Hacker Newsnew | past | comments | ask | show | jobs | submit | dcohenp's commentslogin

I bet you're thinking of macOS Server [1], which costs $19.99 (twenty dollars).

[1] https://www.apple.com/macos/server/


Well, now I feel like I'm in a jack in the box ad.


> 7. The Apple troubleshooting guides are out of date. They do not note that if you have a firmware password on a T2 Mac, you cannot reset PRAM as expected and therefore cannot resolve screen brightness issues this way. You also cannot run diagnostics due to the black screen.


"Hey Siri" has in fact been tied to the owner's voice since the iPhone 6s (2015): https://www.macrumors.com/2015/09/11/apples-hey-siri-feature...


Progress! I stand corrected. Thank you.


Meanwhile, I have my Pixel lock on screen off (only because the fingerprint reader makes unlocking/turning on easy) with OK Google unlocking enabled.

The only problem here is that Google still doesn't recognise my voice half the time, perhaps because I'm never sure about how I should speak to an inanimate object.

Speaking of unlocking methods, face unlock appears to no longer be available as an option for me. I can't find it in settings anymore (smart unlock etc).


I've seen at least one, but it's proprietary and internal to my bigco. I'm willing to bet there's quite a few more at other bigcos. So lucky for you if you can avoid them, but I'm pretty sure there's many of us who don't get that choice.


I do this often, too. Just FYI: all you need to do is tell WhatsApp "Never mind, I'm not actually changing my number" when prompted (which should only happen once per SIM card change). That's it. You'll continue being identified to your WhatsApp contacts by your "home" phone number (not your temporary one).


I don't have a home phone number.


I think from the fact that it was in quotes, "home" just means your default number


I don't have a default number.

You can see why I might think that forcing phone number to equal identify might be a bad idea.

I understand that I'm an unusual case, but I'm sure plenty of other people go through something similar this every couple years if and when they switch phone numbers or providers or move.


I have had the same mobile number for the past 20 years, throughout dozens of different phones and operators. This is very typical where I live (Southern Europe) where, in fact, WhatsApp is very popular.

Question: how do people you haven't been in contact with manage to find you, if you change your number every 2 years?


In the past three years, I haven't spent more than 60 cumulative days in a single country. Keeping a single phone number is a nonstarter for me.

People contact me via email. Apple's iMessage is the only chat client I've been able to use effectively, because they tie identity to email, not phone number.


Car. Nightstand. Kitchen counter while you cook/wash dishes. There's a myriad situations where you want to use your device hands-free. In fact, it's the driver behind an entire new product category (see Amazon Echo, Google Home, etc.).


>it's the driver behind an entire new product category

Yeah.. the "consumer as product" category


It looks like they're definitely working on bolting on some of that stuff onto C# and the Runtime in the near term: https://qconnewyork.com/system/files/presentation-slides/csy...


I'm gonna go with Tony Hoare here and say if I could pick just one it'd be NULL pointers.

(Braces though? Really?!?)


I'm sorry, but this line of argument is not even wrong as it relates to the entire modern infosec field, which is founded on the fact that there is no such thing as "100% security"; that is why concepts such as "threat models" and "defense in depth" exist.

Also, proving a program "correct" (for some definition of correctness that presumably includes "secure") is undecidable, ergo there cannot be such a thing as a "100% secure language". No, not even Erlang, nor Haskell, nor anything which is remotely close to Turing-complete. So all we can do is, in fact, decrease the attack surface.


> No, not even Erlang, nor Haskell, nor anything which is remotely close to Turing-complete. So all we can do is, in fact, decrease the attack surface.

You often don't even need Turing completeness.


That is indeed what the post you're replying to meant. Note that the pointed-to value is a constant string, yet the pointer itself is being modified. That's a fairly common idiom in C string-handling code, only possible because it's a const char , not a const char const.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: