Hacker Newsnew | past | comments | ask | show | jobs | submit | tguvot's commentslogin

We had some fun requesting key for accessing nist time servers. the process is (quoted from website)

NIST currently offers this service free of charge. We require written requests to arrive by U.S. mail or fax containing:

Your organization’s name, physical address, fax number (if desired as a reply method).

One or more point-of-contact personnel or system operators authorized to receive key data and other correspondence: names, phone numbers, email addresses. Up to four static IPv4 network addresses under the user’s control which will be allowed to use the unique key. By special arrangement, additional addresses or address ranges may be requested.

Desired hash function (“key type”). NIST currently supports MD5, SHA1, SHA256, and HMAC-SHA256. Please list any limitations your client software places on key values, if known: maximum length, characters used, or whether hexadecimal key representations are required. If you prefer, please share details about your client software or NTP appliance so we can anticipate key format issues. Desired method for NIST’s reply: U.S. mail, fax, or a secure download service operated by Department of Commerce.

NIST will not use email for sending key data.

ps. there actually seems to be improvement over what they had year ago. they added "secure download service". and previously they had message that nobody assigned to actively monitor mailbox so if you didn't get key, please email us so we will check it



Joan Donoghue, who has just retired as president of the International Court of Justice (ICJ), spoke to BBC Hardtalk’s Stephen Sackur about the case brought by South Africa to the ICJ over alleged violations of the Genocide Convention by Israel.

Ms Donoghue explained that the court decided the Palestinians had a “plausible right” to be protected from genocide and that South Africa had the right to present that claim in the court.

She said that, contrary to some reporting, the court did not make a ruling on whether the claim of genocide was plausible, but it did emphasise in its order that there was a risk of irreparable harm to the Palestinian right to be protected from genocide.

https://www.bbc.com/news/av/world-middle-east-68906919


enforcing 802.1x on switch is also good solution, especially for "external" ports.

802.1x is quite trivial to bypass if you have an authenticated device (in this case the intercom) that you can transparently bridge[1].

[1]. https://www.defcon.org/images/defcon-19/dc-19-presentations/...


it still will block or slow down many.

802.1x is commonly deployed with macsec. will it be also trivial to bypass ?


actually Israel is the one who came up with with "shahed drones" more than 20 years ago https://en.wikipedia.org/wiki/IAI_Harop

i am principle architect. last time i wrote code for production was more than 10 years ago. i never touched half of languages that are used in our system

in last week I resolved a few legal/regulatory problems that could have cost company tens of millions of dollars in fines/direct spend/resources and prevented few backend teams from rolling out functionality that could have negative impact on stability/security/performance. I did offer them alternative ways to implement whatever they needed and they accepted it


for farming you recycle waste water

actually 90% of potable water in israel comes from desalination. in addition, a bunch of desalinated water supplied to jordan and PA.

also 90%+ of waste water is recycled and used for irrigation


license plate readers for garage parking been a thing around the world for 15 years or more.

always amazed me that it doesn't exist in usa. this and tire inflators at gas stations that allow you to dial in pressure


iirc it was developed as freedesktop project in order to create standard desktop bus to be used by everybody, as back in a day kde had it's own bus and gnome had another one.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: