Hacker Newsnew | past | comments | ask | show | jobs | submit | hedora's commentslogin

I can think of thousands of components that can hold trillion dollar industries hostage.

I challenge you to name one that cannot and that also makes it into high school curricula or How Things Work.

https://mst3k.fandom.com/wiki/A_Case_of_Spring_Fever_(short)

https://m.youtube.com/watch?v=vzKfAFsbRSk

If you are not ready to lock yourself in a bunker after reading the article and watching that short, I strongly suggest you consider the inclined plane.

You’d better do it now. Very few locks work in the absence of transformers, springs and inclined planes.



This is so great!

Does anyone have numbers for churn vs. cumulative code?

Most of my commits (hand written and AI) have delete counts that are 75-110% the added line count.

The point that many developers will probably forget to tell the LLM to run cleanup/refactoring paths is probably true though. (I’ve definitely found ghost-chasing bugfixes in all sorts of corners of LLM generated code).


Yeah /simplify is your friend. That and constrained prompts - “refactor x for simplicity - resulting diff must remove n lines of code. Dont change tests. “

Since the list of extensions they query targets certain religious groups and medical conditions, it's almost certainly in violation of US federal employment and hiring law.

The list of queried extensions includes things that would be used by particular religious groups, and people with certain medical conditions.

Those being in the list doesn't mean that's what they're looking for. Take a look at the database of extensions, there's far more extensions that don't seem limited to any particular group. The author just called those out specifically because they're perfect for implying nefarious intent.

> doesn't mean that's what they're looking for

It does suggest that’s what they’re collecting. That is per se a violation in many jurisdictions. It should trigger investigations in most others to ensure it wasn’t mis-used.


The claim I replied to is “They try to profile for things like political beliefs”.

I wasn’t contesting that they query extensions that can be used for that purpose, or that they use query results for that purpose, but indicated that the fact that they make such queries doesn’t necessarily imply that they try to do such profiling.


"allowed" by the web browser, but almost certainly not by the end user. The law is pretty clear on this in the US:

> 'the term “exceeds authorized access” means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter;'

The problem, of course, is that by clicking on a LinkedIn link, you agree to a non-negotiated contract that can change at any time, and that you have never seen. If that weren't allowed, then this sort of crap would correctly be considered "unauthorized access":

https://www.law.cornell.edu/uscode/text/18/1030


The answer to "why would Chrome ever undermine privacy and security?" is always "Google's revenue stream".

I'm happy to see that this doesn't hit firefox. I wonder if safari is impacted.


It's probably not illegal for advertisers to racially profile you, but it certainly is illegal in the US to do those things as part of your hiring process:

https://www.eeoc.gov/prohibited-employment-policiespractices

LinkedIn's scanning for browser extensions used by protected groups allows them to provide illegal services to US-based recruiters. I have no idea if they actually do it or not, and am not a lawyer, but common sense suggests there's enough here for a class action suit to move into discovery.


Call it what you want. Just don't use accurate terms like apartheid, genocide or war crime.

Like pretty much every other word in that comment, we'll never know if the misgendering is intentional satire or not.

And, like news networks, maybe the router companies are forced to let him hire a censor (they like to call them ombudsmen) so the white house can real-time block inconvenient traffic.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: