SHAttered
Isn't SHA-1 deprecated?Today, many applications still rely on SHA-1, even though theoretical attacks have been known since 2005, and SHA-1 was officially deprecated by NIST in 2011. We hope our...
View ArticleMongooseIM 2.0.1 more stability for app developers
2017-02-22 by Nicolas Vérité SSE for server to client real-time pushSSE stands for Server-Sent Events, it is a W3C recommendation where a browser receives automatic updates from a server via HTTP...
View ArticleAirbnb finalizes deal to buy social payments startups Tilt
Airbnb has finalized its deal to buy social payments startup Tilt, TechCrunch has confirmed. We reported on the acquisition talks last month, but now everything has been made official.We are told that...
View ArticleElastic PyPI: your own Python Package Index on AWS Lambda
readme.mdelastic pypiA mostly functional simple pypi service running on AWS.Uploads do not workThis is a limitation of AWS API Gateway. You will have to find other ways to upload your packages to the...
View ArticleA 4 Year Old in Conversation with Alexa
"Alexa?" she said shyly.No response."Alexa" she repeated with more rigour.No response."Alexa!" she commanded.Our Amazon dot lights up."Play twinkle, twinkle little star" she requested."Playing twinkle,...
View ArticleVanity metrics, the future, and 100,000 thank yous
Hi. I’m Eoghan McCabe. I’m the CEO and a co-founder of Intercom.You may remember me from such blog posts as our Series A funding announcement, our Series B funding announcement, our Series C funding...
View ArticleWhere did England’s counties get their names?
Last week, I went to Birmingham, on a train that continued on to Shrewsbury. Shrewsbury, of course, is the county town of Shropshire, which was for a long time was the only county in England without...
View ArticleGoogle’s plan to make talk less toxic
Image copyrightThinkstockImage caption Online comments can be aggressive"Never read below the line" - that has become sensible advice for anyone tempted to look at online comments. The depressingly...
View ArticleShow HN: Café Wifi Search
×Café WifiGet the mobile app.Get The AppmenusearchTokyoLondonSan FranciscoPalo AltoChiyodaToshimaLos AngelesShinjukuGeorge TownPragueValenciaKuala LumpurMinatoBudapestAthensUbudNew YorkBuenos...
View ArticleAn epidemic of unnecessary and unhelpful medical treatments
First, listen to the story with the happy ending: At 61, the executive was in excellent health. His blood pressure was a bit high, but everything else looked good, and he exercised regularly. Then he...
View ArticleShow HN: Itinerary matching service (carpooling)
ItinerariesMatches User markers on the map are approximated (up to 500 meters) to respect privacy.Francesco VerdiExample Co. (Zona Industriale Bologna)francesco.verdi@example.comMarco RossiExample Co....
View ArticleHarvey Friedman bringing incompleteness and infinity out of quarantine
It is 7 o’clock in the morning and Harvey Friedman has just sent an email to an unspecified number of recipients with the subject line “stop what you are doing.” It features a YouTube link to a live...
View ArticleMost scientists 'can't replicate studies by their peers'
By Tom FeildenScience correspondent, Today programme22 February 2017From the section Science & EnvironmentShareShare this withEmailShare this with EmailFacebookShare this with...
View ArticleWebsite builder Wix acquires art community DeviantArt for $36M
Wix.com has made another acquisition to build out the tools that it provides to users to build and administer websites: it has acquired DeviantArt, an online community for artists, designers and...
View ArticleAnnouncing the first SHA-1 collision
A collision occurs when two distinct pieces of data—a document, a binary, or a website’s certificate—hash to the same digest as shown above. In practice, collisions should never occur for secure hash...
View ArticleGmail – some users being signed out of their accounts unexpectedly
Basics of backup codesIf you lose your phones or otherwise can't receive codes via SMS, voice call, or Google Authenticator, you can use backup codes to sign in. Follow the instructions below to...
View ArticleAn Open Letter to the Uber Board and Investors
By now a staggering number of people recognize the name of Susan Fowler and have read some account of her experiences of sexism, sexual harassment and horrendous management at Uber. So what explains...
View ArticleWhy the sun shines for Oracle and it’s Cloudy for others
First of all, I ‘d like to mention that this draft has been put back from schedule several times over and over again. Asking myself the question, should I really do this? But then again … This is a...
View ArticleShow HN: Does it use Cloudflare?
Find out if a website uses Cloudflare by adding it to the field below.If the site was using Cloudflare, private data on it might have been leaked since 2016-09-22!Learn more about Cloudbleed on the...
View ArticleJapan in Need of ‘White-Hat’ Hackers, Pays Handsome Bug Bounty
Japan has beefed up its efforts to stop cyber attacks on its companies. To achieve this, the country is investing heavily in ‘white-hat’ hackers whose job is detecting any security breaches from...
View Article