Hacker Newsnew | past | comments | ask | show | jobs | submit | jogu's commentslogin

If it was just a simple matter of "what was available" these lenses would be an interesting footnote in Photography history. But that's not the case, people still buy them for their unique properties 50 years later and the fact a company exists to re-house them more than proves their legendary status in my mind.

There is a phenomenon I observe with people being fascinated by russian/soviet things even when in reality the subject of interest is pure shit.

Being it either a low quality lenses in which people see a artistic quality of manufacturing defects or text from Dostoevsky which ruminates in extended length the inner thought process of a moronic character which some mistake for a mysterious russian soul.

I own Helios lenses with Zenit camera I inherited from my father which is of the sentimental value as it was a first significant purchase after my parents wedding, and most of my childhood photos are done with it, but even my dad will trade it for a good Nikon lenses without a second thought.


i find your dostoievski example amusing. notes from underground serves a functional purpose, not one of aesthetics.

The swirly effect is certainly unique, though I always considered it a bug as it's not even, some parts look oversharpened, some diffused. Like some weird algorithmic filter in Photoshop.

Right, that matches my understanding. After 2029, It'll stick around as long as it continues to compile. If it fails to compile it would get dropped instead of updated as there's no maintainer.

> The pokemon games are painful games to play, full of grinding, massive amounts of rng and just boring turn based combat (compared to other rpgs that exist).

As someone who was played every entry since the 90s I can't even imagine how you could come away as Pokemon games being "grindy", assuming you're talking about just playing through the story. EXP share has been a standard mechanic for the past few generations that have effectively eliminated any grinding.

I'm also not really sure where you're getting "massive amounts" of RNG from either. Sure, moves can miss but it's never consequential enough that it could ruin a run or something. At most you lose a few minutes having to run back somewhere.


Mitsubishi Group has a lot of companies, including a bank, so no the logo doesn't say anything about who donated it.


I like Barley tea as my go to caffeine free tea.


In the video at the end you can see it’s the former. They’re drawing a digital representation of the commands the emulator is sending to the “sewing machine”.


my bad - I read but didn't watch. okay now I want the latter


Jetson is such a confusing product and it's difficult to tell exactly what they're supporting. Looking at the image download page it seems to be only Orin and newer?

https://ubuntu.com/download/nvidia-jetson


Yeah. I have the Orin devkit


It can be fixed if the manufacturer releases a firmware update for the affected devices.


Sounds like you should have actually watched the “long ass video”.

It allows the pairing key to be exfiltrated from the compromised device and an external, attacker controlled device to perform any function the original device could. This includes retrieving the paired devices phone number, answering phone calls, and receiving the audio. They live demo hijacking a whatsapp account using this.


Neat. It appears my headphones have to be in pairing mode. Which is a very short window, at which point the attacker can impersonate your device. this allows him to answer phone calls for you or make phone calls, but you would notice right away. It’s not like cloning the audio and eves dropping. so yeah it’s a nothing burger.


Some devices are/were only vulnerable during the initial pairing but a key point from this talk was that most of these devices were vulnerable during normal use.

The RACE protocol could be accessed even if the device isn’t in pairing mode. Then once you have a target device’s key you can carry out the attack at anytime, when they’d be unlikely to notice.


If you have the target device key, you can impersonate the device later. But how do you get the device key in the real world? I would need to be in pairing mode for you to get it. Even if you did get it, then you can answer my calls if you are next to me, which in the real world is certainly noticeable.


> I would need to be in pairing mode for you to get it.

No, that doesn't seem to be the case.

> then you can answer my calls if you are next to me, which in the real world is certainly noticeable.

You may not notice if the call was answered automatically and you didn't have your device on you, and the call could be forwarded with acceptable latency so the speech wouldn't be in earshot. Or these days you could use an AI to generate voice and it would sound realistic.

Just because something isn't likely to affect ordinary citizens doesn't mean it isn't possible.


Important to note that usage of an Airoha chip doesn’t imply being vulnerable, so each device has to be checked individually.

It’s possible they weren’t vulnerable to begin with, it’s also possible they silently patched it.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: