Hacker News .hnnew | past | comments | ask | show | jobs | submit | tkorri's commentslogin

This looks fun!

One thing though, the site's meta description has a typo: "Multiplayer online game. Guess where a city on the world map is. Best played with frieds."


The physical buttons was the exact reason why I bought a pair of QC 35 II's even though Sony WH-1000XM3's were available and Bose QC700 had just been introduced.

I own a pair of Monster iSport Freedom 2's which have a touch control for volume and skipping, and oh boy is touch control a bad idea on headphones. For example when wearing the headphones under a hood, while outside in the rain, it sometimes registers rain as a touch action, so your volume or song changes suddenly. Also the touch control accurancy isn't very stellar indoor either.

So based on my experience, I gladly take physical buttons over touch controls, since for me touch controls are more like a gimmick than good usability.


Did you actually try the Sony’s? That (rain activating touch) doesn’t happen. You can’t take your experience with a completely different product as universal truth.


Yes, I've used the Sony's for a couple of hours, but I've never owned a pair. Couple of my colleagues have them and they seem to be happy with them.

My biggest issue with touch control is the user experience. That is, when it works flawlessly it's as good as physical buttons, but I rarely experience the same level of reliability with touch as with buttons.

If you have the Sony's and you're happy with them, then good for you. They're good headphones, just not the best ones for me.


As a person who lives in a cold country I got annoyed by the 1000XM3 touch controls pretty quickly. I am however happy to report that a year after the release you can update the firmware and disable touch controls.


Actually, before buying my Bose headphones I seriously looked at the Sony's. I even googled for a way to disable the touch control on them. But the only thing I found was a video on YouTube for the previous model, which showed how to disassemble the headphones and disconnect a wire to achieve this.

But good for Sony for giving that choice to the user via a firmware update.


Oh I remember the case. The tax inspector was working alone late friday evening and he was found on monday morning. In this case I wouldn't blame the other employees for slacking...


Oh the title got me thinking that this is music related, like a new version of Songsmith. I'm glad I was wrong, the device looks very nice!


This also caught my eye... But then again there are many examples where Paypal has handled issues badly, so I'd guess this just the way they want their brand to be perceived.


We did something similar a few months back, though there's no CGI effects in our video:

http://kahbow.com/post/70484446933/



> I think this damages the Android brand.

I think Google and others are doing a pretty good job on this without Nokia's help. With all the different versions of Android, different hardware specs and the lack of updates to current phones, it's PITA to create an app which works reasonably well on most of the devices.

And because of that, Android starting to look more and more as the new Symbian.


In the recent weeks I've seend a few businesses make stupid statements on their websites and on social media. As a business owner I just don't understand why they're doing that. What do you achieve when you call your customer/associate/employee a(n) asshole/liar on your website?

I haven't heard of Joyent before this whole thing started. And to be honest, I still don't know what they do, but I'm pretty sure I don't want to do any business with them.


Agreed. From a business perspective Joylent's actions in this matter make no sense. Do they hope to gain sales from people impressed with their extreme name-calling?

I for one will not be recommending them or using their services in the future.


I have the exact same feelings/experience about Linode. I really liked their service but I cannot trust a company that doesn't promptly inform it's users that their credit card info has been compromised.


Eh? They did say the attacker got access to the database which holds the encrypted copies of the credit card info [and other information]

https://blog.linode.com/2013/04/16/security-incident-update/


I don't have the exact dates at hand but if I remember correctly the hacking happened few weeks before they acknowledged it.

And the only reason they admitted it (well at least it looked like that) was because the info had already been leaked through their irc channel[0].

[0]: http://turtle.dereferenced.org/~nenolod/linode/linode-abridg...


Please, lets not rehash the past again and again. If you want more information, this has already been heavily discussed on HN.

  Compromised Linode, thousands of BitCoins stolen (bitcoinmedia.com) 
  316 points by tillda 510 days ago
  https://hackernews.hn/item?id=3654110

  Linode hacked, CCs and passwords leaked (slashdot.org)
  732 points by DiabloD3 101 days ago
  https://hackernews.hn/item?id=5552756

  The story around the Linode hack (straylig.ht) 
  349 points by foofoobar 79 days ago
  https://hackernews.hn/item?id=5667027


All of which were publicly acknowledged are reasonably quickly. I didn't ask about breaches. I asked about ones that were not acknowledged or not acknowledged quickly which is what was claimed. ;)


I really wish you'd just read those threads instead of forcing it all to be re-hashed in yet another thread.

Brief summary: according to the hackers involved, they struck a deal with Linode whereby, if Linode made no moves to disclose the attack, the hackers would shred all of the data they had grabbed. Instead, the FBI forced Linode's hand in the matter. Even if that's not true -- and, in this incident, the hackers came out as more believable than Linode IMO -- there still was no mention of the incident on the Linode blog until after the hackers had claimed credit on Linode's IRC channel and the news of that had started making the rounds. This is identical to the previous incident, where Linode said nothing until after a customer started complaining loudly on their user forums.

Then, Linode wasn't forthcoming with details, despite the hack having occurred a couple of days prior. The second update from Linode came only after additional information had been made public by the hackers, and provided no information beyond what had already become public. Linode claimed that customers' credit card information was still secure, but the hackers claimed otherwise and in the days and weeks following the event, several people claiming to be Linode customers claimed that they were seeing suspicious activity on cards that could reasonably be traced back to Linode (cards that were Linode-specific or used for few enough other services).

The way that Linode has handled both incidents has left me, and many others, with the impression that they simply will not disclose that they've been compromised unless forced to by someone else -- a customer or the attacker(s) -- and then they'll attempt to be very opaque and not-specific about the incident.

It's a shame, because aside from this, I really like Linode. I wouldn't even be interested in looking at other VPS providers if it weren't for this. But now I'm being negligent if I continue to host customer data & services on Linode. I don't know yet if anyone else handles this sort of thing better, but I do know how Linode handles it and it's not good.

This'll be my only comment on this subject. You (or others that are interested) really should just go over past threads discussing the incident.


I didn't force you to re-hash. Maybe I'm just not cynical enough to believe a thief that appears to be on an egotrip [which is realistically what the hackers in this instance are].

They made a mistake on the 12th and corrected it by the [with some forum posts in between those two dates and someone claiming responsibility between those two dates] 16th. I'm not seeing the issue in regards to the previous question except 'Hackers say otherwise'.

None of those threads date before the 12th which was kind of the point. I generally assume incompetence before malice while everyone else seems to be the reverse.


Except this was after Linode did a "password reset" email to their customers on the Friday 04/12 without explaining anything and saying everything was fine. Said blog post on 04/16 after log files were released in which the hacker basically said linode paid them to keep quiet about the "incident"


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: