Hacker Newsnew | past | comments | ask | show | jobs | submit | 2009-09-04login
Stories from September 4, 2009
Go back a day, month, or year. Go forward a day, month, or year.
1.XSS Twitter in minutes; Why you shouldn't store important data with 37signals (mastenbrook.net)
156 points by antonovka on Sept 4, 2009 | 60 comments
2.Get Less Done: Stop Being Productive and Enjoy Yourself (zenhabits.net)
104 points by onreact-com on Sept 4, 2009 | 35 comments
3.Joe Stump: Why I switched from PHP to Python (joestump.net)
92 points by dannyr on Sept 4, 2009 | 95 comments
4.Inventing Demand (startupblog.wordpress.com)
88 points by tomhoward on Sept 4, 2009 | 32 comments
5.Snakes on the Web (jacobian.org)
87 points by arthurk on Sept 4, 2009 | 15 comments
6.Smule: I am T-Pain (smule.com)
79 points by ashishk on Sept 4, 2009 | 28 comments
7.A Javascript date library (datejs.com)
71 points by mcxx on Sept 4, 2009 | 31 comments
8.Ask HN: 3 Ideas (with slides) for YC W10 - What do you think? (ycombinator-w10-cofounder-search.tumblr....)
64 points by YCW10 on Sept 4, 2009 | 35 comments
9.Loopt to work in the background on iPhone via deal with AT&T (businessinsider.com)
62 points by fromedome on Sept 4, 2009 | 60 comments

I'm usually the first person here to jump to 37s' defense. I know some of their people, they're hometown heroes, and I use and like their products.

This is hard to defend, guys.

It is literally the-simplest-thing-not-to-fuck-up. Nobody's asking you not to have security vulnerabilities. In fact: nobody's even asking you to fix vulnerabilities. We just need a reliable way to communicate with you about them.

If you're selling accounts on a web app, you need:

* A security page * With a PGP key * And an email contact * of someone who will write back * who knows what a security vulnerability is * and who will write back quickly.

That's it. Do that, and you're not a punch line. If someone dumps zero-day about you onto Twitter, you're already two steps ahead in the PR war, because you had a reasonable process, and the researcher ignored it.

Bonus points --- things that are trivial to do, but that nobody's even asking you to do:

* You can assign special issue numbers to vulnerabilities, to make the researcher feel like an XSS disclosure isn't the same thing as a bug in your online help.

* You can thank researchers privately, and let them know that you'd really like them to keep disclosing thing to you --- you could even give them (wait for it) a phone number.

* You can do what every vendor with a real security team does, and keep a public web page thanking people who have discreetly disclosed vulnerabilities to you.

11.Spreadsheet of every TED talk as of 9/2/2009 (boingboing.net)
63 points by fogus on Sept 4, 2009 | 15 comments
12.Revisiting PG's New Reality, 7 Months Later: Ticketstumbler vs. Fansnap (compete.com)
61 points by Mystalic on Sept 4, 2009 | 36 comments
13.Complexity is insecurity (daemonology.net)
58 points by cperciva on Sept 4, 2009 | 15 comments

Does one really need to explain why he switched from PHP to anything?

As I understand it, Rails' string escaping would treat an invalid byte sequence (eg, 0xFF, 0x1C) as a single multi-byte code point, and thus not filter it, even though 0x1C (which is '<') should have been escaped.

The browser, however, would correctly treat 0xFF as an invalid initial byte, and then interpret the next character point, 0x1C ('<') independently.

So, you could pass arbitrary characters through Rails' string escape functions by prepending an initial invalid byte sequence, and thus cause the browser to interpret arbitrary JS/HTML.

16.Men lose their minds speaking to pretty women (telegraph.co.uk)
55 points by timr on Sept 4, 2009 | 52 comments

When a man meets a pretty woman, he is what we call 'reproductively focused'.

I guess this is the scientific term for horny.


I found this gem in the comments on that page:

I appreciate the kind comments. If you or a friend / family member could benefit from the catheter, please do not hesitate to contact us on our website at www.vasculardesigns.com

No one will be turned away if they can not afford the catheter.

Robert Goldman


This article is inspiring but it fails to mention that no studies have shown that the device actually works. The FDA approval process for medical devices is very different then from pharmaceuticals; to oversimplify, efficacy does not need to be demonstrated, only safety (i.e. the device is not toxic). Thus the fact that the device is FDA approved doesn't really mean much (although it sounds great).

As with renewable energy, cancer treatment draws massive attention because it is such a big problem, and potential miracle solutions constantly make headlines.

However, the general audience does not have the background to place these announcements in context, and neither does the typical journalist. It is actually rather easy to come up with an entirely new approach that seems to work under certain conditions (algae make biofuels! solar panels in space! mice cancer cured!) but has no practical value. Having said that, good luck to this guy and I hope the device works well.

(I work in medical devices for cancer diagnosis)


Brian, I'm on the receiving end of security@37signals.com and @rubyonrails.org. I read your post with great dismay, to put it mildly. You're understandably pissed: we whiffed on our response to you by changing venue to Rails security without keeping you in the loop.

This is my fault. I identified it as a Rails issue and requested that you forward your findings to the Rails security team so we could investigate in concert.

Craig here at 37s narrowed down a root fix with Michael, Rails' security ombudsman, who then enlisted Manfred's help to track down and repair the root cause. What you see today is the end result of those efforts. The security process worked, but you only saw the Rails arm of it. The apparent 37signals arm of it amounted to runaround. Completely not OK.

We now have a security-only email and PGP key at http://37signals.com/security. Next time, no runaround.


That's part of why I found her story so fascinating.

No disrespect, but that's not fascinating, it's stupid.

Basically, she had no savings. No rainy day fund. No retirement funds. No investments.

What's the first think Suze Orman types tell all of those women that watch her? Have enough set aside for 2-3 months living expenses - minimum!

There's simply no excuse for someone working so close to money to be so irresponsible with her own. I feel for her, but perhaps this is lesson learned.


This letter really bothers me for a few reasons:

1. The letter did not need to be open at all. If you want to travel the country for 30 days without paying, more power to you but why not just send it to the jetBlue CEO directly?

2. The people behind this letter obviously think their idea is amazingly brilliant. Which it isn't. Everyone has interesting stories. You could go into a Dunkin' Donuts at 3AM and hear some pretty crazy stuff. No need to be at 30,000 feet.

3. These people probably WILL get free flights or some other special support from jetBlue because God forbid a publicly-traded company didn't listen to any and every simple Jack who asked for something on the internet.

23.Young Workers in Free Fall: 1/3 Under 35 Live with Parents (alternet.org)
48 points by edw519 on Sept 4, 2009 | 75 comments
24.Hacking goes squishy (economist.com)
45 points by fauigerzigerk on Sept 4, 2009 | 37 comments

This is magnificent. Zen Habits has managed to squeeze an message against the facile, uncreative, stultified, by-the-numbers webcock formula directly into a facile, uncreative, stultified, by-the-numbers blog post.

There is still much waiting to be said to fight back against the lifehacking, GTD, how to work for only 4 hours a week by being a giant dick and how to convert all of your farts into actionable GasHacks and become more productive by making sure you never have an original thought again movement. It is not said by productivity bloggers with a shitty book to hawk.

26.Fighting terrorism the Silicon Valley Way [video] (wsj.com)
45 points by rantfoil on Sept 4, 2009 | 13 comments
27.Why AI is a dangerous dream - interview with Noel Sharkey (newscientist.com)
40 points by limist on Sept 4, 2009 | 77 comments
28.Hidden messages in NES games' code (magweasel.com)
40 points by amelim on Sept 4, 2009 | 9 comments
29.The Companies Headhunters Avoid (businessweek.com)
40 points by cwan on Sept 4, 2009 | 24 comments

It's ironic that this report was put out by the AFL-CIO, an organization who has done as much as anyone to preclude the movement of younger workers into the workforce (via union seniority policies, minimum wage laws, etc.).

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: