Hacker News .hnnew | past | comments | ask | show | jobs | submit | gluecode's commentslogin

Same for me, but with an ATARI 800 XL. I had too many POKEs and PEEKs in my BASIC code. Indian customs took 30 days to release this machine in the 80s.


I absolutely love the video chip of the Ataris. The display list approach is nothing short of brilliant, allowing multiple display modes on a single frame.


To be fair, that was also possible on some other 8-bit home computers of the time, but required the CPU to get involved (with tricky timing code to write the hardware registers at the right time). The 8-bit Atari's display list coprocessor is basically the daddy of the Amiga's Copper :)


Display lists date back to the antiquity of computer graphics, and Atari obviously knew how to build game machines.

Now we have GPUs which can do all sorts of things, but a graphics coprocessor for an 8-bit machine is a nice addition.


Don't forget the Handley Page Victor: https://en.wikipedia.org/wiki/Handley_Page_Victor


I think the Victor still looks futuristic, menacing, and strangely beautiful. A Buck Rogers fantasy brought to life.



I agree. It’s ungainly for sure, but I wouldn’t call it ugly.

Besides, if I were going to pick a British warplane originating from that era as the ugliest, I’d have to go with the Nimrod.


AEW3 variant I would agree, the original was a sleek conversion the dH Comet. Pretty nice design for a plane that first flew in the 40s!

The Victor was also a sleek futuristic design and the every bit as impressive as the Vulcan.

Never a fan of the Gloster Javalin; something was always off in the proportions as well as just looking chunky.


I agree about the distasteful look of the Nimrod. As for the Victor: ''Thunderbirds are go!''


One of the most beautiful planes ever built IMHO (in how futuristic it still looks) :)


This is beautiful, it's very futuristic looking.


What are you talking about, that's one of the most beautiful planes ever built.


I love the typeface. So 80s computer font.


what is the typeface? for the capital title and low case text


> view source


I'd a Psion 5 Mx and loved it. It had one of the best small keyboards. It's folding mechanics was superbly engineered.


Agreed! I had one too and you could do real work on it like spreadsheets and documents. I feel it worked better than current phones and tablets.


I just wish the screen had a little more contrast. Besides that, the productivity was awesome.

Later I switched to a Nokia 9210 Communicator (Nokia Series 80), basically a Psion 5 with networking and phone integration and a nice screen.

My living-the-future-moment was in the early 2000s sitting in car on the phone, then opening the phone, automatically switching to speakerphone and loading a spreadsheet to check some data. Later I emailed the sheet to a colleague and send the sheet as a fax from the phone to a customer. All from a single device.


I wonder if ATM machines should have a keyboard cooling function to erase thermal signatures, immediately after each customer session.


There would still be a temperature difference for some time after entering a PIN until the keys used are fully cooled. So this method might not fully mitigate the attack.

A better solution could be to heat the keys to about the same temperature as a human's finger tips, so that no heat is being transferred while entering a PIN.


Exactly, easier and much more effective than the mitigation suggested by the scientists:

>One potential risk-reduction pathway could be to make it illegal to sell thermal cameras without some kind of enhanced security included in their software.


I'm curious what kind of software solution there could be to this?

Some from of pattern matcher in the camera obscuring the video output when it determines its observing a number pad?


Maybe something loosely similar to the protection that is said to be present in very high level colour photocopier that prevents from photocopying money?


I've always just used my credit card holder (metal) to punch in numbers, due to this heat thing. They were doing this with pins before this technique.


I had seen a video demoing an attack like this some while ago and I started "wiping" keypads with my fingers so they're all "warm"


This is actually a great point I hadn't even considered. I had heard of cretins using a small grease film like a tiny layer of vasolene etc on pinpads and then after the victim uses, they would shine a light on it to see.


Grease films are typically detected by the user. Better to dust the keys with a UV sensitive powder and inspect the ATM after pin entry.


Indeed optimistic. They’ll go quiet for the next nine years.


My Intel MacBook Pro says 11.0 Beta (20A4299v). So, I don't think it's 10.6 for Intel.


I wish Keybase has a second factor for authentication.


As other comments have pointed out, devices (mobile and desktop app) do require 2FA and there's no way around that. So I'm assuming you meant the keybase.io website where you can log in with username and password.

Note that the functionality of the website is very limited. You can't access any chat messages or non-public KBFS data, for example. The most power thing you can do is resetting your account, and after that is probably using your PGP key if you uploaded an encrypted version of your private key to Keybase. If this worries you, you should turn on lockdown mode [0] to require a device to access those features.

[0] https://keybase.io/docs/lockdown/index


Related:

After forgetting my password a few weeks or so after first creating my account (I went a long time without ever trying out Keybase, because its value proposition AFAICT wasn't very interesting up until around a year and a half ago), I had Max reset my account. I was left with mixed feelings about this:

1. Extreme gratefulness esp. wrt the hands-on approach to "customer" support, but concern for the scalability of a process that require that level of manual involvement, and

2. Concerns with how easy it was to get keybase.io/$MYNAME disconnected and reconnected by the Keybase switchboard operators

... and I wondered why Keybase's proof system didn't play a part in authenticating me.

For example: Let's say I create a Keybase account, forget my password, and realize I'm not logged in on any device. If I need to reset an account that has N social proofs, wouldn't it be a good idea for Keybase to make me prove that I am who I say I am by adding/altering M of N proofs?

And on that note:

Given that you're rolling out third-party integration, how about building off OP's thoughts, so a Keybase user can configure their account to say, "You should be able to verify that $SERVICE implements the optional 2FA parts of the Keybase integration spec; please use $SERVICE as the 2FA provider for this account."


It does by the fact that you trust your new device on first use to be yours. You can wipe application data once you close the app if you want to go trough 2FA every launch.


Does that mean you go through an extra authentication flow to enroll the new device? Otherwise it's not 2FA, it's just telling you after the fact that someone got into your account.


Yes you have to authenticate any new devices from one of your existing devices.


Last week, I logged into Keybase from a brand new iPad without any authentication challenge from a trusted device. As far as I can tell, there is no second factor.


If you log into the website, there is no second factor. If you already trusted a device, there isn't a seecond factor either.


Did you use a paper key?


Just used username and password.


That's weird. Almost all the nodes on your graph are signed by your PGP key 'F155E778FA657400' or the paper key 'above sleep'. The rest were signed by other devices, or were the original node...

https://keybase.io/gluecode/graph


I did the same thing via browser on a new laptop. Just l/p


Logging into new devices does not ask for a second factor. I’ve verified this last week when I got a new iPad.


It requires you to trust your new iPad from another device, in addition to the password. That's 2FA.


Good interview of author in ‘Layovers’ podcast - http://www.layovers.to/podcast/060-nbo


I second this recommendation. Since listening I have heard all manner of things compared to the 747; yoga poses, describing something large, etc, as raised on the Podcast. It truly is an icon that translates across countries.


I will also recommend this episode and the entire Layovers Podcast if you enjoy aviation travel.


I was a service provider during the initial days of launch and for two years afterwards. Loved the people. They were driven to ship good looking products. That was their downfall. At Nest they were (at least then) focused on how things looked. Nobody cared about how it worked, or how the product should be supported after shipping. Anyways, no regrets.

I met some of the best engineers and designers at Nest in the initial days. Afterwards, it became a A quality hiring B and B hiring C. Left hand did not know what the right was doing. The quality went down the drain. The management was terrifyingly dictatorial, top-down. Everyone was preparing for a Tony presentation/demo. They were afraid like kids do of the cruel headmaster.

I wish them nothing but the best.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: