Hacker Newsnew | past | comments | ask | show | jobs | submit | jasonjayr's commentslogin

I'm curious about challenges (what's bad with AM broadcast in an unmanned tunnel?) and why the formally verified killswitch was necessary?

[flagged]


I did a more aggressive internet search. This seems not possible given physics, as well as not documented (at least in the US) in the CDC Mine Accidents Database [0], which has been recording mine accidents since before the discovery + invention of AM radio.

Edit: The physics

- (lambda) = c / 1,620,000 Hz = 185 m :: 1.62 MHz is what I derived as a near max possible accidental frequency able to be produced by AM equipment

- 185 m / 2 = 92.6 m :: this is half a wave length

In order to resonate (let alone have enough power to "cook", which I didn't even look at because the wave can't even resonate), a tunnel must be at 92.6 m (fundamental) or 185 m wide or tall (2nd harmonic). Most tunnels are ~5m/3m wide/tall at most.

Dusted off my physics from my minor in college so someone feel free to correct me.

[0]: https://wwwn.cdc.gov/NIOSH-Mining/MMWC/MineDisasters/Table


And it would need to resonate magnetically.

Bollocks the wavelengths are on the order of hundreds of meters, there is no way you get microwave like heating out of that. Even at 30 MHz you're still looking at 10 meters wavelength, 3 meters at 100 MHz.

This system operates according to TFA up to the end of the AM band at roughly 1600 KHz, so 180 meters and change.

The danger is more likely there because someone might enter the tunnel and hit the feeder, which depending on the design can carry considerable power.


Fascinating. Any references? A cursory web search reveals nothing.

This is basically hilarious. Leaky Feeders are a few watts. and even a high powered multi-kW AM radio with 200m wavelength wouldn't resonate much in a rough walled tunnel multiple sq meters in cross section. It's both too large for there to be significant power density, and much less than a wavelength in diameter except in length where the tunnel passively attenuates the signal.

Fascinatingly false.

That is hilarious. You win the Internet for February 18, 2006.

A lot of schools use apps like 'ParentSquare' to interact and manage the student/teacher/parent relationship, and do not offer the same level of communication through traditional channels anymore.

I wonder if there would be standing to sue, since public schools are an agent of the government and sending your kids to school is mandatory. Lawsuits are the usual way these types of shenanigans get sorted. Can the government really force you into contracts with private parties?

This is because social media has trained today's young parents to be completely entitled assholes and teachers can only take so much of their abuse. What teacher is going to want to sit down for a conference with a parent who whips out a phone to record the meeting and then posts selectively edited excerpts online in order to get a few upvotes on a social platform.

And these apps require a google account?

They require a phone that can log into an App store, so unless parents can work around that, then yes?

Nonsense. My kid just started kindergarten this past year - I've never been required to log into ParentSquare through a GMail address and I have only ever accessed it through a browser on a laptop.

(Damn, I failed at my attempt to stop posting.)


The web is no better than phone apps when it comes to data gathering. Maybe the data is a little fuzzier, but you can be assured it's being gathered all the same as it is in phone apps.

Yes it is.

It is not perfect but you have much more control on which domain you connect to and/or which js you execute.


This reminds me of the 'spacebar heating' xkcd: https://xkcd.com/1172/

The folks at adafruit probably do know, but it does make sense if you expand the words: "Control, Alter, and Delete"


That's more charitable. Alt is still short for Alternate though, not Alter.


I thought "Alt" in the title is meant in the sense of "stop", as in "halt", but on second thoughts maybe that only works in French (where h is always silent)?


It's clearly meant to be part of the Ctrl-Alt-Del key sequence that interrupts Windows computers to bring up the task manager.


But doesn't Ctrl+Alt+Del bring up the screen to switch users or sign out? "Task Manager" is one item in the list of options you get, but it's not the main one or anything, in fact it's the last:

https://www.lifewire.com/thmb/hzx6btMYEqZJfSAL3WVxXuW3-jw=/1...


The author may just be showing their age a bit. That's what Ctrl+Alt+Del does on modern versions of Windows, but from Windows 95 to Windows XP (inclusive) it directly launched the Task Manager.


Ctrl+Alt+Del on an IBM PC or a compatible clone reboots the machine no questions asked. There's a dedicated reset button in case that fails.

Doing anything other than a reboot started with protected mode MS-Windows 3.1 IIRC (then marketed as "386 enhanced mode").


Yeah; in Windows 3.1, Ctrl+Alt+Del took you to a blue screen that allowed you to kill an unresponsive task (but didn't display a list of tasks; the Task List was launched with Ctrl+Esc), or told you there was no such task to kill if there wasn't.

Before Windows 3.1 it just rebooted the machine as you described.

Launching Task Manager was the 95 to XP behaviour, but NT behaved differently -- even Windows NT 4.0 (developed alongside Windows 95) took you to the security screen with Ctrl+Alt+Del (something that would later be ported to Vista), where launching Task Manager was one of its options. These OSes weren't used residentially though, until Windows 2000 attempted to merge their lineages and Windows XP finally cemented the deal.


Would have made more sense to say Ctrl+Shift+Esc since that just directly brings up the task manager. All in all I would say it is a slightly weird title, but I assume enough people get what they want to say with it.


Yes, but I thought they were making a colourful pune or play on words.


I mean, technically it’s short for alter on the way to being short for alternate


That's bullshit (IMO) and the post author (Phillip Torrone - I believe that's one of the owners of Adafruit) is obviously ignorant in this regard.

That said, what he's actually talking about in the post makes a lot of sense. That is the important part.


It turns out those shopping car wheel locks use the same kind of low-frequency RF that can leak from your phone speaker. Someone made an app that allows you to lock or unlock certain shopping carts.


FWIW; Every Lenovo I've used in recent history had a setting in the BIOS to remap Fn/Ctrl.

On my assigned machine, I have it swapped so Ctrl is in the lower left spot because otherwise I'd lose my mind trying to figure it out between all the machines I swap through. (Emacs users will have to use something else to put Ctrl where they want ....)


I giggle every time I stumble upon a Windows 3.1 file-selector dialog still in Windows 11.


Ebay works like this too. But because sniping is still permitted, I like to bid 'uncommon' amounts, like $3.17, so if someone else tried to bid a max of $3.00 even at the last moment, the bid for the few cents more wins.


  commit ecfd9009-5bae4398b13645e14ec4ce25 (HEAD -> deal-with-snipers)
  Author: sunrunner
  Date:   Thu Jan 22 13:57:34 2026 +0000

      Update BidBot default bid cents amount to be 18 (was 16), to deal with pesky sniping strategies discovered on HN.


We ended up here because certain people realised that there is oppertunity in exploiting the window of time between "I trust that you are selling this in good faith" and "This is a scam and I will drag your name, and any of your associates in mud". The internet enabled people to just 'make up names', and keep exploiting this.

So rather than investing time and effort into investigating, we just built faceless tools to punish anything that looks even remotely suspicious, and ignore any appeals, and if a few (or a lot) of folks just trying to make an honest living get caught up, then oh well.

Even if you try selling direct, your payment processor takes on this role, with varying degrees of trigger-sensitivity.


> Even if you try selling direct, your payment processor takes on this role, with varying degrees of trigger-sensitivity.

I agree but I hate payment processors sometimes as well and they feel very rent seeking in nature (akin to amazon) to me as well, I definitely wonder if stablecoins with good on/offramps or proper VISA support might actually help the end citizen but I am a bit worried because Stablecoin's on crypto and most crypto's really scummy so I also don't want to give things like this way too much attention.

Time will tell perhaps


It's not that simple, and it touches on a bunch of things that are at a nexus right now, that may end the anonymous internet.

(a) an identity provider needs to verify who is using the browser. If that can be strongly tied, then the identify provider could simply provide the "adult: yes" flag, on a need to know basis, but:

(b) the site consuming that header needs to trust that it came from a reliable source. So that flag needs to be signed/verified somehow, and the consuming site needs to trust that the identity provider doesn't lie. But also, the site consuming the header, by law, needs to do everything in can to ensure that it's not a child, so, it will need to ensure that the content is served ONLY to the web browser, and it trusts the web browser. Which means ....

(c) The browser will confirm to the site that it's real, it's trusted, it is not operated by some kind of relay/bot and won't send the content to anything other than the operator authenticated to the browser. So it's going to start signing it's requests with a secret key, but that key will need to be on the user's machine, which will need to be trusted, so ....

(d) the signing will have to happen in the secure element, and the key will have to be stored on the machine that the operator cannot access. So some kind of TPM/Measured computing will have to be in place so all parties can trust that nothing was tampered with, or relayed to something else that was not authenticated.

All these things exist today. So the simple law mandating "A site has to ensure that sensitive content is never served to a minor using the strongest technical means available" means anonymous access, untrusted computers on the network will no longer be allowed to work.


So don't pass a law that says that? This is letting the perfect get in the way of the barely adequate.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: