Hacker News new | past | comments | ask | show | jobs | submit | adamconroy's comments login

There only 4 hard things in computer science. Caching, naming things and off by one errors.


Wasn't the classic joke two things, because zero-indexing?


I see what you did there


I don't know, nothing lasts forever, and one might 'die' at the hand of the other. It could easily happen through acquisition as he says.


What if the merge? _shudder_


Well... Facebook is worth ~$15bn and Google is worth ~$740bn. I'm sure Google could scrounge up 2% of it's overall worth to buy-out Facebook... but then, Google already know everything about you, so for them, Facebooks data is worthless.


Your Alphabet/Google market cap is about right, but Facebook's is 442.50B as of today.


Jaron is very good at articulating his ideas. He is preaching to the choir with me though. I was somewhat addicted to Twitter, but snapped out of it 7 years ago, and find the idea of using one of those networks tiresome.


I don't see how this 'man' in the middle could actually intercept passwords, except for http, but who runs auth over http anyway. For https, the 'man' would have to substitute its own certificate and then the browser / client software wouldn't trust the cert/domain combination without the end user being extremely stupid (and knowledgeable enough to achieve the stupidity).


It could use something like bdfproxy[1] to intercept HTTP-downloaded EXE files, then add some persistent malware in _addition_ to whatever the EXE was doing. This has been done before, over Tor[2].

The malware doesn't have to add a new root certificate, either, though that's completely possible. The Zeus trojan [3] does "man-in-the-browser" to intercept banking information, for example.

[1] https://github.com/secretsquirrel/BDFProxy

[2] https://www.pcworld.com/article/2839152/tor-project-flags-ru...

[3] https://en.wikipedia.org/wiki/Zeus_(malware)


so the spoofer distributing these devices is going to all this trouble/expense/risk in the hope there is a http downloaded exe it can corrupt, then hopes the hashing doesn't fail on that corrupt exe, and hopes the user ignores the untrusted source warning so that it can install a trojan?


How many users do you know of who manually check hashes on downloaded executables?

And of course the user is going to ignore the untrusted source warning on an executable they intentionally downloaded and are trying to run.


I think what he means is that it seems like a lot of trouble to hack someone who is not necessarily hackworthy? Like what kind of things would you expect to gain from someone who would be as computer illiterate as to allow all that to come to fruition?


I agree that $25 / month is more than the average bot is generating. That said, there's a lot of value to many people's computers if properly exploited: https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hac...


I work on a software company. You would be amazed to know how many manager types, earning 6 figures, who are absolutely naive with regards to security. Those are prime targets for this kind of exploit.


You only have to set this up once, then flash it to each device you're sending out.


These are the same users who connected an untrusted block of hardware directly to their router and presumably gave them a their Facebook login and password.


If you download putty, it comes from an http link. Try it right now



It's ironic given that putty's entire purpose is for dealing with a securely encrypted protocol.


SSL stripping perhaps? There are still plenty of sites that don't implement HSTS, and not all users are vigilant enough to notice when the site they're visiting suddenly doesn't have HTTPS anymore.

Web security has been improving a lot in recent years, but it's not yet at the point where a man in the middle isn't a relevant threat.


You type in http://yourbank.com, your bank respomds with a 301 to https, but this helpful router instead takes you to its phishing site. Lots of people wouldn't notice.


Or it redirects you to https:// yöurbank .com/, and you see the green padlock and think nothing more of it.

Edit: made HN not mangle the link.


I’d like to know which CA would issue an EV cert for a site like that - so I can remove them from my cert stores.


CA's are fully automated, they won't review or check for phishing lookalikes. Maybe reactively if it's being reported, but, should they operate as the internet police? What if it's a legitimate bank that has the same name (with an accent) and isn't beholden to the same trademark in their country?


EV can't be (shouldn't be) fully automated, but:

+ It may seem like it is if your organisation gets a bunch of EV certs with the same organisation info under some bulk deal. The issuer only does the expensive manual EV steps once per period, if you're Google in January then (the thinking goes) you are still Google in June. This saves them money so it enables them to offer pretty good deals for lots of EV certs.

+ Good EV providers streamline the manual stuff in countries like the US that have their government records online. A call centre employee can do the searches, pull up contact details and phone your Head Office or whoever to confirm in minutes not hours. However this also means they won't necessarily pick up on subtle clues like why is this outfit named Myba N K ? Oh! That's My Bank but with misleading capitalisation and spacing.

+ White hats toying with EV discovered that outfits like D&B relied on in the business community to verify identity are... Not very reliable. If D&B says the Head Office is at 632 Wall Street that might be because somebody filled out a web form, not because D&B agents even checked 632 Wall Street exists let alone that the company has offices there...


What about DNS spoofing[1] at the local network level?

[1] https://en.wikipedia.org/wiki/DNS_spoofing


The spoofer wouldn’t be able to obtain a valid certificate for the spoofed site, though.


The spoofer can obtain a valid certificate for another, seemingly legitimate site. Any software that hasn't explicitly pinned the leaf TLS certificates will still accept the (valid) certificate it is redirected to.

And sadly, a lot of software still doesn't perform certificate pinning.


How is this redirect performed?


When a URL is manually typed in, and HSTS or HSTS-preloading isn't enabled, the initial 301 redirect would be http.


It could just be a 3xx redirect over clear http, right? The http site can redirect to a https site with a similar name.


it might redirect to a malicious web page, but https would still prevent a problem. perhaps read the article you posted.


Only if they are serving HTTPS or HTTPS is pinned. Otherwise, aren't you relying on the user noticing the lack of HTTPS (which I wouldn't want to do)?


The user can just be redirected to another similar looking site with a valid TLS certificate.


How?


https://gmail.com.inbox-redirect.pro

This will seem like a valid website, especially if the phishing site is done well. Not just non-technical users, I'd wager some tech familiar users would be fooled too.

The focus always being on the lock icon might not always cover it.

Safari will prevent this though.


Isn't that why browsers visually distinguish the TLD and the part before it from the rest of the URL?


SSL/TLS downgrade attack when HSTS is not enabled.


What are the odds that someone dumb enough to install this would be scared off by an insecure site warning?


I think Chrome for a while has simply refused to let you visit a page when there's an SSL problem (at least for certain types of problems), which seems like a reasonable solution to the "people will just ignore warnings" problem.



Analogies are good at explaining difficult to understand concepts but shouldn't be used to arrive at decisions or axioms. Each situation or argument should be evaluated on its own. In other words, whilst the jazz festival and facebook models are analogously similar, just because you accept one as harmless doesn't mean the other isn't harmful.


>, just because you accept one as harmless doesn't mean the other isn't harmful.

I never said Facebook isn't harmful. My analogy was not an apologetic defense of Facebook. It's unfortunate that I can't even discuss Facebook in an intellectual and detached manner without first prefacing it with the "Facebook-is-my-enemy" street credentials first.[1][2] I've never had a Facebook account and I never will.[3]

My analogy is specifically about "product" being a label that (unintentionally) makes people dumber, not smarter, about the economics of multi-sided markets. I found it fascinating that attendees to music festivals were not hammered with the pejorative label "you are the product" -- even though that's what they were. The analogy points out that to "get something for free" in a multi-sided market, an indirect payment has to be made to make that happen -- and it happens in other businesses besides Facebook.

[1] Previously wrote that Facebook is a "devolves into a worthless waste of time": https://news.ycombinator.com/item?id=16360609

[2] Previously wrote that Facebook drives people apart instead of bringing them together: https://news.ycombinator.com/item?id=15676544

[3] https://news.ycombinator.com/item?id=14397109


Spidey sense didn't detect these problems then?


As always, it depends. Personally I have been working for a corporation where we use a microservice approach and it has been great for productivity, turn around times on projects, and the systems/services are quite easy to understand. We are full CI. Our microservices maybe aren't as micro as others, we have a pattern of having monolith 'data services' and micro business/functional/api services. The monolith 'data service', effectively a layer that exposes CRUD over data, in some cases has 10 microservices that interface. I could go on and on, but it works very well for us.


I call it TDD. Trend driven development.


I scratch around passing time on the internet, but then if I'm not doing that I'm passing time watching cable tv, passing time playing chess, passing time smoking pot, passing time reading novels, passing time playing golf, passing time laughing frivolously, passing time sleeping, passing time day dreaming, passing time eating, passing time shopping, passing time chatting on the phone......

Basically, I pass my days in my idle ways, and I don't think it matters what the medium. I can say that I don't pass my days on social media, its tedious.


I read this in a drug information pamphlet a long time ago; basically it said that cocaine and heroin both bind to a different set of receptors to the other, but alcohol binds to both. Which is what makes it uniquely addictive. Its obviously not as strong as either of those drugs but combines the nature of both.


Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: