Hacker News .hnnew | past | comments | ask | show | jobs | submit | brainzap's commentslogin

apple SDK already can return underage/adult


In early typescript I was too lazy and just set an inital value and then zero the list


the AI datacenter built for 180B are used for surveillance and control


lets try something new


Putting capitalists in the middle doesn't seem new, more like another place they can extract a slice of the pie.


Let's back up: The way an endowment works is that donors donate money, which goes into a more-or-less permanent investment fund. The interest from the investment fund is then used to a) fund mission-aligned programs (in our case, OSS), b) stay ahead of inflation, and c) pay operating costs.

Where are you seeing capitalists "extract a slice of the pie" here?


The README on github

"pay operating costs" is one place non-profits often find fraud. Getting the money into the market between donors and builders, now you have to pay professional investors. You don't get to 7-8% returns without equities, what happens if the market tanks?

Why not build something super minimal that requires less management and operating costs? That doesn't have the market risk at the center of it all? That doesn't have more points for fraud and abuse?


> "pay operating costs" is one place non-profits often find fraud.

If you find it here please let us know.


Can you explain the 2-3% gap between expected returns and outlays? Seems like a lot more than what is needed for accounting (based on the other main person here posting)


The explanation is simple — nobody can predict exact annual returns, and they tend to fluctuate. We aim to spend at least 5% per year on OSS grants and need to decide if we can spend more on them or should reinvest based on specific annual results. And target earnings should overcome inflation.


Reasonable answer, but this part:

> Why not build something super minimal that requires less management and operating costs? That doesn't have the market risk at the center of it all? That doesn't have more points for fraud and abuse?

could still be usefully addressed.


The best long-term protection from fraud and abuse are aligned incentives through skin in the game. That’s why we legally require all people in governance to be Members ($1000+/year donation). This is an important topic, and here you can find more context on this: https://kvinogradov.com/osendowment/


I think this is really missing the point of the question. I know that it is common for endowments to be invested "in the market" - people believe that's the most responsible thing to do. But the question was about why do things the normal way? Why link up market performance of a set of investments with funding mechanisms for OSS? If you're going to be bold and try to fund something that is, in market and economic terms, quite off-norm, why do that using entirely normal systems that are at the core of a capitalist economy?


There are areas where we experiment and take risks: raising the first-ever endowment for open source, making it very lean and digital-first, relying on bottom-up funding and governance instead of large corporate donors, etc.

But all other areas should be as low-risk as possible — like accounting, legal, and investment management of a community endowment fund. We are exploring a few ideas on how to grow the fund faster than the market without increasing its risk profile, but they are complementary to a very conservative core strategy.

Besides OSE, I am a full-time VC — that's the area where investors are bold and invest in off-norm opportunities, but it lies on the totally opposite side of the investment risk spectrum. And directly mixing them does not seem like a good idea.


“super minimal that requires less management and operating costs” - that’s exactly our current setup, and always will be the target!

Now OSE has no paid employees - the team is 100% volunteers. Its Board Directors and the Executive Director are required to personally donate $1000+/year. Operating costs are close to zero.

As organization evolves there might be higher operating costs, but our commitment to keep them as low as possible.


you can observe Microsoft Gaming fall apart over the next 12 month.


I am shocked to hear that over these years it was possibl to extract data from a locked iphone. (hardening mode off)

I trusted apple.


>I trusted apple.

To what? Write 100% bug free software? I don't think that's actually achievable, and expecting so is just setting yourself up for appointment. Apple does a better job than most other vendors except maybe GrapheneOS. Mainstream Android vendors are far worse. Here's Cellebrite Premium's support matrix from July 2024, for locked devices. iPhones are vulnerable after first unlock (AFU), but Androids are even worse. They can be hacked even if they have been shut down/rebooted.

https://grapheneos.social/system/media_attachments/files/112...

https://grapheneos.social/system/media_attachments/files/112...

https://grapheneos.social/system/media_attachments/files/112...


These links working for anyone? 403 for me


Updated the links. The original were from discuss.grapheneos.org but it looks like they don't like hot-linking.


Qubes OS does a much better job though, because it relies on security through compartmentalization, not security through correctness.


The problem with that is it runs on a desktop, which means very little in the way of protection against physical attacks. You might be safe from Mossad trying to hack you from half way across the world, but you're not safe from someone doing an evil maid attack, or from seizing it and bruteforcing the FDE password (assuming you didn't set a 20 random character password).


TPM with Heads protects my laptop from such attacks just fine. All based on FLOSS.

> assuming you didn't set a 20 random character password

It doesn't have to be all random characters for good protection.


If someone puts passwords shorter than 30 characters on their devices, then everything that happens to them is their own fault.


This is a newly-discovered vulnerability (CVE-2026-20700, addressed along with CVE-2025-14174 and CVE-2025-43529).

Note that the description "an attacker with memory write capability may be able to execute arbitrary code" implies that this CVE is a step in a complex exploit chain. In other words, it's not a "grab a locked iPhone and bypass the passcode" vulnerability.


I may well be missing something, but this reads to me as code execution on user action, not lock bypass.

Like, you couldn’t get a locked phone that hadn’t already been compromised to do anything because it would be locked so you’d have no way to run the code that triggers the compromise.

Am I not interpreting things correctly?

[edit: ah, I guess “An attacker with memory write capability” might cover attackers with physical access to the device and external hardware attached to its circuit board that can write to the memory directly?]


No your original analysis is fine


I think its cool, so I can who is in the office for lunch.

Currently I manually check device IPs.


And there's me asking people :/


friendships are strengthed by shared hard and painful experiences. online friendships just don't feel the same


When I got a steamdeck I open excel and started playtesting a few games, to many bugs, so I sold it


sadly cheating software can be found on github, easy to install. for example https://github.com/sohzm/cheating-daddy


What's sad about it? Why should it be censored?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: