Hacker Newsnew | past | comments | ask | show | jobs | submit | heffer's commentslogin

> I also happen to know this data is being transferred out of country to CDSI; ASN 23498

CDSI is Cogeco Data Services, Inc., a Canadian ISP, which later became Aptum, which in turn was acquired by Beanfield, also a Canadian ISP (the founder Dan Armstrong is actually well known in the internet community in Canada) that operates AS23498.

So I don't see how this would prove your data is leaving the country.


Um. This is weird. I know Dan (and the entire Beanfield team, at least the old guard of 10-15 years ago). Do we know each other? I was in 67 Mowat (aka Carpet Factory) off and on for a long while....


Pretty sure we don't know each other. I am a fairly recent addition to the country (2019) but we've worked with Dan and Beanfield during COVID when we put together a server for Folding@Home in our office to help them with the huge increase in load due to interest in the COVID research they were doing. Beanfield sponsors the pipe and we donated the hardware and rackspace. That server (the only Canadian one), by the way, is still running to this day. We also came up with the WiFi@Toronto project which a paper says reduced the spread of COVID in those neighbourhoods by 14.4% (https://utoronto.scholaris.ca/items/f542d219-7abe-4918-846f-...). Again, Beanfield sponsored the pipe to exit all the traffic onto the internet and we sponsored the networking equipment and were the ones installing the APs on rooftops.


Cool project! You're probably right - I haven't been in the Liberty Village area much since 2014, and moved to the US in 2022.


Germany had this principle in place for a while for internet. It's called "Störerhaftung". Just google it and see the craziness that ensued. Led to exactly the kind of court cases you'd expect to see: grandmas paying to settle lawsuits for people abusing their misconfigured WiFi, AirBnB hosts paying for their tenants' torrenting. This gave rise to movements like Freifunk which allowed people to share an open WiFi that in many cases just tunnelled back the internet traffic to central exit points using IPs assigned to registered charities that were, for all intents and purposes, classified as ISPs and therefor exempt from this secondary liability. Another nice twist was that German privacy law only requires (and sometimes only allows) ISPs to store information about their customers needed for billing purposes. But because the service is free there is no billing and thus no information about the customer is known and nothing can be provided to courts or law enforcement as a result.

I've been running one of these Freifunk networks in my hometown since 2013. In all these years I only really had law enforcement reach out 4 or 5 times. One from Austria, the rest from Germany. One for CSAM, one for bomb threats, the rest were about fraud. After explaining the situation to them I never heard back.


I run a Tor exit node (not just relay) in Australia from my residential home for about a decade now, and I’ve gotten contacted by multiple law enforcement officials now, although not frequently anymore.

Thankfully each and every one was resolved quickly when I explained I run a Tor exit node, to help people in dictatorships bypass their censorship. I’m surprised actually.

It’s probably on file somewhere which is why I haven’t been hassled for years now.


and one day, you're gonna get a knock on your door, and some law enforcement officers will ask you very nicely to install a backdoor or a wiretap onto your tor exit node.


They wouldn't need to. They'd ask his residential ISP to monitor him instead.

If you're using Tor, take it as a base assumption that the exit node is logging your traffic, or even modifying your http traffic.

Tor's value is in concealing the association between your visible access of an entry node, with visible activity on an exit node.


That’s right, Tor doesn’t mean your traffic is completely hidden for the public web. It just attempts to break the link.

The list of exit nodes are public, it’s not a difficult exercise for Five Eye to intercept like >90% of its traffic through the ISP or backbone level.


I really wish there was a paradigm where we could track people down for death/bomb threats(/swatting)/CSAM, but where the police were genuinely prohibited from accessing the same information for anything less. I guess the missing link between CSAM and piracy is probably fraud/scams? It's pretty hard to argue that law enforcement should be allowed to track someone down for an implausible death threat but not for stealing tens of thousands of dollars from a senior citizen, but then it's harder to establish a clear line between fraud/scams and piracy. I guess with fraud/scams you can just track the cash and not the other vectors?

I dunno, I have similar feelings about license plate cameras and CCTV. I don't think there's any big mysterious reasons why I can, in five minutes, imagine a system that's actively protected from abuse, but somehow it's never what's proposed, I think it's because privacy advocates tend to be opposed to the people giving cops new toys so all the proposals for giving cops new toys have minimal input from privacy advocates. It's a bummer.


The principle in question here is very different; the ISP itself has been found liable for contributory infringement.


CloudFlare and friends use a multitude of factors, AS being only one of them. I am a TekSavvy customer (Canada's largest independent, i.e. not owned by one of the incumbents, ISP). Pretty clearly an eyeball network, and I get the CloudFlare captcha multiple times per day on different sites. I'm guessing it may have to do with the fact that I use custom reverse DNS entries (instead of their default schema of 127.0.0.1.dsl.teksavvy.com) for my internet facing IPv4 and IPv6 subnet.


The link is about 2^n not n^2.


You assumed this out of air.

"Powers of 2" means this:

Here are the powers of 2 from \( 2^{-11} \) to \( 2^{11} \) in a table format:

     | Power of 2   | Value              |
     |--------------|--------------------|
     | \( 2^{-11} \) | 0.00048828125      |
     | \( 2^{-10} \) | 0.0009765625       |
     | \( 2^{-9} \)  | 0.001953125        |
     | \( 2^{-8} \)  | 0.00390625         |
     | \( 2^{-7} \)  | 0.0078125          |
     | \( 2^{-6} \)  | 0.015625           |
     | \( 2^{-5} \)  | 0.03125            |
     | \( 2^{-4} \)  | 0.0625             |
     | \( 2^{-3} \)  | 0.125              |
     | \( 2^{-2} \)  | 0.25               |
     | \( 2^{-1} \)  | 0.5                |
     | \( 2^{0} \)   | 1                  |
     | \( 2^{1} \)   | 2                  |
     | \( 2^{2} \)   | 4                  |
     | \( 2^{3} \)   | 8                  |
     | \( 2^{4} \)   | 16                 |
     | \( 2^{5} \)   | 32                 |
     | \( 2^{6} \)   | 64                 |
     | \( 2^{7} \)   | 128                |
     | \( 2^{8} \)   | 256                |
     | \( 2^{9} \)   | 512                |
     | \( 2^{10} \)  | 1024               |
     | \( 2^{11} \)  | 2048               |
The evens include "0"


??

This does not clarify -- your initial post made a claim about 0^2, which (correctly) does not appear in this list.

Moreover it is trivial that there are no negative powers of 2 that have all even digits, since the trailing digit will always be 5. So the question reduces to whether there are powers of 2 greater than 2048 that have all even digits.


0 is not in the “Value” column


Pantum is a brand of Ninestar, a group of companies that pretty much make every major component across the entire value chain of laser printers.

They bought Lexmark in 2016 (which is why some Pantum printers look like Lexmark printers).

The company has origins in manufacturing third-party replacement ICs for building compatible consumables and as such has extensive experience reverse engineering many printer designs. Many compatible printing consumables outlets carry Pantum brand printers, as they are essentially buying them through the same channels they buy their compatible consumables.

Pantum has a program for identifying genuine Pantum consumables as well, as any respectable printer manufacturer would ;-) It's a fun little sticker with some tricks up its sleeve: https://global.pantum.com/support/identification/


In similar news: The German regulator (BNetzA) just re-confirmed two weeks ago [0] that passive optical networks are not exempt from § 73 (1) of the TKG (Telecommunication law) which mandates that the interface between provider and customer is required to be a passive interface (i.e. mandating an ONT is already in violation of that). And that is fine. The different PON standards are reasonably well standardized and can operate in these standard modes for most equipment manufacturers. The NSP may lose some proprietary features, but the past has shown that equipment manufacturers have adapted for the German market accordingly. The law does allow exemptions, mainly if required for access technology reasons, but clearly states that even in that case the device that connects the end-user devices to the service (i.e. router) cannot be mandated by the ISP. They can provide one, but they cannot prevent you from connecting your own.

I do sometimes miss living in Germany.

[0]: Press release in German: https://www.bundesnetzagentur.de/SharedDocs/Pressemitteilung...


But internet in Germany is famously spotty and not great, at least compared to our neighbours the French or the Polish.


It's getting better. The situation is not ideal but very slow connections with <100 MBit/s are rare now.


I kinda disagree with everything here.

a) non-mobile internet has never been spotty unless you were on an overloaded vodafone cable connections, those are infamous

b) 50 MBit/s is not "very slow" for any reasonable definition

c) enough neighborhoods in bigger cities and probably also in more rural parts don't have more than 100. I'd need to see some proper source for that.


I think there are similar rules (or there will soon be) in all of Europe.



That's who I thought as well, but I think it's more likely https://en.wikipedia.org/wiki/Karl_Sim


That was the one, but I find it strangely pleasing that there are several near matches for the scenario described.


You can start with this: https://github.com/vasturiano/globe.gl I've built a few visualizations with it. You'd have to extend it a bit to copy exactly what Shopfiy did, but all the basics are there. It's probably also not as optimized as the Shopify implementation.


I've had a lot of fun with this reverse engineering my Napoleon gas fireplace BLE controller for the purposes of integration with Home Assisstant. In the process discovered the UART protocol it speaks with the very common SIT ProFlame 2 fireplace controller. So you could now build a very cheap controller for ProFlame 2 based fireplaces.

I went the Android Bluetooth HCI snoop log + Wireshark route.

I wrote a Wireshark protocol dissector for that specific BLE protocol which you can use with the Android BT logs: https://github.com/kaechele/bonaparte/blob/main/contrib/wire... I found this extremely valuable when debugging, because it allows me to visualize both the packets the OEM app sends and compare this with what my library sends over the air.

I ended up documenting my findings here: https://bonaparte.readthedocs.io/

BLE hacking is pretty fun.


At least for the Lenovo ThinkPad X1 Carbon Gen10 I know that they use a hybrid FFP/micro coax design. FFP to fit behind the display panel as the cable runs up to the sensor assembly and micro coax for fitting through the hinge. I don't think you'll see a lot of purely coax based designs, given the trend to thin displays with small bezels. Other laptops like the Dell XPS 13 Plus run straight FFP from the mainboard all the way to the sensor.


Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: