Hacker Newsnew | past | comments | ask | show | jobs | submit | sciencejerk's commentslogin


The decline of intellectually stimulating work is nothing to celebrate, nor is a sort of machine-driven natural selection

Did you not read the linked blog post? Author admits that Claude did a good job

Maybe adapt and still die anyway?

The most pathetic of deaths as well.

“He automated his job so well the company doesn’t need him anymore.”


I'm a solo entrepreneur. If the company does well, I do well.

How did you make the transition to working for yourself? Genuinely curious

I couldn't tell you since I started my company when I was 18. I'm 42 now and never worked for a boss.

Large scale AI datacenters require a very expensive physical supply chain that includes cheap land, water, and electricity, political leverage, human architects and builders to build datacenters, and massive capital investments. Yes, AI will outperform humans, but at some point it may become cheaper to hire a human programmer.

Wait till you hear about the resources required to sustain an equivalent number of humans.

I think that they mean that "routine" work like AI agent prompting and config is repetitive, predictable and somewhat thoughtless work. Human employees that perform repetitive, predictable, thoughtless work are easy to replace with AI


Yes. Visitors to the site are vulnerable to Man in the Middle (MitM) attacks, IF they click past the warning (which many people do)


That’s not true. The encryption still works as well as it did 3 days ago, and doesn’t care if the certificate is expired.


I think the argument would go that if people are clicking through certificate errors and you're in a position to MITM their traffic, you can just serve them a different certificate and they'll click through the error without noticing or understanding the specifics.


IMHO host mismatch is more serious than expired cert and browsers should treat it as such


That could happen either way regardless of expiry. The only reason for an expiration date is to force site owners to cycle their certs at regular intervals to defeat the long time it takes to brute force a successful forgery.


Fair point, but I think the situation is a bit more complicated when a user "needs the site for work", or something urgent. You might have smart cautious users that feel like they have no choice but to proceed and click through the warnings since the site is most likely still legitimate


It's true that the expiration doesn't mean the encryption no longer works, but if the user is under a MITM attack and is presented by their browser with a warning that the certificate is invalid, then the encryption will still work but the encrypted communication will be happening with the wrong party.

I don't trust the average user to inspect the certificate and understand the reason for the browser's rejection.


Okay, but that’s not what was being asked. OP, someone who presumably understands the difference between a totally invalid cert and an expired one, was asking specifically whether clicking through the latter is dangerous.


"Visitors to the site are vulnerable to Man in the Middle (MitM) attacks, IF they click past the warning". I think it's true when there is a man in the middle.


Based on history of this type of attack, it can also be true with a valid certificate ;)


It's entirely the second paragraph and not part of certificate expiration, in and of itself, lends to being MITM. Firefox tells me what the problem is, expired, wrong name, etc. So, it's not just saying "oh no, something is wrong." I can tell what is wrong before I choose to proceed.


This is an infohazard. True information that can cause harm or enable some agent to cause harm.

Telling people not to worry about expired cert warnings makes them vulnerable to a variety of attacks.


I think they mean that a non-observant visitor cannot tell the difference between both situations


If you're ignoring certificate warnings, then you'll ignore mismatching domain warnings.

More over, if your org's browser setting allow you to override the warnings, thast also pretty bad for anything other than a small subset of your team.


That's not what man in the middle attacks are about.. it's not about the encryption, it's about verifying that you really know who you're talking to.


An expired certificate alone doesn't enable a MITM attack.


I think the HN crowd is full of outliers. You folks are unrestricted internet success stories. Congrats! For every one of you there has to be 100 or 1000 gaming and social media addicts.


HN crowd grew up when they was no social media and when gaming patterns were not ultra-addictive.


Interesting perspective; medical regulation as a business moat


That's why medical licensing was introduced.


Only 21 artists??


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: