Hacker Newsnew | past | comments | ask | show | jobs | submit | more wisemanwillhear's commentslogin

> But there is something else entirely that’s keeping you inside Facebook and Twitter like a crackhead inside a drugstore – immediate feedback. Sadly, this same thing, is also the reason you abandon your long-term projects.

Perhaps it's just my disposition, but I find that new ideas are more interesting than old ideas, even when I get quick "feedback". The longer a project takes the older and less exciting my original ideas get and the more I come up with new, exciting ideas.

Building self discipline / temperance + accountability have helped me a lot.


> A code audit carried out by FTI Consulting was said to have revealed no causes for concern, with DJI posting the exec summary (but not the full audit) on its website as a PDF. It had access to 20 million lines of source code, according to the summary, with analysis focusing on code concerned with “communication protocols and network activity with host infrastructure”.

DJI can pay for all the audits in the world, if they are not trustworthy they can find a way to spy in spite of the audit. Computer and software systems are just too complex to declare clean with audits.

This is a trust problem that DJI simply cannot change in their present state.


An audit means nothing if you have the ability to send and execute custom code to any device which uses your hardware. No one is going to audit an internet connected Windows 98 machine and say "Yup, no malware on here", and expect that to hold true for even a second after the statement was made.


Yeah, I think the only way to "kind of" verify would be to have the consulting firm build from source and have a drone be fully operable.

Or run a public version inside a black box and monitor all traffic.


Is their software gonna be audited every time they do an update? Nope, so they can change it


> If I remember correctly, I think their agreements already forbid retails from adding the fee on top of the retail price.

That's what I thought, but someone posted something recently which may indicate that this is no longer true.

https://news.ycombinator.com/item?id=24302222


Interesting to hear another story of someone finding space in a crowded market segment.

> I was working for a company a couple of years ago and we needed a tool to do retrospectives and the existing solutions we found were not designed well and didn’t work all that great, not to mention the bigger solutions costing a lot of money to use for a relatively small need that we had. I set out to build a simple, affordable solution that looked good too.

...

> Retrospect has come a long way since the initial launch about two years ago, we have provided more permissions, more functionality, and improved the experience. The future has a lot of potential for new features and growth.

More features and more integration... Seem like most products work towards becoming the next complex, do-everything software, only to be replaced by yet another "simple" solution without the endless bells and whistles. They both have their place, but sometimes it's hard to find a simple software solution whose owners don't aspire to be the next big complicated solution. Perhaps I'm reading too much into interview...


Hey, this is Micah the creator of Retrospect.

I 100% agree one "bloat" risk of adding more and more functionality. We have been very careful not to build anything that is complex or clutters the experience. One potential area that we need to do better on is the "team" experience though. Right now every user is siloed into their own area, with the tool being so "company" focused it makes sense to bring some company based features. (Shared/Bookmarked Boards, Grouping, Manage Users, etc.) With that said, we may not either, it might not make sense bloat wise.

We have no interest in trying to "beat" our competitors (Trello essentially) or match all their features, we simply want to compliment other tools that people use.

Thanks for the feedback! Micah


A very amusing (to me) take on this is the Emacs Antinews section of the manual.


Perhaps this is just to drive up the price lest a competitor get a profitable, cash generating business for cheap.


Curious, has the President really tried that hard? I can't imagine that he would fail if he made a clean break from Twitter when switching. Love him or hate him, he in a position to command endless press through whichever platform he chooses.


Interesting business case. I think yes, he single handed Ky could jump start a new social network. Millions of people would follow him just to argue about his posts.


He could definitely pull several million people onto a new service immediately, but it would just be his most hardcore followers I would think.


I struggle with some of the points here, but one thing is for certain. Any business app that does not support both Android and IOS is unlikely to gain strong market share as Android and IOS together have a duopoly. The point that IOS doesn't have a monopoly by itself doesn't seem to be enough in my mind. I can't imagine that this is lost on antitrust regulators.


Didn't the feds hack a lot of Tor exit nodes some years back?

https://arstechnica.com/information-technology/2014/11/law-e...

What's to stop them from doing that today or simply running their own? It would be a minor expense and effort for them.


Tor + VPN makes it very difficult. You have a lot of faith in the government. They usually just go for hackers who make research papers publicly available using school and library computers.


Ross Ulbricht, Bureau of Prisons number 18870-111, also thought Tor and a VPN would protect him from the US government.


It might've if he didn't use his real name while posting on stack overflow. Plus, a few other lapses in security.


Read the biography of Ulbricht "American Kingpin". The author does a good job of breaking down the sequence of really stupid things that the Silk Road founder did to expose himself over time. None of them had much of anything to do with the failures of anonymity technologies like TOR. Also, as another response here mentions, ordering fake IDs online to his own home address is exceptionally fucking stupid.


It pretty much did, until he started ordering fake IDs shipped to his house...


Just grabbing the traffic from the exit node doesn't allow you to find out who is sending the traffic, unless the traffic itself has something that can be linked to the source. That's the magic of the layers in the network.

There are certainly some other kinds of attacks that could deanonymize this who are using tor, but the attacker needs to have control of a big percentage of the network, and I actually hope other state actors run enough nodes to make this non viable.


I'm often struck with how poorly though through most decisions tend to be. Even detail oriented tech people can be rash and short sighted. Perhaps he was a lone hacker whose surprise success was like money burning a hole in his pocket. Perhaps something spooked him and he was fearful of his breach being discovered.


> Eventually the costs become too great to ignore, and companies must upgrade their systems. But that is the moment of maximum danger, for the new software must do everything that the half-understood old one does, and more. It is, to repeat a common but apposite analogy, like rebuilding an aircraft in flight.

I've always felt this analogy is wrong on many levels. I'm guessing most attempts at rebuilding an aircraft in flight would result in failure and death. While many of the rewrites I've heard if failed, few resulted in the death of a company. Not all rewrites come with the same risks and there are strategies to deal with the risks, such as the so called strangler strategy from Martin Fowler.

I feel like discipline, organization, proper budgeting and organizational resolve are strong predictors of success with rewrites. I couldn't say the same for rebuilding an aircraft in flight.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: