Hacker Newsnew | past | comments | ask | show | jobs | submit | epimenov's commentslogin

It makes sense really. About a week ago there was “code red” storm in the Netherlands, and first phone alarm contained something along the lines of “for more details see this Twitter account”.

Then they removed any mention of twitter from from the second message.


1. if the tweet was from someone outside of the government then creating a mastodon instance does not make any sense

2. if the tweet was from the government then why couldn't they also put up something on a webpage on their own sites?


The source of the tweet isn't the issue at play.

The tweet / Twitter is the issue.

A Mastodon instance is something the issuer of the message controls. Twitter is not.

Web sites don't "notify" people of content, but social media does.


>2. if the tweet was from the government then why couldn't they also put up something on a webpage on their own sites?

IIUC, they did. That website being https://social.overheid.nl/

Or am I missing something?


Doesn't sound like they needed a microblogging platform, just a web page that could be easily updated. Their use of Twitter in the first place would appear to be the crux of the problem.


Twitter has a built in notification system. People can subscribe to get alerts from it. Theoretically people can do that with RSS but, let's be honest, most people don't use RSS. I saw in another comment that they do have an RSS feed though if that's your cup of tea


All business bank accounts in the NL include those transaction fees. Consumer ones (as in Premium in bunq) do not.


They do allow "stopovers". Where you can stay in Iceland for few days between the flights. Those are heavily marketed during the flight too.


All of the legs of the flight are the same price regardless of whether you book them together or separately.

They're not really selling a "stopover" so much as just convincing you to buy plane tickets for what they already cost.


Funnily enough Romania is on top of the pedestrian fatalities statistics within the EU: http://ec.europa.eu/eurostat/statistics-explained/index.php/...

Maybe you should reconsider the law.




I think OS X opens captive.apple.com


It does, and so does iOS when you connect to a WiFi network that has a portal.


1Password can do 2FA, also syncs between all your devices. And no trusted 3rd party cloud service.


Keeping all the keys (password and 2FA tokens) in 1Password means it isn't true 2FA anymore:

https://blog.agilebits.com/2011/09/23/two-factor-or-not-two-...


They're actually talking about 2FA for 1password itself. Not supporting TOTP via 1password for other services.


The whitepaper (https://www.whatsapp.com/security/WhatsApp-Security-Whitepap...) claims that the attachments of any type are encrypted


I have a key generated for AutoSSH only.

Also you can limit to which hosts/ports it can connect with:

     no-agent-forwarding,no-X11-forwarding,command="read a; exit",permitopen="host:port" ssh-ed25519 AAAA
Pretty nifty.


I've gone so far as to create a separate autossh user with separate key, with no shell access (by setting the user's shell to /bin/false). It still permits tunneling (call ssh with -N), but does not allow shell sessions. Perfect for when you want to access remote systems via a remote tunnel but do not want to give shell access on the relaying machine to the tunnel origin. It trusts that the machine originating the tunnel will not initiate a reflection attack (by making a local forward to the remote port itself on the originating machine and causing some log messages to appear until all file descriptors are in use)[1], but that's not so unreasonable.

1. http://www.semicomplete.com/articles/ssh-security/


Same here actually, the user has /bin/false as shell.


On the server side, right?


Yes, in the authorized_keys



I didn't imply correlation, just curiosity.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: