Hacker Newsnew | past | comments | ask | show | jobs | submit | kimos's commentslogin

My kids are still young, but I’m going try very hard to be a father like this. Especially if it’s about things I don’t relate to or understand.

Canada is also experiencing record travel from domestic travellers, so I don’t think that’s the case no.

https://www.cbc.ca/news/canada/calgary/bakx-tourism-travel-d...


I would think that would be an indicator of economic issues; it's usually cheaper to stay in your own country vs traveling abroad. Especially vs. the US Dollar, although it's got better the last couple of months.

This may apply in the US but not everywhere. In Canada it is illegal to expire and take back money on gift cards.

So they can keep collecting interest on it forever, but they have to keep the balance for you indefinitely.


The U.S. as well.

By law, gift cards never expire.

Unfortunately, I have several gift cards I didn't use before the store expired.


I’ve seen gift cards work around this by charging a “monthly maintenance fee” after a year of inactivity.


You’re describing changing the base assumption for software reachable on the internet. “Assume all possible unauthenticated urls will be hit basically constantly”. Bots used to exist but they were rare traffic spikes that would usually behave well and could mostly be ignored. No longer.


If it’s legit you can ask your ISP if they sell use of your hardware. Or just don’t use the provided hardware and instead BYO router or modem or media converter or whatever.

But I think what OP is implying is insecure hardware being infected by malware and access to that hardware sold as a service to disreputable actors. For that buy a good quality router and keep it up to date.


So you don't know? Why respond?


Don't be rude.


But now you can use it again!


My favourite starter word has come and gone. So I’m in the opposite situation where I feel relieved to be able to go back to using it.


> it’s only true use is to anonymize payments

The irony of this is that since every transaction and all its metadata is on chain, it has turned out to be easily traced back to the beginning of time. Fully open, the opposite of anonymized. (see: Chainalysis et. al.)


Malicious compliance.


This works on any iPhone? It mounts the non-privileged DCIM folder or whatever over USB to somewhere on your filesystem? With write access?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: