Hacker Newsnew | past | comments | ask | show | jobs | submit | rbecker's commentslogin

> not a system that works as intended [..] flooding the market with warm bodies to undercut local labor.

Are you sure that's not intended?

"Not enough migrants arriving to keep pay down - [Irish] Central Bank" - https://www.independent.ie/business/jobs/not-enough-migrants...


Google is using Widevine to control the browser market. Can't make a competitive browser without their permission. That is the purpose of DRM, and it works.


I suspect this is why Google lawyers were so lackadaisical in the Oracle Java case.

Tactical loss. Strategic victory.


Instead, they're chanting "White silence equals violence". I'm sure demonization of a group that's on the way to becoming a minority will work out great.


The point isn't to protect content, but to need permission from the DRM makers to make a viable browser (or TV, or music player, or ebook reader, or...) Without their blessing, it won't work with locked content, and your users will go to a competitor favored by the DRM owners.


Justifiably so. For example, social science research proposals likely to have findings with an unwanted political impact have a 40-50% chance of being granted, compared to 95% for otherwise identical proposals without such impact: https://psycnet.apa.org/record/1986-12806-001

And since approval committees are drawn from the same pool as researchers themselves, such politically unfavorable research is less likely to be proposed in the first place, so the 95% -> 50% drop, if anything, underestimates the bias.

In other words, overwhelmingly, they simply won't do research that they think could hurt their politics.


Without principles, your freedom will be (is being!) slowly chiseled away, pragmatically accepting each small step. By the time even pragmatism tells you to refuse, it'll be too late.

That's exactly what happened in Hong Kong: https://www.nytimes.com/2019/10/09/technology/apple-hong-kon...

But it could never happen here...

(As someone pointed out, this does more than just prevent apps from running - it also leaks which apps you use and how often. Someone could ask Apple exactly when you started Tor browser, for example)


> Walled gardens are safer, and usually have some implicit or explicit quality guarantee (like the Nintendo seal of quality).

And consumers who want to limit themselves to the safety of Apple's app store are free to do so. But Apple goes a step beyond this, and prevents consumers who don't want to be locked-in this way, from using "unauthorized" stores or apps.

It's false to claim that the only way to offer safety is to take away user freedom.


>"It's false to claim that the only way to offer safety is to take away user freedom."

Well, I didn't claim it was the only way, but it does seem like the simplest and possibly the safest way.


and also conveniently benefits apple financially and monopolistically.


Freedom and computer security are in fundamental opposition. It’s the same basic question as GC vs manual memory management.

The only way to offer safety on a platform is to secure that platform. If Apple disables the API’s which lets apps access users contacts then they can be sure 3rd party iOS stores don’t compromise user’s privacy. If they allow API access and don’t vet stores then guess what that directly means breaches will occur.

PS: If you disagree try and come up with some supporting argument.


> PS: If you disagree try and come up with some supporting argument.

I downvoted you rather than giving you an argument. Here's why:

You've edited your post at least four times. Three of those times was when I was trying to offer a counter-argument. The problem was, you kept changing yours. I'm honestly not sure what you believe, both because you changed it so many times, but also because you haven't defined your terms (e.g. whose freedom?). Finally, you make some bold claims, but you don't really support those claims with anything I find credible.

In any case, the 'security' argument (and the associated 'reputation' argument you made in one your iterations) rings particularly hollow with me since Apple itself has already had—for decades—great success with a platform that is reasonably secure and relatively free compared to iOS: the Mac.


Objectively Mac OS has had more serious security issues than iOS, so at most you can say the trade off is worth it to you not that doesn’t exist.

As to freedom, that was specifically used by the post I was responding to. But, if you’re unsure, consider it in terms of raw assembler vs python. Raw assembler allows more freedom, but that freedom comes at a clear cost.

PS: And yes I edited to specific wording a few times for clarity. That’s a holdover from the days when hacker news would eat comments that where being edited for to long. Reputation is a major concern for Apple as a business, but outside of the scope of this discussion.


> Freedom and computer security are in fundamental opposition.

Only if you interpret "freedom" as "freedom for apps" instead of "freedom for the user". None of what you said precludes the user (I won't say "owner") being able to override Apple, or take Apple's place in deciding what their device may do.

In your mind, is a platform only "secure" when ultimate control is with the manufacturer, and not the user?

How much more "secure" were Apple's users in Hong Kong, after Apple decided to disable the app they were using to track the police?


> ultimate control is with the manufacture, and not the user.

There are a host of ways of describing computer security, but in my mind the most fundamental idea is minimizing the amount of surprises a user faces. A brick might not be a useful stake knife, but it’s secure. Anyone can want more features, but features aren’t security.

If someone goes to a knitting blog they don’t expect it to have access to their exact location via GPS, phone contacts, social security number, bank routing number etc. As such for users to have meaningful control it’s generally 3rd parties not manufactures or users that security needs to deal with. If you want to use online banking you need to trust the device to not be sharing login information with random other apps you happen to have installed, that’s incompatible with allowing such random apps to connect with your bank account.

PS: Hong Kong users benefited from having devices not compromised by the CCP, that’s what I am referring to. Clearly more app stores would let various other apps in, but how may of them would have actually been compromised?


> the most fundamental idea is minimizing the amount of surprises a user faces

I wouldn't call being given the master key to my own computer "surprising".


What’s your specific objection here? Is it somehow not acting as you assumed it would when you bought it, because that’s what surprise means not simply being annoyed with someone’s business model.


Shouldn't the user get to decide whether an app gets access to the contacts API? I should not have to trust that apple is right in saying whether I want an app to have that access.


Microsoft went down that path with Windows Vista, users want very high level permissions, which thus end up being all or nothing.

App stores on the other hand can actually differentiate between an app that only accesses contacts locally, and one that uploads that information etc. That’s not to say Apple actually does this diligently, but it’s at least possible.

Really it’s a question of deceptive apps. Suppose someone makes a AI based photo manipulation app which reasonably asks for permissions to your photos. And then quietly does a facial recognition search or just tried to find and uploaded nude photos without notifying users. You can catch that crap with human reviewers not so much permissions and automated systems.


It must be very convenient to be able to dismiss research done by anyone that might be remotely interested in publishing findings you dislike.

When a left-leaning institution publishes findings that broadly align with the left, do you also dismiss them?


> Surprised to see the level of anger here about this.

Anger could be due to:

1) Kill competition by offering product at a loss.

2) Once competition is dead and people are invested in the product and ecosystem, start charging.


And "competition" in this case isn't just other photo cloud service companies, it's also the entire habit and ability of offline bulk data handling. Having opted for a smartphone without microSD because storage was low priority, having favored the ISP when it was time to decide between spending money on more bandwidth and spending money on an NAS, these things. People have become addicted not only on the mental level.



For the record, these citations reference outcomes related to single parent families or two parent families. Also, the Brookings link is an opinion piece.

You understand that two-parent families are not exclusively married families, or that it's disingenuous to posit that if a family isn't single parent, it must be a married family, right?


Even the Brookings link cites a few studies, while the rest of this thread's posts offer nothing but hand-wringing and loaded questions.

And you're right, the links aren't exclusively about marriage. So if "married" was erased from the original claim, you'd agree with it?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: