Hacker Newsnew | past | comments | ask | show | jobs | submit | saguntum's commentslogin

I don't read German well and don't care to run this through a translator, but this is fascinating. I wonder how this list was compiled, by whom, and when it is used (is the gold audited)? You could randomly sample bars from the list to check the status of the gold periodically. I'm curious if other countries maintain similar lists.

I don't think they regularly audit the gold bars. But according to an article I read, the German Bundesbank used these lists to check off each of the bars transferred between 2013 and 2017 (when they transferred ~ 300 tons each from Paris and New York¹). Back then, they brought the gold bars to Germany, weighed them at multiple checkpoints, and melted them here. AFAIK, no discrepancies between list and actual weight/fineness were found.

I think this list is not only used for internal audits but also to assure the public and banks that Germany indeed knows in detail where its gold is stored.

¹) https://www.bundesbank.de/de/aufgaben/themen/bundesbank-schl... (in German)


fwiw i agree with you that the current situation is much worse than in the past, given all the horror's being done in the open without any nod toward reason, multilateralism, or public consent

take a look at this though, in the interest of examining past US actions: https://en.wikipedia.org/wiki/Casualties_of_the_Iraq_War#Ira...


I don't have rose-tinted glasses with regard to US actions in the past, especially in OEF/OIF. So many instances of horror in Vietnam, WW2, and so on.

But all of those things are the awful things that happen during war even with a military, political, and legal apparatus that tries to mitigate it.

We are now dealing with a regime that claims and will make no such efforts. The only reason the Iran war hasn't so far yielded the same horrors is because so far we haven't attempted to occupy Iran.

If we do, I absolutely promise you that a military populated by people who know they can be court martialed, jailed, or even executed for crimes against the local population will be significantly better behaved (even if imperfectly, per your article) than one that is told – from the very top – that they will be accountable for nothing except maximal brutality and lethality.


Yeah, our basic integration test suite takes over 20 minutes to run in CI, likely higher locally but I never try to run the full test suite locally. That doesn't even encapsulate PDVs and other continuous testing that runs in the background.

The other day, I wrote a claude skill to pull logs for failing tests on a PR from CI as a CSV for feeding back into claude for troubleshooting. It helped with some debugging but was very fraught and needed human guidance to avoid going in strange directions. I could see this "fix the tests" workflow instrumented as overnight churn loops that are forbidden from modifying test files that run and have engineers review in the morning if more tests pass.

Maybe agentic TDD is the future. I have a bit of a nightmare vision of SWEs becoming more like QA in the future, but with much more automation. More engineering positions may become adversarial QA for LLM output. Figure out how to break LLM output before it goes to prod. Prove the vibe coded apps don't scale.

In the exercise I described above, I was just prompt churning between meetings (having claude record its work and feeding it to the next prompt, pulling test logs in between attempts), without much time to analyze, while another engineer on my team was analyzing and actually manually troubleshooting the vibe coded junk I was pushing up, but we fixed over 100 failing integration tests in a week for a major refactor using claude plus some human(s) in the loop. I do believe it got things done faster than we would have finished without AI. I do think the quality is slightly lower than would have been if we'd had 4 weeks without meetings to build the thing, but the tests do now pass.


man ssh_config is even more interesting and hidden

ProxyCommand is fun


You can also run commands when a user authenticates, grab their keys from github.com/username.keys, validate they're a user in a specific github group, then let them connect by outputing the keys, otherwise nothing to deny them access.

It's really great for ops teams where you want to give ssh access and manage it from github teams without needing a complex system.


Honest question, why is ProxyCommand `fun`? What do I get out of ProxyCommand that i do not get out of setting the correct order for ProxyJump and doing an ssh finalhost -- domy --bidding?


ProxyJump is a newer functionality. There used to be only ProxyCommand. ProxyJump is a shortcut for the usual way to use ProxyCommand to connect through a bastion host but ProxyCommand is more flexible. For example with ProxyCommand you can run any command to connect to the remote host. ProxyJump only connects over ssh. I think I replaced all my ProxyCommand with ProxyJump because I don't need much else than the normal use case.


You can get a lot more out of ProxyCommand. For example, you can run SSH over non-IP protocols, such as serial, Bluetooth RFCOMM for embedded boards, or vsock for virtual machines without networking set up at all. The latter is built into and setup up automatically by systemd:

https://www.freedesktop.org/software/systemd/man/257/systemd...


Much appreciated!


ProxyCommand allows you to use any command to setup a connection. Not necessarily an ssh command, like ProxyJump. It can be any command, as long as it receives on stdin and produces on stdout, it can act like a TCP connection.

ProxyJump is a special case of `ProxyCommand ssh -p <port> <user>@<host>`. Can't replace the `ssh` in there when using ProxyJump.


I came across ProxyCommand earlier this week, funnily enough. I have Cloudflare Zero Trust set up with an SSH service[0], and have the server firewall drop all incoming traffic. That helps reduce my attack surface, since I don't have any incoming ports open.

[0]: https://developers.cloudflare.com/cloudflare-one/networks/co...


I use ProxyCommand in edge-case devices where key auth is not an option and the password is not controlled by me. ProxyCommand points to a script the retrieves the password from the vault, puts it on the clipboard for pasting, reminds me via stderr it's done so, and then proxies the connection.


Interesting. I might have such a use case. Do you have anything about best practices on how to automate grabbing passwords from vaults? Cuz it seems to me that the vault needs to be kept open or keep the vault password somewhere on disk.


I use ProxyCommand to run spipe tunnels for SSH.


Thanks. Is this one officially not getting released?

https://www.amazon.com/dp/151078604X/

I was thinking it would be nice to have a final print edition for the book collection, Amazon seems to be under the impression that this newer version is coming out in April.


What is a mess about the Eurozone and reckless about the ECB?



save people a click:

> The incentive structure at the ECB has become distorted and favors high-debt countries [that underperform or are risky]


Able to summarize what you mean vs just a link?


I haven't tried it, but Signal supports not sharing your phone number/just communicating with usernames: https://signal.org/blog/phone-number-privacy-usernames/

You still need to use your phone number to sign up, though.


> You still need to use your phone number to sign up, though.

Which defeats the whole point. What if the FBI politely asks Signal about a phone number?


All they'd learn that way is that that phone number has a Signal account, when it was registered, and when it was last active. In other words, it doesn't tell them whether it's part of a given Signal group. (See https://signal.org/bigbrother/.)


They publicly publish these requests. You can see how little information is provided — just a phone number and two unix timestamps IIRC. https://signal.org/bigbrother/


I might be misremembering or mixing memories but i remember something about them only storing the hash of the number.

So the FBI cant ask what phone number is tied to an account, but if a specific phone number was tied to the specific account? (As in, Signal gets the number, runs it through their hash algorythm and compares that hash to the saved one)

But my memory is very very bad, so like i said, i might be wrong


It would be absolutely trivial for the FBI to hash every single assigned phone number and check which one matches. Hashing only provides any anonymity if the source domain is too large to be enumerable.


Brief research says that Signal does store phone numbers.

Regarding hashing: while unsalted phone number hashes would be easy to reverse then I doubt that any hashing scheme today is set up like that.


You don't even need to think about how the hashing scheme and salt is set up. If Signal can check if a phone number matches the hash in any reasonable amount of time (which is the whole point of keeping a hash in the first place) then the FBI can just do that for all phone numbers with very realistic compute resources once they get Signal to cough up the details of the algorithm and magic numbers used.


Well, Signal would have to disclose the salt of course.


I haven't used any but there are several it seems: https://european-alternatives.eu/alternative-to/google-docs

NextCloud looks ok.

For some reason I thought it was open to the public, but France also maintains a full sovereign cloud office suite for use by civil servants: https://lasuite.numerique.gouv.fr/en

Maybe one day they'll open it up publicly.


You might enjoy the plot of Cryptonomicon


You might need to disclose social media accounts, phone numbers, email accounts, and a lot of other information, regardless of your burner: https://www.bbc.com/news/articles/c1dz0g2ykpeo

Depends on when that goes into effect and how thoroughly it's actually implemented.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: