Hacker Newsnew | past | comments | ask | show | jobs | submit | more KomoD's commentslogin

"free" aka 500 requests and then we need to pay when all you really did was rehost their data.

> I got tired of rate limits and slow responses from the official vulnerability databases while building a security tool. So, I decided to build my own solution.

And now this solution introduces those issues again

"1 requests per minute"


This is a hosted instance of nitter, the reason why nearly all nitter instances died is because "guest" accounts got removed, so now you need tons of real twitter/x accounts instead of just generating thousands of "guest" accounts.


> * Why would anyone pick the flexible/potentially-insecure option?

I pick it whenever I don't want to setup HTTPS on my origin but still want HTTPS. Just for projects where I really don't care.


Here: tehranpich.com

It's behind CF


I think the idea is interesting but it includes a lot of spam and non-news (e.g. archive.fo, .vn, .today, etc.)


> Quick research - author's actual profile is https://github.com/zk-evm

The account is called zig-vm now.

And here's his real github account: https://github.com/gweidart



Yeah I came to that conclusion as well, though from zkevm.bio (which has a Venmo link) but was unsure about dropping his name publicly.


How did you connect this account back to the "real" account?


Well, the name of the "real" account is "zkevm.dev", and the previous account was zk-evm. Those are just letters to me, but it does seem like a clear link. Couldn't say that either is "real", though.


It is not. zk-evm refers to a type of blockchain. It's not a unique/singular link.


"zkevm.dev" is his domain, he uses it for email on all 3 accounts.


The account had a link to a personal website, that (for now) has links to a few social medias and the "real" account.


That's a pretty strong link, nice work!


zig-vm is now pilot-repl (user id 216412417)


Page 101 of the part 2 PDF is where the interesting stuff starts, the rest just seems to be boring legal stuff.


i asked an LLM to parse all three attachments and just explain what the software is and does :

https://pastebin.com/p6ibtBpJ

tldr, it mines your public social media posts and maps your degree of connection to people who post “extremist” content (guilt by association) and then ties that to any internal private dirt the FBI has on you

evades 4th amendment, warrant, FISA types of reporting because its all stuff you chose to post publicly on one of these platforms.


I sometimes wonder the firm defintion(s) of 'public social media'

If you post a blog on blogspot or similar it seems the point is to be public. (there could be settings there to make some things non public, I don't remember or know what is current)

If you post on a network that requires login to see the posts, is that public? (is twitter / tumbler / fbook all indexed via google / available without login?)

If you post on a social network inside a group that requires approval to join, but is free - is that public?

If you post something behind a paywall, is that public?

If someone shares a photo of you that you DMed a person using a social network..

Snapchat makes things disappear, whatsapp advertises that even they can't see your bad behavior.

Did you have a reasonable expectation of privacy in these places?

One could argue that stolen photos, texts, books, movies that are posted on a social network are now public.

And then I think about the number of people who don't understand what is public and what can be seen by others, and I feel that our apps and hardware should bear some responsibility to remind people that tapping like or making a comment may feel intimate / 1 to 1, but you may be questioned one day very publicly about why you were voting for one kind of thing while giving thumbs up and praise comments to twinks from your official account.

Then I wonder what kind of hybrid social systems will be a thing in the future - some sort of encrypted 1 to 1 and 1 to groups thing.

It's not just stories like this, but companies scraping tinder profiles and sharing the pictures and such..

People's expectation of privacy and the horrors of that not being a thing will likely cause more and more migrations into privacy proxy identity avatar agents;

which will likely lead to less data for the big companies where the data knowledge is the gold.


curl, atuin, zed


It doesn't really explain where the environment runs, it's not clear if I have to configure something like GCP/AWS or if GitArsenal handles all this (and how much it costs if so)


Good question, it handles all the infrastructure. GitArsenal runs on Modal's serverless platform, and we automatically provision the right machines for each repo's requirements(working on this feature btw). You don't need to configure GCP/AWS or manage any cloud resources, just point us at a GitHub repo and we handle finding the appropriate compute, spinning up environments, and running the setup


Wow, I hate this website to be honest. So much of the space is taken up by all these "bars" on my already small screen.


Please don't complain about tangential annoyances—e.g. article or website formats, name collisions, or back-button breakage. They're too common to be interesting.

https://news.ycombinator.com/newsguidelines.html


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: