Hacker Newsnew | past | comments | ask | show | jobs | submit | yusaydat's commentslogin

Xpath is still used for e2e tests and things like scraping. Especially when there aren't better selectors available.

The point is that you don't need the very latest version. The 20 years old version is enough.

XPath 1.0 is a pain to write queries for. XPath 2.0 adds features that make it easier to write queries. XPath 3.1 adds support for maps, arrays, and JSON.

And the default Python XPath support is severely limited, not even a full 1.0 implementation. You can't use the Python XPath support to do things like `element[contains(@attribute, 'value')]` so you need to include an external library to implement XPath.


Windows 11 has full spectre/meltdown mitigations by default. That Wikipedia article doesn't mention Windows 11 at all.


It's 5 mg/kg (or 15 mg/kg due to faster metabolism) for rats, and 25 mg (not per kg!) for humans. To be clear, 25 mg is a completely normal dosage that has been used in previous human studies.


Lots of low-quality construction work though. Anecdotally, I used to live in a 30-story building in one of the special economic zones. My building had horrendously large cracks in the concrete, and even though I knew rationally that it wouldn't come down, it didn't feel safe, especially during typhoons, etc.



> even though I knew rationally that it wouldn't come down

How do you know that?


Tofu-dreg construction, or 豆腐渣工程 in Mandarin.

A lot of new-builds literally rusting, falling apart, collapsing, etc. https://en.wikipedia.org/wiki/Tofu-dreg_project

Of course, many builds are fine too.


The prices depend on the city, apartments in Chongqing cost around $1,000 USD per m², about 1/5th of the prices in cities like Beijing and Shanghai.


They asked users of the VPN service to install a certificate, that's how they did it.


The TC article leaves that a little unclear: were they actually looking at the plaintext or just gathering metrics about snapchat usage? The latter wouldn't require decrypting the session.

If Onavo did install a certificate and MITM the connections and send private user data to Meta... that's beyond the pale. That's far more worthy of a cover story than Bloomberg's debunked secretive tiny chips story from a few years ago. It's equally as bad if not worse.

Hopefully the technical details will come out.


See page two of the document: https://storage.courtlistener.com/recap/gov.uscourts.cand.36...

Seems pretty clear that they could decrypt the traffic they were interested in, they also talk about 5 years of retention of all traffic that they can decrypt at anytime. Sound familiar?

Looks like they used a squid feature: https://wiki.squid-cache.org/Features/SslBump


This is the first sentence of the article:

> In 2016, Facebook launched a secret project designed to intercept and decrypt the network traffic between people using Snapchat’s app and its servers.

I read the rest of the article as well, and saw only confirmation:

> Given that Snapchat encrypted the traffic between the app and its servers, this network analysis technique was not going to be effective. This is why Facebook engineers proposed using Onavo, which when activated had the advantage of reading all of the device’s network traffic before it got encrypted and sent over the internet.

Where do you see the ambiguity? Other than the weasel words about proposing these programs (versus actually running them), it seems clear that they were decrypting the traffic (or reading it before it was encrypted). Did I miss a piece?


> This is why Facebook engineers proposed using Onavo, which when activated had the advantage of reading all of the device’s network traffic before it got encrypted and sent over the internet.

This doesn't make sense, they wouldn't see the traffic before it was encrypted. They would see it encrypted, but using the MITM certificate instead of Snapchat's. Given the inaccuracies in the article, it makes me wonder what else they got wrong.

Using a VPN client to monitor how much, when, and where traffic is going is bad, but MITM'ing a user's connection is much, much worse. I'm really skeptical that's what happened, especially given TC's inability to articulate accurately what Facebook did.


That was pretty much the point of Onavo: https://techcrunch.com/2019/02/21/facebook-removes-onavo/


> Onavo [...] would collect the “Time you spend using apps, mobile and Wi-Fi data you use per app, the websites you visit, and your country, device and network type.”

That's the former type of collection I was talking about. There's no evidence I can find that they installed a root CA certificate and were MITM'ing connections. That's a major accusation and one that is not accurate as far as I can tell.

Apple banned the app because it was inspecting underlying traffic not installing a fake root certificate: https://techcrunch.com/2019/01/30/apple-bans-facebook-vpn/


You are quoting what Facebook claimed the app did.

The language in the lawsuit complaint is explicit that FB installed a root cert to MITM and decrypt traffic:

https://news.ycombinator.com/item?id=39835115


Thanks, that's crystal clear that they were indeed doing this. Wow.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: