Hacker Newsnew | past | comments | ask | show | jobs | submit | sgjohnson's commentslogin

> I think USB 4 is finally going to the right direction.

USB 4 is actually going into an even worse direction. USB 4 = Thunderbolt 4, except everything is optional. e.g. USB 4 might not even support DP Alt mode. Thunderbolt 4 always will.


Even backwards compatibility is optional in USB4. There are USB4 devices (SSDs at least) that will not function when connected to USB 3 ports.

That’s not backwards compatibility

> and power of up to 240 watt

Except active optical cables. None exist yet that I'm aware of though.


I'd guess that most people who use optical Thunderbolt cables are aware that they do not carry power.

It was just unjustifiably popular.


Of course it’s an iPhone chip, which is why it’s got just 8 gigs of RAM. I think it’s the same exact SoC that went into the 16 Pro Max.


There were some M-series chips with 8 gigs, iirc. There was a whole debate going on about that on the net when they were released. Not the M5 though, as it seems.


I think the M2 was the last one they made with 8 gigs of memory.


It's M3.


This suggests someone may be able to install MacOS on an iPhone with some modification.


It's not the first Mac that has an iPhone/iPad chip. https://en.wikipedia.org/wiki/Developer_Transition_Kit

And yes, absolutely. All you need is a bootchain exploit. However unlike in the old jailbreaking days when people found and publicized them for fun, these days they are worth millions. Apple will pay you $500k for sandbox escape into the kernel. If you nail the bootchain, it'll be in the millions. From Apple. And god knows how much such a thing would go for in the black market.


If so, it's a binned version with fewer working cores.


> The Apple on the lid isn’t shiny

That’s been the case for 5+ years :)


I think they mean not reflective like current models, not that it isn't illuminated like the MacBooks of yore


I'm trying to figure out what it is. Is it matte, but just a different matte from the rest of the case? I kind of want to see it in person. It looks very tasteful.


I thought they changed from glowing Apple to reflective Apple


It’s not how any of it works.

How do you determine to whom an IP is even registered to? They get sub-leased all the time.

The best you can do is check who has administrative control over the prefixes RIR info, but that doesn’t mean that anyone with control is the factual user of the IPs.

You could check the IRR for the ASN and base it on that, but still.

There's also no way to actually know _where_ an IP actually originates from. Only its AS path.

The DFZ contains all prefixes announced everywhere, for the internet is completely decentralized.


> How do you determine to whom an IP is even registered to?

You check the RIR's records.

> They get sub-leased all the time.

With records updated. If not, any consequences from wrong information fall on the lessor and lessee.

> There's also no way to actually know _where_ an IP actually originates from. Only its AS path.

Ping time from different locations on their upstream AS gives a good guess.


> With records updated. If not, any consequences from wrong information fall on the lessor and lessee.

Not always + there are no consequences whatsoever.

Plenty of leasing services will just provide you with IRR & RPKI, without ever touching the actual records.

> Ping time from different locations on their upstream AS gives a good guess.

Upstream AS is meaningless if it's a T1 carrier. Ping AS6939. They are everywhere.


Ping a specific address of AS6939 and find out where it is.


ns1.he.net - 216.218.130.2, is simultaneously in

Texas (measured from Texas):

  8  port-channel13.core4.dal1.he.net (184.104.196.170)  1.830 ms  1.969 ms *
  9  ns1.he.net (216.218.130.2)  1.539 ms  1.560 ms  1.555 ms
Virginia (measured from Maryland):

  11  port-channel2.core1.ash1.he.net (184.105.222.174)  19.666 ms 24.395 ms *
  12  ns1.he.net (216.218.130.2)  16.748 ms  17.268 ms  20.507 ms
And California (measured from California):

  8  port-channel13.core1.fmt2.he.net (184.104.188.144)  3.830 ms be7.core1.sjc1.he.net (72.52.92.132)  5.197 ms port-channel13.core1.fmt2.he.net (184.104.188.144)  3.901 ms
  9  ns1.he.net (216.218.130.2)  2.600 ms  2.435 ms  2.728 ms
The speed of light doesn't lie, IP addresses don't have any sort of physicality.


https://bgp.tools/as/6939#prefixes

They are everywhere. It's a global carrier. Carriers also know no geographic boundaries.


> we don't want IP's from Frankfurt showing up somewhere in Dubai

what do you mean, IPs from Frankfurt?

IP addresses are just IP addresses, they know no geographical boundaries. In RIR DBs you can geolocate them to wherever you want. Which is the entire reason why Geo IP DBs even exist - they triangulate.


They probably did, and just determined that it would be fun.

The other week I had a fun project to implement IPv6 support in TempleOS. I did stop to think whether I should, and determined that absolutely not.

I asked Claude to start planning on doing it. It started referencing ZealOS, which is a fork of TempleOS and already has a functioning TCP stack.

That's when I determined that it would no longer even be fun, because someone else had already done all the heavy lifting, and gave up.


wasn't a lack of networking what made it a temple, untouched by the influences of the corrupt internet or something like that? idk I'm not like a Terry Davis scholar by any means but I always figured he did that limitation with some kind of reason in mind


Me and some friends of mine thought it would simply be funny if we gave the temple just IPv6 (no v4) support.


Absolutely everyone should be allowed to access AI models without any restraints/safety mitigations.

What line are we talking about?


> Absolutely everyone should be allowed to access AI models without any restraints/safety mitigations.

You recon?

Ok, so now every random lone wolf attacker can ask for help with designing and performing whatever attack with whatever DIY weapon system the AI is competent to help with.

Right now, what keeps us safe from serious threats is limited competence of both humans and AI, including for removing alignment from open models, plus any safeties in specifically ChatGPT models and how ChatGPT is synonymous with LLMs for 90% of the population.


from what i've been told, security through obscurity is no security at all.


> security through obscurity is no security at all.

Used to be true, when facing any competent attacker.

When the attacker needs an AI in order to gain the competence to unlock an AI that would help it unlock itself?

I would't say it's definitely a different case, but it certainly seems like it should be a different case.


it is some form of deterrence, but it's not security you can rely on


Yes IMO the talk of safety and alignment has nothing at all to do with what is ethical for a computer program to produce as its output, and everything to do with what service a corporation is willing to provide. Anthropic doesn’t want the smoke from providing DoD with a model aligned to DoD reasoning.


the line of ego, where seeing less "deserving" people (say ones controlling Russian bots to push quality propaganda on big scale or scam groups using AI to call and scam people w/o personnel being the limiting factor on how many calls you can make) makes you feel like it's unfair for them to posses same technology for bad things giving them "edge" in their en-devours.


What about people who want help building a bio weapon?


The cat is out of the bag and there’s no defense against that.

There are several open source models with no built in (or trivial to ecape) safeguards. Of course they can afford that because they are non-commercial.

Anthorpic can’t afford a headline like “Claude helped a terrorist build a bomb”.

And this whataboutism is completely meaningless. See: P. A. Luty’s Expedient Homemade Firearms (https://en.wikipedia.org/wiki/Philip_Luty), or FGC-9 when 3D printing.

It’s trivial to build guns or bombs, and there’s a strong inverse correlation between people wanting to cause mass harm and those willing to learn how to do so.

I’m certain that _everyone_ looking for AI assistance even with your example would be learning about it for academic reasons, sheer curiosity, or would kill themselves in the process.

“What saveguards should LLMs have” is the wrong question. “When aren’t they going to have any?” is an inevitability. Perhaps not in widespread commercial products, but definitely widely-accessible ones.


> There are several open source models with no built in (or trivial to ecape) safeguards.

You are underestimating this. It's almost trivial to remove the safeguards for any open-weight model currently available. I myself (a random nobody) did it a few weeks ago on a recently released model as a weekend side-project. And the tools/techniques to do this are only getting better and easier to use!


What about libraries and universities that do a much better job than a chatbot at teaching chemistry and biology?


Sounds like you're betting everyone's future on that remaing true, and not flipping.

Perhaps it won't flip. Perhaps LLMs will always be worse at this than humans. Perhaps all that code I just got was secretly outsourced to a secret cabal in India who can type faster than I can read.

I would prefer not to make the bet that universities continue to be better at solving problems than LLMs. And not just LLMs: AI have been busy finding new dangerous chemicals since before most people had heard of LLMs.


chances of them surviving the process is zero, same with explosives. If you have to ask you are most likely to kill yourself in the process or achieve something harmless.

Think of it that way. The hard part for nuclear device is enriching thr uranium. If you have it a chimp could build the bomb.


I’d argue that with explosives it’s significantly above zero.

But with bioweapons, yeah, that should be a solid zero. The ones actually doing it off an AI prompt aren't going to have access to a BSL-3 lab (or more importantly, probably know nothing about cross-contamination), and just about everyone who has access to a BSL-3 lab, should already have all the theoretical knowledge they would need for it.


iCloud, iPad, iPhone, iMac, iMessage, iOS/iPadOS, iMovie?

Granted, they are slowly but surely killing it, but it’s still going quite strong.


It's not used in new products.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: