Hacker Newsnew | past | comments | ask | show | jobs | submit | micwawa's commentslogin

$1 is 1981 was four popsicles from the icecream truck. Well worth it to be the king.

$1 in 1996 was a bottomless plastic cup of PBR. Also well worth it.

$1 is 2011 is the cost of an overnight diaper that my three year old son throws away in the middle of night because he says he doesn't like it.


I take it the diaper wasn't worth it.


Agreed - It doesn't seem that these are anything near legal contracts. I would like to see a less misleading word than 'contract.' A contract is a 'meeting of minds' and requires considerations from both parties. What we have are distributed programs that require signatures that run on a blockchain. Pretty sweet, but someone trying to sell it as more than that may be guilty of unauthorized practice of law.


By the way, if you have some presale ether and you think the price might be a little frothy, Kraken makes it super easy to sweep your presale wallet. I recently did this and had bitcoin on its way to my Circle account within an hour.


Tell Mrs. Patmore that.


Are people still developing Counterparty? Is this what you're referring to?


They are. And, I'm not sure if that's what he's refferring to. his claim is fairly dubious, because blockchains require energy, and you don't just snap your fingers and acquire that


I gotta say, for someone who is very much pro-TPP, Ron Wyden seems suddenly concerned about entities overseas using legal power to push around US businesses.


Yup. I just bought a new iphone.


Why didn't you just wipe the data from it and start again?


I got my previous phone three years ago - the battery has gone to pot and Verizon has been telling me I'm reading for an upgrade - but I kept putting off going to the Verizon store to get a new one. I thought, sure, I'll go for the secure phone which is the product itself, and not the one that is created by companies that wish to make me the product.


This says so much about the dangers of winner-take-all economics.


It's more than getting in, it's networking and having the recruiters from all of the bulge-bracket and consulting firms groom you. Why recruit someone online when you have a rich, educated, smart pool of candidates who have the elitist mindset necessary to do the job? They haven't found a way to replace eating clubs.


> Why recruit someone online when you have a rich, educated, smart pool of candidates who have the elitist mindset necessary to do the job?

Because everyone else is farming the same universities, making these candidates overpriced. Google and other tech companies have considerably widened their net, when they could no longer rely on Stanford et al alone.


Last night I applied for a job, and there was a link that you can click to allow the website to access your LinkedIn information. I clicked on this. I usually breeze through this because all these applications just want to access your basic information. I entered my password and hit enter when I looked at the screen and realized that I agreed to the following:

iCIMS would like to access some of your LinkedIn info:

YOUR PROFILE OVERVIEW

YOUR FULL PROFILE

YOUR EMAIL ADDRESS

YOUR CONNECTIONS

YOUR CONTACT INFO

NETWORK UPDATES

GROUP DISCUSSIONS

INVITATIONS AND MESSAGES

So I looked up what this meant :

Network Updates - Retrieves and posts updates as you.

Group Discussions - Retrieves and posts group discussions as you.

Invitations and Messages - Sends messages and invitations to connect as you.

So it seems I gave them access to pretty much every feature except the ability to close my account and/or change the password (which I promptly did.) Woops.

This is a category of dark patterns: have the user click on something that has been benign the last 20 times they've seen something similar, but this time isn't.


> This is a category of dark patterns: have the user click on something that has been benign the last 20 times they've seen something similar, but this time isn't.

This is the nature of OAuth, in which the scopes can be different for many different clients. Not that this makes it any better, you just need to be aware of it. Slideshare do the same thing when you click download - if you verify using linkedin they want access to everything on your linked in profile just so you can download the slides. Ridiculous (even if they're essentially the same company).

Changing your password here is no good, you need to go to linkedin and then your account settings, then third party apps and delete whatever it was you allowed to connect. Despite all the failings of OAuth that's one of the good features about it, you can actually control the access.

Tip: if you're logging in using OAuth (generally when you get redirected to another site to confirm) always check the requested scopes and always remove all the scopes but those essential to the functioning of the calling app/site, which is usually just access to your e-mail address.If you can't disallow certain scopes then try logging in using something else, github, facebook, whatever, and rinse and repeat. If you're still not happy then just signup with a throw away email.


Thanks. I had quite a few apps in there.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: