Hacker Newsnew | past | comments | ask | show | jobs | submit | pacquiao882's commentslogin

Advertisements are a detriment to society.

Thanks for not returning my call Casey.

Fuck off.


Comments like this are a bannable offense on Hacker News. Please don't do it again.

We detached this comment from https://news.ycombinator.com/item?id=11815636 and marked it off-topic.


This is borderline negligence for the lack of authentication and security of the app. I suppose it may just be a matter of time until someone figures out how to get access to other more critical systems in the vehicle, similar to the Tesla vulnerability from last year. It took the Tesla security researchers less than a year from when they found they could access the sound and climate systems (over similar cellular networks) to being able to flash custom firmware on-the-fly and take control of steering and acceleration / braking.


Are you confusing the relatively minor Tesla hack with the spectacularly serious Jeep hack?


WSJ is big enough to negotiate their own terms with Google Search.


They're really not. They need Google a lot more than Google needs them.

One of these things is going to happen:

(1) They end this "experiment."

(2) They stop serving Google the full content. (And see their rankings drop accordingly.)

(3) They get delisted for cloaking.


"When people die in huge crowd 'stampedes', it's rarely from being trampled, it's from being crushed and suffocated (while still standing) by densely packed bodies."

https://www.reddit.com/r/todayilearned/comments/3oqcp4/til_t...


It wouldn't take much to lose that stance and have your elbows pushed inwards.


For Windows users, HeidiSQL is a very solid open source client for interacting with Postgres.


It was not fixed. There are currently no plans to fix it in 10.10.

https://blog.malwarebytes.org/mac/2015/08/dyld_print_to_file...


That article is two weeks old. 10.10.5 was released 3 days ago, and the fix is mentioned in the release notes (under dyld): https://support.apple.com/en-us/HT205031


They were able to remotely flash the firmware while the vehicle is being driven down the highway and there's not really anything the passengers can do while it's happening. They are able to control other components like the audio system without needing to flash anything.


It depends which state you were arrested in. In some states it will remain with you for the rest of your life, regardless of innocence.


You are correct. It runs with system and graphics privileges on many devices. It is a native service started at system init and is automatically restarted if it crashes.


This specific exploit can be initiated whenever metadata for an MP4 file is processed. Disabling auto-download of MMS is an important first step workaround. Be cautious with any untrusted media files on your Android device. Simply creating the thumbnail preview image is enough to silently trigger privileged code execution.


Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: