Hacker Newsnew | past | comments | ask | show | jobs | submit | h4x0rr's commentslogin

Eli5, what is that supposed to mean?

The original model of computer security is "anything running on the machine can do and touch anything it wants to".

A slightly more advanced model, which is the default for OSes today, is to have a notion of a "user", and then you grant certain permissions to a user. For example, for something like Unix, you have the read/write/execute permissions on files that differ for each user. The security mentioned above just involves defining more such permissions than were historically provided by Unix.

But the holy grail of security models is called "capability-based security", which is above and beyond what any current popular OS provides. Rather than the current model which just involves talking about what a process can do (the verbs of the system), a capability involves taking about what a process can do an operation on (the nouns of the system). A "capability" is an unforgeable cryptographic token, managed by the OS itself (sort of like how a typical OS tracks file handles), which grants access to a certain object.

Crucially, this then allows processes to delegate tasks to other processes in a secure way. Because tokens are cryptographically unforgeable, the only way that a process could have possibly gotten the permission to operate on a resource is if it were delegated that permission by some other process. And when delegating, processes can further lock down a capability, e.g. by turning it from read/write to read-only, or they can e.g. completely give up a capability and pass ownership to the other process, etc.

https://en.wikipedia.org/wiki/Capability-based_security


Using explicit types is less fun though

It even defeats the purpose of type inference.

It's been a while since I've Swifted but it was mostly with combinations of nested generics, lambdas, and literals. Annotating the type of the variable those were assigned to could improve performance a lot.

You don't need to add an annotation on `let foo = bar()` where bar is a function that returns `String` or whatever.


Wouldn't lzma2 be better here since a pdf is more read heavy?


Going by one of Brotli’s authors’ comment [1] on another post, it probably wouldn’t.

[1] https://news.ycombinator.com/item?id=46035817


How would you root without resetting it?


backup, root, recover?


The only ways I know to take a full backup of an Android device require it to already be at least bootloader unlocked. There are unprivileged ways to take backups, but they don't work for all apps.


As far as I understand, on the mobile implementation not even the OS can access the buffers. So even with root you can stream L1 content but not screen record it


Hola, finally a good rust ui framework that's not dependent on web


You mean outside iced, slint, egui, etc. ?


Oh come on just learn it properly it's not a big deal to read it


And who decides if a puberty is "wrong"? The child itself certainly isn't mature enough.


I think this question concedes that there is some possibility that one could experience an incorrect puberty.

Given the definition of maturity is being fully grown, this comes across as an inherently unhelpful thing to ask. If we say “only once someone is fully grown they are able to determine if they experienced the incorrect puberty” then this makes it impossible to help children who are going to experience the incorrect puberty. Unless we have some way to determine a child is trans without any input from them, there becomes no way to help them.


The possibility of being unable to help people is not an excuse for hurting them or others. Generally if you can't know the correct action than you should stick to the status quo.

What's next, gene therapy because the embryo might want to be a different race when it grows up?


The phone doesn't accept biometrics but is still in AFU state. Encryption keys are in memory.


Ah yes, the genius lazy method You just need to keep in mind that there's much less space in a dishwasher than in a closet


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: