Hacker News .hnnew | past | comments | ask | show | jobs | submit | 4684499's commentslogin

Have you tried puter.js? They have something called User Pays Model: https://docs.puter.com/user-pays-model/


I once needed to play three videos simultaneously to find an easter egg hidden in them. As I'm not familiar with video editing and don't have any professional tools, I ended up embedding three videos using a dozen of lines of HTML with basic controls and some dirty CSS tricks using devtools to uncover the message.


With links, it still seems to hallucinate on my end. Some info isn't even mentioned in the links it referred to, but it just spits it out like it's actually there.


interesting. For me it gave me accurate links that were tucked around third page on google search but were actually relevant links while google's 1st and 2nd page were filled with seo spam.


It seems someone discovered this (along with other udm values) back in June https://medium.com/@tanyongsheng0805/every-google-udm-in-the...


That's pretty fast for a beta released yesterday. Are the devs actively monitoring and reverse engineering every binary released that related to streaming? Also, where can I get the live studio executable? None of the links I found works, is that public release?


I'm the one on the OBS team who originally found this. I saw a tweet yesterday from someone that's in the beta, and as with any desktop live streaming software (and especially with "Studio" in the name) I was curious if they were using any OBS Studio code or if it was developed all in-house. The download link is available in their JS, you can find the most recent installer link here: https://tron-sg.bytelemon.com/api/sdk/check_update?branch=ma... (note: you probably won't be able to actually use it without being in the beta group)

Without even installing it, opening the setup files showed some immediate red flags, notably the "GameDetour64.dll", "Inject64.exe" and "MediaSDKGetWinDXOffset64.exe" look awfully similar to the way the OBS Studio game capture hooks work with our "graphics-hook64.dll", "inject-helper64.exe" and "get-graphics-offsets64.exe". I don't jump straight in to disassembling everything I come across, but when it's this obvious it begs further investigation, and after some disassembly I was able to confirm that OBS code was present in their binaries.


This is why I HN. Thank you for that clear account of the discovery, funny what a little curiosity can lead to.

Not masking the names further makes me wonder if whoever actually implemented this may not have been aware of the repercussions.


Reminds me how I caught someone stealing my mod code. Same variable names, and whereas I used spaces for indentation when most used tabs, this guy also coincidently also used spaces in the same areas.

I challenged him on it and he played dumb.

Thanks for reading my blog :)


> most used tabs

who uses tabs? o.O


Wow this is amazing, thanks for digging in and doing this work. If this were Reddit, I would give you a gold award, but since this is HN, all I have to give is my 1 upvote.


If you tap the timestamp you can favorite it (add it to the public list of favorite comments linked on your profile page).


> on an open source project (since the project is transparent)

Not as transparent since the mobile apps are closed source at the moment.


Is there any ad blocker that blocks ads rendered within videos?

It's possible doesn't mean it's viable.


SponsorBlock does a surprisingly good job: https://sponsor.ajay.app/


> It is unclear whether the accounts are real employees, bots or trolls pretending to be Amazon Ambassadors.

Personally I would wait for more evidence to judge (which seems unlikely to happen). It's not so hard to operate a false flag on platforms like Twitter.


I think that's misinterpretd, the ref link in the paper is https://globalbiodefense.com/headlines/chinese-lab-that-firs... , which leads to SCMP's https://www.scmp.com/news/china/society/article/3052966/chin...

SCMP's piece also mentioned that "It also obtained the required credentials to conduct research on the coronavirus on January 24." That indicates the Centre actually gained more access.

And if you search Shanghai Public Health Clinical Centre on Google, you can see it's still actively doing COVID-19 related research. https://jamanetwork.com/journals/jamainternalmedicine/fullar...


> The one thing that is unique about the [New Tab Page] in the new Edge is that it's actually an online website

IIRC Chrome used to use https://www.google.com/_/chrome/newtab as its ntp.


But it wasn't privileged. Specifically, it had access to a magic chrome:// URL which allowed listing the most recently used URL's in an opaque way (ie. so that if google went evil, they still couldn't see what your most visited site was or view it's thumbnail, despite it rendering on their webpage).


https://duckduckgo.com/chrome_newtab is the ntp if you choose DuckDuckGo,


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: