Hacker News new | past | comments | ask | show | jobs | submit | ancarda's comments login

I was a happy FastMail customer for years, but lack of IPv6+DNSSEC was also disappointing for me. I eventually heard about Migadu ( https://www.migadu.com/ ) which has all that, and AFAIK, EU servers as well.

The only downside for me is the web UI isn't nearly as polished as FastMail.


Thx for your feedback. Will check their website. What about real IMAP Push for iOS devices? Does it work, or only every X minutes push like others? (mailbox.org, Fastmail, iCloud Mail do have real IMAP push for iOS/macOS).


Sorry, I don't have an iOS device, so I'm not sure. The only mention I could find on the website was: https://www.migadu.com/guides/gmail_android/

> While Gmail is an IMAP client app, it will not check for new mails continuously. Not only it does not support IMAP Push extensions which are standard nowadays, but the [most] frequent polling interval is 15 minutes

Which I guess implies they offer IMAP push, since they're expressing disapproval that the Gmail app doesn't support IMAP push


Thx. Nothing for me as I need direct push. But thx for the suggestion.


I don't know a lot about C or the internals of OpenSSL, but going by the commit message, does this mean we should disable TLSv1.3 until we've had a chance to patch OpenSSL?

Edit: Actually, reading through the code a few times, maybe TLSv1.2 should be disabled?

I really wish we had some way to protect ourselves until the patch is widely available.


See the other comments for why the parent is wrong.

> I really wish we had some way to protect ourselves until the patch is widely available.

I would hope/expect that the OpenSSL project has no indication that this vulnerability is used in the wild. And that is probably why they preferred announcing a patch date instead of releasing a fix right away. (But I don’t know their policies, so this is just speculation.)

That would mean that you don’t really need to do anything you shouldn’t have already been doing prior to this announcement to protect yourself until the patch is out.

Unless the vulnerability is easy to find — in which case we’d already hear about exploitation attempts, so I don’t think it is — worrying about this is as useful as worrying about the other critical yet-to-be-found vulnerabilities in the software you use (which most certainly exist).


Seems to be fixed now.


The website on https://1.1.1.1 is horrible. Completely dead modern corporate design which advertises an app and otherwise it is completely useless. Not expecting anything to be here honestly, but this... A connection refused page from your favorite browser might be preferable.


Isn't the issue more with how we implemented IP than BGP? AFAIK, DDoS attacks would be far less effective if every ISP implemented BCP 38.


Perhaps it's for https://radar.cloudflare.com/ or maybe a new service where they'll warn you if services like SSH are configured badly or not firewall'd off?

Also, is it possible this traffic is actually coming from a worker, i.e. https://workers.cloudflare.com/ rather than Cloudflare themselves?


AFAIK ZeroSSL does: https://zerossl.com/features/acme/ but I've never used them.

There are other providers out there. It would be good to collect them, perhaps into something like "awesome-acme" GitHub repo.


Can you tell me what in PHP 8 you're struggling with? Pretty much everything listed here has been deprecated for a long time or used by almost nobody: https://www.php.net/manual/en/migration80.incompatible.php

I've made my whole career about PHP and had no idea it supported stuff like (uncast).


Right sentiment (look for a simple solution), but sadly that story isn't true. https://en.wikipedia.org/wiki/Space_Pen#Uses_in_the_U.S._and...


There's lots of prior art, such as https://wheelmap.org/ -- so I imagine OSM is somewhat open to this sort of thing. Might be worth looking at how Wheelmap edits OSM. I believe it's from a generic account and edits are tagged such to make it clear it's from a member of the public.

You could also implement OAuth (sign-in with OSM) to do edits, similar to how some tools like https://maproulette.org/ work, though you'll get less contributions if you don't have an option for anonymous public edits.


> Allowed you to block certain domains from your search results

I would love for Google to build this in. Until they do, there is a WebExtension that does this: https://addons.mozilla.org/en-US/firefox/addon/hohser/ ("Block or Highlight Search Engine Results"). I use it to block stuff like W3Schools so when I search for something, MDN is always #1. Saves me a lot of time having to add "MDN" to the end of every query.


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: