Hacker Newsnew | past | comments | ask | show | jobs | submit | 2012-09-04login
Stories from September 4, 2012
Go back a day, month, or year. Go forward a day, month, or year.
1.Tomorrow Theme (github.com/chriskempson)
483 points by pstadler on Sept 4, 2012 | 131 comments
2.Free Book: An Introduction to Programming in Go (golang-book.com)
297 points by cdoxsey on Sept 4, 2012 | 70 comments
3.What's a $4000 Suit Worth? (nytimes.com)
252 points by gphil on Sept 4, 2012 | 187 comments
4.An apology to readers of Test-Driven iOS Development (securemacprogramming.com)
231 points by Morendil on Sept 4, 2012 | 67 comments
5.Google Search is only 18% Search (jitbit.com)
231 points by jitbit on Sept 4, 2012 | 188 comments
6.Why Tarsnap doesn't use Glacier (daemonology.net)
210 points by cperciva on Sept 4, 2012 | 55 comments
7.37signals invests in The Starter League (37signals.com)
200 points by wlll on Sept 4, 2012 | 87 comments

Money quote for the people that don't want to wade through ten pages of rant:

  During the second week of March 2012, a Dell Vostro notebook, used by
  Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action
  Team and New York FBI Office Evidence Response Team was breached using the
  AtomicReferenceArray vulnerability on Java, during the shell session some files
  were downloaded from his Desktop folder one of them with the name of
  "NCFTA_iOS_devices_intel.csv" turned to be a list of 12,367,232 Apple iOS
  devices including Unique Device Identifiers (UDID), user names, name of device,
  type of device, Apple Push Notification Service tokens, zipcodes, cellphone
  numbers, addresses, etc.
9.2012 Startup School, Oct 20 at Stanford (startupschool.org)
181 points by pg on Sept 4, 2012 | 40 comments
10.Facebook Handled their IPO Exactly Right (blogmaverick.com)
171 points by nchuhoai on Sept 4, 2012 | 104 comments
11.When A Kickstarter Campaign Fails, Does Anyone Get Their Money Back? (npr.org)
161 points by jseliger on Sept 4, 2012 | 122 comments
12.Python Cheat Sheet (docs.google.com)
143 points by vacipr on Sept 4, 2012 | 34 comments
13.UDID Leak : Identifying the Traitor (fredericjacobs.com)
141 points by FredericJ on Sept 4, 2012 | 84 comments
14.What I learned from my first C coding challenge (jasonmooberry.com)
136 points by jasonmoo on Sept 4, 2012 | 83 comments
15.BitTorrent study finds most file-sharers are monitored (bbc.co.uk)
129 points by anons2011 on Sept 4, 2012 | 93 comments
16.Introducing Qubes 1.0 ("a stable and reasonably secure desktop OS") (theinvisiblethings.blogspot.com.br)
122 points by rbanffy on Sept 4, 2012 | 59 comments
17.Entrepreneurship is hard but you can’t die (steveblank.com)
120 points by cwan on Sept 4, 2012 | 43 comments
18.The UDID leak is a privacy catastrophe (corte.si)
119 points by gnufs on Sept 4, 2012 | 51 comments
19.Introduction to genetic algorithms (example in Javascript) (burakkanber.com)
118 points by bkanber on Sept 4, 2012 | 20 comments
20.Lean into the pain (aaronsw.com)
120 points by bensw on Sept 4, 2012 | 54 comments
21.Travis CI integrated into GitHub pull requests thanks to new Commit Status API (github.com/blog)
114 points by Seldaek on Sept 4, 2012 | 22 comments
22.Computer programming will soon reach all Estonian schoolchildren (ubuntulife.net)
116 points by ledlauzis on Sept 4, 2012 | 40 comments

Frew, who apprenticed with a Savile Row tailor, can — all by himself, and almost all by hand — create a pattern, cut fabric and expertly construct a suit that, for about $4,000, perfectly molds to its owner’s body. In a city filled with very rich people, he quickly had all the orders he could handle.

You don't have to be Wall Street to figure out the bleedingly obvious solution to being a starving artist who has so much work they have to turn work away. Raise the prices. Then raise the prices. Then when you're done with that, raise the prices.

At some point you'll be too expensive for the typical businessman, which will make you absolutely crack for a certain type of person common in New York, thus defeating all efforts at being less busy. So it goes. I guess you will have to raise prices.

24.The Laser Doodler (ch00ftech.com)
104 points by daeken on Sept 4, 2012 | 10 comments
25.Benjamin Franklin's 13 virtues (wikipedia.org)
101 points by ColinWright on Sept 4, 2012 | 73 comments
26.GNU Coreutils Cheat Sheet (catonmat.net)
99 points by wyclif on Sept 4, 2012 | 15 comments
27.FBI Says Laptop Wasn't Hacked; Never Possessed File of Apple Device IDs (wired.com)
83 points by ssclafani on Sept 4, 2012 | 73 comments
28.Collapsible comments for Hacker News (niyaz.pk)
78 points by niyazpk on Sept 4, 2012 | 36 comments
29.Building a SaaS startup in one of the least hospitable places on Earth: Japan (beaconreports.net)
74 points by ximi on Sept 4, 2012 | 21 comments

This is huge. I've been fearing this kind of leak for a long time. If you're unsure why this is huge, here are some posts of mine on this issue showing de-anonymization, complete takeover of social media accounts, and more:

De-anonymizing UDIDs with OpenFeint: http://corte.si/posts/security/openfeint-udid-deanonymizatio...

A survey of how UDIDs are used: http://corte.si/posts/security/apple-udid-survey/index.html

Why the Apple UDID had to die: http://corte.si/posts/security/udid-must-die/index.html

I've often been asked what I thought the worst-case scenario is regarding the mis-management of UDIDs. My answer has always been that a large UDID database leaking would be a privacy catastrophe...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: