Hacker Newsnew | past | comments | ask | show | jobs | submit | suixo's commentslogin

This reminds me of something similar I did about 5 years ago: https://blog.securem.eu/projects/2015/03/08/flooding-the-phi...

One important thing is to report the phishing attempt, both to the hosting providers involved and to the mail service used to send the emails.


Have you heard of Toggl? It's a time tracker that integrates with your browser and let you click click click on Google Agenda meetings, JIRA tasks, GitHub PRs and hopefully most of the tools you use, to track how much time you spent on it. I've used it since 2017 and it was a game changer: helped me reduce multitasking, produce factual invoices when billing hourly, identify what ate all the time in my day...

I'm sure there are also other alternatives out there but Toggl is the only one I have experience with.


Keep in mind that those 5 million people did not submit their fingerprint on this website, so they are not "known" by this tool.


Last part of this comment made me laugh, trying to imagine someone shouting over Slack "PATCH YOUR BRIDGE, NOW!!"


https://en.m.wikipedia.org/wiki/Citigroup_Center It has been done once after they found a bug.


I love the "check if integer addition will overflow" in Python:

def adding_will_overflow(x, y): return False

I have no idea if it's actually true but I find that funny.


Yeah, integers can't overflow. It will just use all of your memory.

Unless you're using a C bind, like numpy.


Awesome analysis, quite instructive. I am even considering adding it to my server performance tool, as a frontend performance metric, since I guess it could be easily automated. Imagine little README badges saying "quite bloated" and "pretty good" :p


> since I guess it could be easily automated

Certainly at the add-on level, as I presume this is how https://addons.mozilla.org/en-GB/firefox/addon/tab-memory-us... is implemented.

If feeding this back to use as a general performance metric, you would have to be very careful to make sure you were measuring the same thing each time which for a complex application could be difficult unless you are only measuring on initial page load (which might not be as useful as you are hoping for). Without this control you would need a lot of results to make any average or other analysis of the metric meaningful.

For controlled tests run by yourself in dev (rather than a performance metric for your app in production) it could be useful though.


In the original U2F spec, I think there was an "answer" to this revocation issue: "enroll a second device for every origin, and keep this one in a safe". This way you can still connect even if you lose the first one.

In practice, well, meh...


OP here. Thanks to all your rich comments, I have updated the post with the final conclusion:

GitHub is gradually (and silently) deploying HTTPS to custom-domains websites hosted on GitHub Pages, using DV from Let's Encrypt.


Thank you! This approves the gradual release thesis, although I am surprised that no communication was made by GitHub.


There is no huge problem, just an interrogation over how this happened since the UI doesn't allow it and the documentation states this is not possible.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: