Hacker Newsnew | past | comments | ask | show | jobs | submit | rscott's commentslogin

Anchovies are actually the only topping I don't include intentionally!


I see what you mean, but no actually. I really just Googled "what color makes people hungry" and picked a red I liked!


Sure! On the front end it's HTML, CSS, and jQuery - no hip JS frameworks nor complex build pipelines. Backend is node and express. The dominos API is https://github.com/RIAEvangelist/node-dominos-pizza-api, as mentioned below. Everything is hosted in AWS on Elastic Beanstalk on a few t2.micro instances.


By “0” I mean “cheese only”. I could have been more clear, thanks for the feedback.


The estimates are real and from Dominos. Thanks for the feedback, that's a good catch. I'll be adding that verbiage.


I wonder of those involve Dominos "deliverator" van.

http://www.dominosdxp.com/


I saw Dominos pizza tech guy interviewed a while back about their delivery bags. He spoke of one day of not just keeping the pizza warm, but having it having cook while being delivered. Custom vehicles could make that happen and I'm sure somewhere in that organization someone is trying to mount a pizza oven in a 92 chevy.


That actually already exists by a startup in the valley: https://zumepizza.com/ http://www.businessinsider.com/zume-pizza-robot-expansion-20...


I hope that guy had esprit up to here.


that's called a pizza van/truck and there are already plenty of those in any major metro area


Most of iCloud is encrypted at rest. https://support.apple.com/en-us/HT202303


I think that's not true, note this line in the doc you link to:

"...and never provides encryption keys to any third parties".

The data might be stored encrypted, but Apple seems to have access to the encryption keys. I've read that they need to be able to decrypt data to be able to comply with government requests.

I'm not sure if this is still the case now in 2017, but i assume so, until i read otherwise :)

https://www.macrumors.com/2016/03/16/apple-to-double-down-ic...


> but Apple seems to have access to the encryption keys

Of course, no one claimed that iCould data was E2E. They also need to decrypt the data in order to serve it to their users.


> They also need to decrypt the data in order to serve it to their users.

That's the point, they don't (and shouldn't) need to. As Apple itself says in the above linked article:

"Apple is working to further harden iCloud security so that even it won't be able to access user information stored on its data servers"


Web access means that you've always got one of three things:

1) the company has the encryption key

2) you give the company the encryption key each time you log in and they store it temporarily

3) everything is getting decrypted in the browser locally (probably tremendously infeasible)


#3 is how Mega works.


Interesting omission of iMessage here... since it's not encrypted at rest on their servers.


I can't tell if you're implying that they store iMessages unencrypted, but iMessage is encrypted end-to-end. Backups of your phone, which may or may not contain message histories, are only encrypted at rest.


^ I am implying that they are storing iMessages unencrypted. The iMessages on iPhones/iPads are part of the 'backup' for each device and they are not encrypted at rest on the iCloud server.


You sound very sure of this, what's your source?

As far as I've read, the iCloud backups have always been encrypted at rest, and Apple is apparently working on improving it to the point where they do not hold any decryption keys to the backups [0].

That's why, when you set up a new device, up until now it would not have your message history - because the message history can only be decrypted on devices that are already-authorized. If you restore a backup in its entirety, that includes the message log and the encryption key, but if you set up the device as "new", you only get the newly received messages - since it needs your password to decrypt the backup, it had no way to decrypt the message history from backup on the cloud and only sync that down to the new device (which always bothered me in terms of convenience). I think they're working on improving the usability of it in upcoming releases though.

[0] https://9to5mac.com/2016/02/25/apple-working-on-stronger-icl...


My source, while I wholly acknowledge this is anecdotal and not evidence, is someone in law enforcement tasked with retrieving message logs for investigations. I was pretty skeptical but I've yet found any proof or documentation from Apple's support docs disproving this.

I also recall from the San Bernadino case that the FBI/Apple had the ability to get historic message history from the iCloud backup but the FBI pushed for decrypting the device because of the most recent and not backed up messages.

As for your scenario -- doesn't that explicitly confirm that the messages are not encrypted safely at rest? You can restore to an entirely new device, using the same backup, and retrieve the messages.


> someone in law enforcement tasked with retrieving message logs for investigations.

Right, but do they retrieve them from iCloud? Without Apple's assistance, and without knowing the user's password?

> I was pretty skeptical but I've yet found any proof or documentation from Apple's support docs disproving this.

Well, here's the brief overview: https://support.apple.com/en-us/HT202303

and here's the iOS security whitepaper: https://www.apple.com/business/docs/iOS_Security_Guide.pdf

Which includes a section about iCloud security, including the following section:

  iCloud secures the content by encrypting it when sent 
  over the Internet, storing it in an encrypted format, 
  and using secure tokens for authentication.
I am no security expert, but I am pretty sure FBI wouldn't have a huge fight with Apple if they had any way to get to the data directly (and once they figured out they could use a vuln in the old iOS to break into the device, they did indeed drop the fight).

> FBI/Apple had the ability to get historic message history from the iCloud backup

Right, because they reset the shooter's Apple ID password. Not because the backup was in plaintext.

> As for your scenario -- doesn't that explicitly confirm that the messages are not encrypted safely at rest? You can restore to an entirely new device, using the same backup, and retrieve the messages.

How does that follow? You still need to supply your password to decrypt the backup before you can restore it. From the same security whitepaper:

  When files are created in Data Protection classes that aren’t accessible 
  when the device is locked, their per-file keys are encrypted using the 
  class keys from the iCloud Backup keybag. Files are backed up to iCloud 
  in their original, encrypted state. Files in Data Protection class 
  No Protection are encrypted during transport.

  The iCloud Backup keybag contains asymmetric (Curve25519) keys for each 
  Data Protection class, which are used to encrypt the per-file keys. For 
  more information about the contents of the backup keybag and the iCloud 
  Backup keybag, see “Keychain Data Protection” in the Encryption and Data 
  Protection section.

  The backup set is stored in the user’s iCloud account and consists of a 
  copy of the user’s files, and the iCloud Backup keybag. The iCloud Backup 
  keybag is protected by a random key, which is also stored with the backup 
  set. (The user’s iCloud password isn’t utilized for encryption so that 
  changing the iCloud password won’t invalidate existing backups.)

  While the user’s Keychain database is backed up to iCloud, it remains 
  protected by a UID-tangled key. This allows the Keychain to be restored 
  only to the same device from which it originated, and it means no one 
  else, including Apple, can read the user’s Keychain items.

  On restore, the backed-up files, iCloud Backup keybag, and the key for 
  the keybag are retrieved from the user’s iCloud account. The iCloud Backup 
  keybag is decrypted using its key, then the per-file keys in the keybag 
  are used to decrypt the files in the backup set, which are written as new 
  files to the file system, thus re-encrypting them as per their 
  Data Protection class.


That's not what I would call simple. America has a long history of subsidizing farmers, which in turn keeps food prices down.


Not all food subsidies keep food prices down. For example, several crops have dedicated programs where the government keeps a significant portion of the annual crop off the open market as a means of keeping the price high (see the recent SCOTUS case about raisins). Then there's things like ethanol mandates which act as a subsidy to farmers but increase both the cost of food and the cost of gasoline. An even bigger problem are import tariffs and other forms of protectionism that again subsidize farmers but increase prices.

Food stamps are a far far better way of subsidizing food for the poor than through a rube goldberg system of supposedly helping the poor by giving millions to huge agribusinesses. So much so that I consider those types of arguments a bit of a red herring. Along with the "food security" argument -- there's no impeding worldwide embargo of the united states and if there were calories would be the least of our problems.


> America has a long history of subsidizing farmers, which in turn keeps food prices down.

I would assume that instead of keeping food prices down, farming subsidies will drive farming land prices up.


Yep, Jack3d was pretty famous for that. The banned ingredient was DMAA, by the way. http://www.fda.gov/Food/DietarySupplements/QADietarySuppleme...


wistful sigh DMAA was great. The reason it was popular was that it stimulated without the jitters.


There seems to be a pattern that if a supplement becomes too effective, drug companies lobby politicians to get it classified as a pharmaceutical so they can make money selling it.


"A few people asked me to write about my experience of interviewing for a job at Apple—the 700 billion worth company—so here it is."


I still don't understand, but ok, thanks. That's a great descriptor of Apple (of which there are many), but doesn't point anywhere toward a rationale for titling an interview experience as "700 billion". I'm not trying to say titles need to make logical sense, but they usually should make some sense


it refers to Apple's current Market Cap


I think he understands that, but is wondering why that is relevant for the topic at all.


And yet it's still one of the best Twitter clients on any platform. Thank you, Loren Britchter.


Have you used Tweetbot?


I use it on iOS and love it, but didn't feel like paying $20 for a Twitter client on the desktop.


Oops, Tweetbot is kill. Something something API limits developer love walled garden.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: