as it remains niche. For a bigger effect, carry light strong enough to saturate even a HDR camera.


If you remember the old (VHS) Macrovision, it used a pulsing contrast to mess up automatic gain control circuits. A good way to defeat this is by putting a POT on the AGC so you can tune it manually.

A way to apply this to the glasses: put a IR strobe on. Pulse it at .5s, with a .05s IR led on time.

You should be able to get away with this using an array of IRleds, battery, and a 555 timer.


This is clearly a concept and not a production product — probably more about encouraging discussion regarding privacy in public than about executing on the things it talks about.


Minihook is a great minimalistic opensource alternative if you cant pay 10000$ for Detours. http://www.codeproject.com/Articles/44326/MinHook-The-Minima...


Detours really costs $10,000??? Unbelievable. I hadn't even looked into it. Thanks for the alternative suggestion!



Lets hope the judge chooses the side of Lenovo, It would be devastating if windows/gnu/linux/apple gets sued every time they have a security flaw in a product.


There's a significant difference between Superfish, an intentionally installed application that deliberately mitigated security features in browsers to inject ads, and a security flaw that arose from poor design or a lack of good QA process. The latter are sloppy but ultimately an inevitable part of complex design; the former is an obnoxious lack of respect for your customer that deserves a serious penalty in damages and a complete reset of your brand's goodwill.

That said, I think there's an argument that customers being in a position to sue over security flaws might not be such a bad thing. It might push companies to make security and privacy important features rather than second-class add-ons.


Any argument you make will contradict itself, because you make it a subjective matter. So choosing superfish could be seen as a lack of good QA process.


....what? "windows/gnu/linux/apple" - what does any of these companies/products have to do with this? Lenovo put its customers at risk, if a judge sided with them it would be atrocious.


When were you last sold a machine with Linux and spyware pre-loaded?

Right, never.


Ubuntu


The difference between Lenovo's use of Superfish and Ubuntu providing anonymized search data to Amazon is night and day in terms of "spyware".

I don't like either, but Lenovo's actions were negligent to the point where they have exposed themselves to a justified lawsuit -- Ubuntu did not.


Which is why people shouldn't use Ubuntu and vendors shouldn't pre-install it.


You bought a machine with Ubuntu pre-loaded?


Does it look strange to you? Have seen this a lot these days, at least in the EU.


Not personally, but it's not like they're that hard to find.


Citation Needed. I live in the Bay Area, and cannot find an x86 laptop with desktop Linux preinstalled at Central Computers, Frys or Best Buy. Is System 76 what you mean, or ordering online from Dell for the XPS 13? Because that is not my definition of easy, certainly not compared to walking into a retail store.


Ordering something online is far easier than going to a retail store. I can drive for a few minutes to get to a Best Buy, look around to see if what I want is in stock, tell the salesperson who has been hounding me for the past 10 minutes that I'd like to buy it, wait in line at the register, then drive home or I can go online and be done with it in a few clicks.


Thinking mainly of System 76 and the dozens of other similar companies around the world. Sure not quite as easy as walking into a retail store, but on the other hand I don't know anybody who bought their (non-Apple) laptop at a retail store.


I know that the author only means to give advice. But the message can easily be misinterpreted into a generalization, which kind of makes the author seem like a mean person.


This does pose the question whether these mask work in real life. I bet their software uses the fact that they can control the lightning and picture quality. Creating a direct copy of a face seems easier for real life purposes anyway.

Other than demonstrating the flaws of current facial recognition algorithms there does not seem to be any use for this.

Anyway, pretty cool use of evolutionary algorithms and nice pictures.


Well this is to be expected if they can force a hosting company to report when servers connect to public tor nodes for a considerable amount of traffic.


This is just crap, for example:

- The quality of their claims is directly related to the quality of their input. There is no discussion on the quality of their input.

- They by no means justify their causal relation assumption

- They make weird claims, for example they call their method a "gold standard", but there does not exist a gold standard for this kind of pseudo-science at all. And their method has the same flaws they mention other methods have.


"All user passwords are salted, and encrypted with the powerful bcrypt algorithm, which creates an irreversible hash which cannot be cracked."


I assume you mean to point out that it is disingenous to say that any hashing algorithm "cannot be cracked"?


If you don't type the https url, you start by visiting the http website. Normally the http version will redirect to https, but a man in the middle can easily prevent this.


> If you don't type the https url, you start by visiting the http website. Normally the http version will redirect to https, but a man in the middle can easily prevent this.

This is not entirely correct. HSTS[0] was designed to protect against such attacks.

It's true, however, that not every browser out there supports it yet, and you must visit the website at least once without MITM for the server to successfully communicate HSTS header. (In Chrome certain domains are included in built-in list[1], though.)

[0] https://developer.mozilla.org/en-US/docs/Web/Security/HTTP_s...

[1] https://src.chromium.org/viewvc/chrome/trunk/src/net/http/tr...


https://hstspreload.appspot.com/ says they don't use HSTS as a preload. They should...


Facebook seems to be doing some client sniffing to decide whether to set the headers..

In my browser (FF nightly), I see the HSTS header, with the value: "max-age=15552000; preload"

If I do a request with curl, no header... (which is probably what this app sees).

I don't have a clue why they are doing that, though. Not that curl would do something with the HSTS header anyway, but still...


Facebook has HSTS preload on www.facebook.com, but not on the redirect from facebook.com->www.facebook.com. I suppose they have their reasons


Google.com also doesn't seem to have it.


Google only uses a certificate pin and doesn't force SSL. Sadly.


Yes! I just thought of this and was going to edit it in, but you are quicker. Many websites still don't use HSTS, and in any case this article is from a few months ago (I remember reading it) and HSTS is pretty new.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: