Hacker Newsnew | past | comments | ask | show | jobs | submit | WaitWaitWha's commentslogin

Love it.

Since I am a visual learner, here is a sequence diagram that helped me follow it a bit cleaner. (yes, I used the gAI dark magic)

```

  sequenceDiagram
      participant HW as Hardware
      participant Kernel as Linux Kernel<br>(USB / driver core / kobject)
      participant NetlinkK as Netlink<br>(NETLINK_KOBJECT_UEVENT<br>group 1 = MONITOR_GROUP_KERNEL)
      participant Udevd as udevd<br>(systemd-udevd)
      participant NetlinkU as Netlink<br>(NETLINK_KOBJECT_UEVENT<br>group 2 = MONITOR_GROUP_UDEV)
      participant App as Userspace Application<br>(libudev or direct netlink listener)
      participant Sysd as systemd<br>(device units, services)
      participant DevFS as /dev<br>(device nodes + symlinks)
  
      HW->>Kernel: Physical insertion (USB plug-in)
  
      Kernel->>Kernel: Detect change via bus/driver<br>(e.g. xhci-hcd → usbcore)
  
      Kernel->>Kernel: Register new device in device model<br>(kobject_add / device_add)
  
      Kernel->>NetlinkK: kobject_uevent_env(ACTION=add, ...)<br>multicast to group 1<br>(raw uevent: null-terminated key=value strings)
  
      NetlinkK->>Udevd: Receive kernel uevent<br>(ACTION=add, SUBSYSTEM=..., DEVPATH=..., etc.)
  
      Note over Udevd: udevd parses uevent
  
      Udevd->>Udevd: Match & apply udev rules<br>(/lib/udev/rules.d/, /etc/udev/rules.d/)
  
      Udevd->>Udevd: Perform actions:<br>• Load firmware<br>• usb_modeswitch<br>• Set permissions<br>• Run programs/scripts
  
      Udevd->>Udevd: Create device node(s)<br>e.g. /dev/bus/usb/001/002
  
      Udevd->>Udevd: Create symlinks<br>e.g. /dev/ttyACM0, /dev/disk/by-id/...
  
      alt Optional: triggers systemd .device unit
          Udevd->>Sysd: Triggers / influences device unit activation
          Sysd->>Sysd: May start dependent services / scopes
      end
  
      Udevd->>Udevd: Build enhanced udev packet:<br>• libudev header ("libudev\0", magic 0xfeedcafe, ...)<br>• MurmurHash2 subsystem/devtype<br>•   64-bit tag Bloom filter<br>• Original + added properties
  
      Udevd->>NetlinkU: Broadcast processed event<br>multicast to group 2<br>(binary format with header + properties)
  
      NetlinkU->>App: Receive udev event packet<br>(via libudev_monitor or raw netlink socket)
  
      App->>App: Parse header, validate magic/credentials<br>Extract properties
  
      App->>App: React to device<br>(open /dev/..., query sysfs, etc.)
  
      Note over DevFS: Device now usable via stable names / permissions
```

sorry for the dumb question, but what language is this? dotty? mermaid? what tool can i feed that code into ?

EDIT: chatgpt correctly identified it as mermaid.

live link: https://mermaid.live/edit#pako:eNqVVu1u6kYQfZWRf1SJLmAgJASri...


apologies. Yes it is for mermaid.live

I guess it is users' accounts, so service accounts are exempt? I would hate to see a headless server rebooting and waiting for an age verification from a service account at a power or water sanitation plant...

Maybe all laws should have a "dev environment", starting with the politicians. All their systems will demand their age and proof of age for say 12 months? Toaster, washer, dryer, cell, dishwasher, car, calculators, etc. Then, if they still want to pass the law, 3 months of red teaming by the "general public" for all the systems that have their data. And, if they still want it, go for it.


https://github.com/c3d/db48x

> The DB48X project intends to rebuild and improve the user experience of the HP48 family of calculators

They just updated their license to exclude California residents. The law is so vague there is a possibility to apply it against the project, per project team.


i did not even think of that! As the current law reads, will smart devices with OSes require age verification? Many IoTs are just tiny Linux versions running on a small processor. This makes all smart GE washing machines, dryers and refrigerators illegal in California.

come to think of it, maybe there is something good about this law. :D


Not just that, but the the copy of Minix in the intel IME of every intel processor.

Not to mention all the printers, routers, etc that run freertos/thread x/vxworks.


I have played this game on the road so many times, just by myself. Airports, hotel lobbies, waiting for taxi, and more. I never played it online though. It is my "TV" to disconnect my brain from the day to day work troubles and hustles. It is not as boring as sitting front of a TV and just consume; it forces me to strategize a bit, use at least a tiny bit of my left over brain cells.

I cannot tell if this is /s or real. there is an entire genre of art that specifically about functionality - functional art. Chairs, tables, buildings, vases, textile, and so on can be beautiful art yet functional.


Sheesh, this makes me realize how boring "modern" interiors are, even though 3d printing makes means this is now much easier.

> Why does i2p (per the article) expect state sponsored attacks every February?

Because The Invisible Internet Project (I2P) allows government dissidents to communicate without the government oversight. Censorship-resistant, peer-to-peer communication

> Where are those forming from, what does the regularity achieve?

At least PR China, Iran, Oman, Qatar, and Kuwait. censor communication between dissidents.

> How come the operators of giant (I’m assuming illegal) botnets are available to voice their train of thought in discord?

How would you identify someone as 'operators of giant botnets' before they identified themselves as 'operators of giant botnets'?

please read https://en.wikipedia.org/wiki/I2P


Sure, but why February and not the other 11 months?


Likely it's just a coincidence — there were other Sybil attacks that are not in February too, so the chance that you'd get 3 in Feb isn't all that low.


This answer is missing the key "regularity" part of their questions, which I would love to know more about.


That’s a great question… Currently we’re in the main Chinese holiday period with the Lunar New Year/Spring Festival/Chinese New Year, so perhaps people traveling back home from foreign lands might use the service more during this time?


I know no one using this in China. And people who can afford to travel (and have visa and passport) will have foreign sim/phone. The timing is just a coincidence


I really wanted this "book" to be good.

In the context of the paper, the entire book seems to go downhill from the definition of ontology for me.

There is no benefit of using Gruber's ivory tower definition. A simpler explanation (e.g., it describes a structured framework that defines and categorizes the entities within a specific domain and the relationships among those entities) would have sufficed, and easier to digest.

Palantir is doing nothing revolutionary or "paradigm shift" when it comes to data and information organization. Their secret weapon is not introducing ontology to information.

Ching (1000BC?) classified reality into binary ontological primitives, created trigrams and hexagrams a combinatorial ontology. Aristotle introduced categories, substance, properties, relations, etc. Thomas Aquinas systemized Aristotelian categories into theological knowledge systems, and used structured classifications.

I am becoming curmudgeony as I see more and more of these reverse-research papers. Write the paper, then find references that fit the statement and use weasel words ...

unbelievable scene unfolds, deep-rooted disease of silos, paradigm shift, fatal flaws, forged in these extreme environments, eliminated to the absolute limit...

Gag me.


mine is axiology, DNAMA. ;)


well my MA said my DNA is secret.


If someone gets this going, first, it will be interesting how Ring (Amazon) responds, second the self-managed home automation (e.g., Home Assistant, Open Home Foundation).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: