Hacker Newsnew | past | comments | ask | show | jobs | submit | bc569a80a344f9c's commentslogin

In your cake shop example, the more accurate version would be some gay couples only agreeing to buy wedding cakes from cake shops with gay bakers.

On account of it's the customer choosing the service provider, albeit with the help of filters provided by an aggregator, instead of service providers denying service to customers based on their belonging to a class.

edit: I missed that you can, as a woman driver, also filter out male riders.


The preference can also be set by women drivers not to accept men as riders, so I don't think your example fully covers it either.


Why does it change whether it's discrimination or not depending on who does it?

I don't see how the distinction is material.


I prefer my MacBook, but the Thinkpad whatever I bought to have Windows and Linux available for some software I need occasionally has a fingerprint reader that worked out of the box on Ubuntu.


From what I understand, it depends on the stage. The United States Code certainly tracks any and all amendments, and you can fully trace which member introduced which amendment, when and where it passed, and even verbatim floor debate.

However, the draft stage isn't documented this way. Members negotiate whatever between themselves (well, really their staffers) and this happens over email, in discussions, via Word documents - whatever works.

I guess in the git metaphor, drafts are in flux while being worked on as a commit, and are squashed and then accessible as such squashed commits once initially introduced or whenever they lead to bill amendments. You can't necessarily track down what member was responsible for a specific sentence in an amendment.


The thing is that there is a voting process eventually so it can at least in principle be known which version is proposed by which legislator, or which committee.


The people behind changes aren't actually as attributable as it sounds though because amendment text gets collaborated on, so showerst might propose an amendment with the key parts of LPisGood's wishlist in it, and then the bill itself will die and then various parts will get cherry picked into an omnibus bill in 6 months anyway.


I've see similar stuff in open source a few times. X post a bug report, Y replies with minimized case, X makes a PR, Z makes a few suggestions, Y add some comments, X updates the PR and W merges it.


I adore Canticle. It is one of my favorite books.

I had recommended Hyperion to a friend, and they loved it. I recommended Canticle as a follow-up and they hated it. I never figured out how that can be.


To be fair, Canticle is soul-crushingly bleak in a way that Hyperion only dances around.


The shit people tell you about themselves for free, unprompted. It’s unreal.


That that doesn't break my heart? I guess my heart is just tougher than yours.


Kind of but not really.

The whole point of BGP is to influence your routing tables. This fundamentally makes very little sense to do when you have a bunch of routers whose routing policy you don't control between you and whoever you're speaking BGP to. eBGP is just TCP and supports knobs to run over multiple hops (so up to 255), but at that point you can't really do anything with the routing information you exchange because the moment you hand the traffic off, the other party can do with it how it pleases. Also, very few people have enough public IP addresses for this, and on the Internet you obviously can't route RFC1918 space. Therefore, you need tunnels, so that you can be one hop away even if the tunneled traffic is traversing the Internet, and so that you can reach peers that let you announce whatever IP space you want.

The other thing you can do, of course, is to just do the same thing internal to your lab. You can absolutely stand up multiple ASN at home. I'd even argue that if you really want to learn BGP, this is a great way to do it, especially if you use two different platforms (say, FRR on FreeBSD peering with a cheap Mikrotik running RouterOS). That way you learn the underlying protocol and not a specific implementation, which is something that is very hard to undo in junior network engineers that have only ever been exposed to one way of doing things.

That's different from some of the goals outlined in the article, but if your goal is to learn this stuff rather than have provider-independent IP space (which even for home labs isn't very valuable to most people), doing it all yourself works fine.


You can use who you're physically connected to. If you have a physical or point–to–point connection to iFog and Lagrange Cloud, you don't need tunnels to reach them. Both these companies offer VPS services.

If your goal is to learn this stuff join dn42, the global networking lab, instead of wasting money with real allocations.


Even if yawning in public affected sexual fitness: how long has it been socially impolite to yawn in public? Evolution takes a rather long time in species with long reproductive cycles. Almost all mammals yawn, it would take significant genetic changes to breed that out of us. That doesn't happen overnight.


400-500 years minimum (15-20 generations), although point taken


> it would be just nice to quickly change (or even better: have access to multiple at once!) networks.

Accessing multiple corporate networks simultaneously from the same endpoint violates all sorts of access policies. If it doesn’t, the access policy is lacking. Even for startups.

And no, unless you build it and enforce it from the start, no one ever succeeds in bolting on a reasonably security posture after implementing all their other processes no one will dare touch.


It's fine if all you need is a packet filter, but in 2026 I question that many production use cases can get away with just packet filter.

As a host firewall, it's obviously fine, I assume your question is about using pf as a network firewall. Given the threat landscape, you usually want threat protection. At the very least that means close-to-real-time updates from reputation lists. You can script that with pf, but it's not fun. Really, you want protocol dissection and - quite possibly - the ability to decrypt on the box and do payload analysis. Just doing packet filtering doesn't buy you all that much anymore these days, and anything production that requires compliance or that you genuinely care about should be behind what you might also call IPS or layer 7 firewall capabilities.

pf doesn't do any of that. You don't have to use Palo Alto or Cisco for this, either.

If all you need is packet filtering, it's a good option, though.


> almost all humans use computers but only 0.1% or so can program them.

This is nitpicking but I was curious: there are 4.4 million software developers in the US (https://www.griddynamics.com/blog/number-software-developers...). The population is 340 million, 0.1% would be 340,000. You’re off by over one order of magnitude.


there are 45 million devs in the world (out of which probably 10 can actually program) and 8.5 billion people

we could say 0.5%?


It’s misleading to use the entire world’s population. A very large proportion of that hasn’t ever had the opportunity to learn to write code.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: