Hacker Newsnew | past | comments | ask | show | jobs | submit | antsar's commentslogin

Clicked one of the examples...

> I have a 400mm x 500mm x 80mm drawer for screws and bolts.

(thinking for a while)

"Please provide drawer dimensions to continue."


Why these wouldn’t be cached is beyond me. Cool idea though!

It looks like that's just a generic error message. For me, this websocket message is received when the error appears:

    {"error":true,"body":"Your credit balance is too low to access the Anthropic API. Please go to Plans & Billing to upgrade or purchase credits.","done":false,"id":"XXXXXXXX","type":"cf_agent_use_chat_response"}

The error message should point that it's the server, not the user problem.

Wait long enough and it popped up for me. (Android, also basically Linux but using Vivaldi)

Took about 10 secs.


Same

(Firefox, Android (which is Linux))


Same.

(Firefox, Linux)


It takes serious hardware investment [0] to pull that off.

[0] https://lenowo.org/viewtopic.php?t=28


Meta-Meta-Meta:

Update:

After the recent hacker news "invasion", I have now determined that the page can handle up to 1536 users before running out of RAM, meaning that the IP camera surprisingly is fully sufficient for its purpose. In other words, I will not be moving the forum in the near future as 32 MB of RAM seem to be enough to run it

Source: https://lenowo.org/viewtopic.php?t=28


> Host it on the Fritzbox 7950 instead?

It's a router.. oh my god that made me laugh


A local REST API doesn't require servers.


That I agree with, although real thought needs to be put into security for this. This is literally a key to your home.


Yes. This is frustrating. Notable examples:

Updating an ESPHome device config requires network to build/compile the image. [0]

Viewing your Integrations page leaks a list of integrations you are using to "brands.home-assistant.io". [1]

[0] https://community.home-assistant.io/t/esphome-completely-off...

[1] https://community.home-assistant.io/t/wth-why-are-brand-icon...


Is the certificate for that domain pinned? If not, just host it locally. In fact, I'm going to try doing that. Have you already checked the Docs? Somebody probably already published a gist somewhere with the needed path


Locally hosting platform IO is definitely on my to-do list but it is a problem which looks vast.

I have SQUID doing TLS MITM in front of it right now, but that doesn't get me really to "offline builds".


Color: 6-pack


You won't see another mosquito - guaranteed!


You're not going crazy :)

Hover over the "minutes ago" string on any of those comments & you'll see the original timestamp. I guess this is a repost, comments got merged, and the "minutes ago" strings are cached/pre-generated from the old thread?


> lawyer ads

I take it you haven't had the pleasure of driving thru Philadelphia. Some say you can even see skyscrapers behind the sea of lawyer ads.


And Florida. Most popular billboard ad is a lawyer ad.

I’m glad WA banned them.


Nope, just NYC and California.

This one got stuck in my mind: https://www.sfgate.com/local/article/anh-phoong-iconic-billb...


Experienced this too. Having SSH access enabled on the Synology saved the day. There's no 2FA prompt on SSH, so you can SSH in and manually fix the time.


Kinda defeats the whole point of MFA if you can just bypass it like that.


SSH and the web UI are two different interfaces running on separate ports that can be firewalled differently. You might, for instance, expose the web UI on an external port on your router while restricting SSH access to the NAS's subnet. In that case, the MFA is a critical extra layer of security.


If the SSH key is password-protected, then SSH access is MFA.


Not sure that's true... If the key gets compromised, having it password protected does nothing.


If your private SSH key is password protected, it is encrypted symmetrically with that password.

If somebody steals your password protected private key file, having the password protection there means they have to bruteforce the password. It does not 'do nothing'. Its an extra layer. If your password is secure enough, it can protect you from having the ssh private key decrypted.


It's an extra layer, but is that really another 'factor'? MFA would prevent someone with a compromised key from logging in. Password protected keys do not.


Okay I see your point now


> If the key gets compromised, having it password protected does nothing

I apologize for my ignorance in advance: having a private key file password-protected does nothing?

I guess I'm not understanding what you mean by "compromised"?


I think the point is about parallel vs serial layers of security. In a typical website account that is protected by password and SMS OTP, both of them need to be compromised for a bad actor to gain access. If they have just the password, they'll get stuck at the SMS token, and if they intercept an SMS OTP, they won't be able to get to the form where they can enter it. In contrast, a password-protected SSH key isn't pure MFA. If they have the password, they still need to get the private key file before they can use it to get the private key. However, if they have the private key, then they don't need the password at all. The password only protects you from people stealing the file, not from the stealing the key itself.


Compromised, meaning someone has the key in an unprotected format, or they somehow got your password. Say someone manages to MITM you somehow and get your password to the file, or they manage to crack it, or phish it out of you. Then they can just take the key and use it freely to log into your things. With MFA, there's no way that any key can be used to log in as long as the other factor exists. If you have to push OK on your cell phone to log in for example, the key is useless without physical access to your phone.

I'm not saying the password protection does nothing, it makes the key harder to crack but it's not another factor. It's simply an extension of the existing key. In other words, it's just a longer password.


My SSH key is on a YubiKey. How many factors is that?


1 if it isn't password protected and 2 if it is


Which is why you have to manually enable SSH and it warns you that it's a big security risk.

You're entirely right -- the "proper" way is to login with MFA, enable SSH, do your thing, and then re-disable SSH.


Well, maybe, if you have an ssh key, instead of an ssh password, there's a lot less surface area there.


Old tricks are the best tricks!


Also available from their site with much faster shipping than AliExpress’s Jan 20 (to the US, at least).

https://www.athom.tech/

Happily using this little guy to drive 100 fairy lights (from Adafruit), all from a USB plug.

https://www.athom.tech/blank-1/wled-2812b-led-strip-controll...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: