Hacker News new | past | comments | ask | show | jobs | submit | jcranmer's comments login

> What's the history of human timekeeping? Particularly before the Gregorian calendar, what historical records do we have for who was tracking/tallying the days elapsed over time? How did people coordinate on the current date globally (if at all)? How did local mean time (LMT) work in the past?

Ooh, this is a really interesting topic!

Okay, so the first thing to keep in mind is that there are three very important cyclical processes that play a fundamental role in human timekeeping and have done so since well before anything we could detect archaeologically: the daily solar cycle, the lunar cycle (whence the month), and the solar year. All of these are measurable with mark 1 human eyeballs and nothing more technologically advanced than a marking stick.

For most of human history, the fundamental unit of time from which all other time units are defined is the day. Even in the SI system, a second wasn't redefined to something more fundamental than the Earth's kinematics until about 60 years ago. For several cultures, the daylight and the nighttime hours are subdivided into a fixed number of periods, which means that the length of the local equivalent of 'hour' varied depending on the day of the year.

Now calendars specifically refer to the systems for counting multiple days, and they break down into three main categories: lunar calendars, which look only at the lunar cycle and don't care about aligning with the solar year; lunisolar calendars, which insert leap months to keep the lunar cycle vaguely aligned with the solar year (since a year is about 12.5 lunations long); and solar calendars, which don't try to align the lunations (although you usually still end up with something akin to the approximate length of a lunation as subdivisions). Most calendars are actually lunisolar calendars, probably because lunations are relatively easy to calibrate (when you can go outside and see the first hint of a new moon, you start the new month) but one of the purposes of the calendar is to also keep track of seasons for planting, so some degree of solar alignment is necessary.

If you're following the history of the Western calendrical tradition, the antecedent of the Gregorian calendar is the Julian calendar, which was promulgated by Julius Caesar as an adaptation of the Egyptian solar calendar for the Romans, after a series of civil wars caused the officials to neglect the addition of requisite leap months. In a hilarious historical example of fencepost errors, the number of years between leap years was confused and his successor Augustus had to actually fix the calendar to have a leap year every 4th year instead of every third year, but small details. I should also point out that, while the Julian calendar found wide purchase in Christendom, that didn't mean that it was handled consistently: the day the year started varied from country to country, with some countries preferring Christmas as New Years' Day and others preferring as late as Easter itself, which isn't a fixed day every year. The standardization of January 1 as New Years' Day isn't really universal until countries start adopting the Gregorian calendar (the transition between Julian and Gregorian calendar is not smooth at all).

Counting years is even more diverse and, quite frankly, annoying. The most common year-numbering scheme is a regnal numbering: it's the 10th year of King Such-and-Such's reign. Putting together an absolute chronology in such a situation requires accurate lists of kings and such that is often lacking; there's essentially perennial conflicts in Ancient Near East studies over how to map those dates to ones we'd be more comfortable with. If you think that's too orderly, you could just name years after significant events (this is essentially how Winter Counts work in Native American cultures); the Roman consular system works on that basis. If you're lucky, sometimes people also had an absolute epoch-based year number, like modern people largely agree that it's the year 2025 (or Romans using 'AUC', dating the mythical founding of Rome), but this tends not to be the dominant mode of year numbering for most of recorded human history.


The success of Linux over BSD has more to do with a lawsuit in the early 90's over whether or BSD infringed on Unix's source code, which made Linux the only viable open source Unix-like operating systems if you had to ask a legal department the question.

Look beyond the OS, and much of the tech stack is dominated by non-copyleft open source projects. Both the major web servers--Apache and nginx--are permissively licensed, for example. Your SSL stacks are largely permissively licensed; indeed, most protocol servers seem to me to largely be permissively licensed rather than copyleft.

And I should also point out a clear example where copyleft has hobbled an ecosystem: Clang and LLVM have ignited a major compiler-based ecosystem of ancillary tools for development such as language servers. The gcc response to this is... to basically do nothing, because tight integration of the compiler into other components might allow workarounds that release the precious goodness of gcc to proprietary software, and Stallman has resisted letting emacs join in this revolution because he doesn't want a dependency on non-copyleft software. An extra cruel irony is that Clang appears to be an existential threat to the proprietary EDG compiler toolchain, which would mean it took a permissive license to do what the goal of the copyleft license was in the first place: kill proprietary software.


The Economist has long been pretty outspoken over their preference for a carbon tax over cap-and-trade (see any article they write about carbon emissions).

The biggest improvement are for the very poor, who rely more heavily than other socioeconomic classes on bus transportation, which has seen the greatest efficiency improvements from congestion pricing. The merely poor or middle class, in NYC, are already reliant on mass transit (although more likely the subway rather than the bus system), which sees somewhat more indirect benefits from increased funding as a result of the congestion charge.

The people whom congestion pricing hurts the most are those who feel that public transit is beneath them but still rely on driving in Manhattan to a degree that the congestion charge is a significant tax. Which unfortunately seems to include most of the media class in NYC, hence the incessant whining about it.


With this new moneys coming in they will not even fix one of these 50-year old subway switches. Nevermind buying some new subway cars, or improving ventilation / air conditioning during summer. This new moneys will go to waste. Meanwhile, yeah, rich investment bankers get to spend less time in traffic.

> With this new moneys coming in they will not even fix one of these 50-year old subway switches. Nevermind buying some new subway cars...

https://www.nytimes.com/2025/04/29/nyregion/mta-budget.html

"The M.T.A. expects to spend $10.9 billion to buy roughly 2,000 new rail cars, an order that will include 1,500 subway cars and more than 500 for the Metro-North and Long Island Rail Road. Some of the train fleet has not been updated since at least 1980, the year of the M.T.A.’s first capital plan. Another $3.3 billion will buy and support 2,261 new buses."

"The plan includes $5.4 billion to modernize the subway signal system, which dates back to the Great Depression. Over the past 15 months, the antiquated system has led to an average of nearly 4,000 train delays a month, according to the M.T.A."


Ask people how many different vowels there are in this set of words: trap, bath, palm, lot, cloth, thought. Most English speakers will make out two-four vowels from those 6 words. But they won't agree on which words share the same vowels.

There are other phonological differences between English dialects, but for the most part you can notate them as sounds that merely some dialects don't distinguish (e.g., nonrhotic dialects dropping the `r' sound).


I'm sorry, this is just such an incredibly fine-tuned threat model for me to take it seriously.

You start with a BGP hijack, which lets you impersonate anybody, but assume that the hijacker is only so powerful as being able to impersonate a specific DNS server and not the server that the DNS server tells you about. You then use that specific control to get a CA to forge a certificate for you (and if the CA is capable of using any information to detect that this might be a forgery, the attack breaks).

And of course, the proposed solution doesn't do anything to protect against other kinds of DNS hijacking--impersonating somebody to the nameserver and getting the account switched over to them.


> I'm sorry, this is just such an incredibly fine-tuned threat model for me to take it seriously.

You claim it is fine-tuned, but it has happened in the real world. It is actually even better for attackers that it is "obscure", because that means it is harder to detect.

> but assume that the hijacker is only so powerful as being able to impersonate a specific DNS server and not the server that the DNS server tells you about.

Yes, all layers of the stack need to be secure. I am not making assumptions about the other layers - this thread is about DNS.

> if the CA is capable of using any information to detect that this might be a forgery

They are not. The only mitigation is "multi-perspective validation", which only addresses a subset of this attack.

> And of course, the proposed solution doesn't do anything to protect against other kinds of DNS hijacking

Yes, because other kinds of DNS hijacking are solved by HTTPS TLS. If TLS and CAs are broken, nothing is secure.


> You claim it is fine-tuned, but it has happened in the real world.

Sure, but it seems like his comment is still responsive; if DNSSEC is deployed, they perform a BGP hijack & can impersonate everyone, and they just impersonate the server after the DNS step?

If that's the threat model you want to mitigate, it seems like DNSSEC won't address it.


> and they just impersonate the server after the DNS step?

Yes, there are different mitigations to prevent BGP hijacking the webserver itself. Preventing a rogue TLS certificate from being issued is the most important factor. CAA DNS records can help a bit with this. DNS itself however is easiest solved by DNSSEC.

There are a lot of mitigations to prevent BGP hijacks that I won't get too much into. None are 100%, but they are good enough to ensure multi-perspective validation refuses to issue a TLS certificate. The problem is that if those same mitigations are not deployed on your DNS servers (or you outsource DNS and they have not deployed these mitigations) it is a weak link.


I don't see you responding to the question. You're fixating on protections for DNS servers, because that is the only circumstance in which DNSSEC could matter for these threat actors, not because they can't target the address space of the TLS servers themselves (they can), but because if you concede that they can do this, DNSSEC doesn't do anything anymore; attackers will just leave DNS records intact, and intercept the "authentic" server IPs.

So far your response to this has been "attackers can't do this to Cloudflare". I mean, stipulated? Good note? Now, can you draw the rest of the owl?


I am focusing on DNS because this thread is about DNSSEC. The topic of doing it in to the TLS servers themselves is a tangent not relevant to this thread.

No, I'm sorry, that's not the case. You're focusing on DNS servers as the target for BGP4 attacks because if you didn't, you wouldn't have a rebuttal for the very obvious question of "why wouldn't BGP4 attackers just use BGP4 to intercept legitimate ALPN challenges".

The thread is right here for everyone to read.


Yes, DNSSEC is designed to prevent DNS MITM via integrity. BGP hijacks lead to MITM. I am not sure where the confusion is.

The weird thing you're doing where you pretend attackers won't just target ALPN challenges with BGP4?

DANE.

> You start with a BGP hijack, which lets you impersonate anybody, but assume that the hijacker is only so powerful as being able to impersonate a specific DNS server and not the server that the DNS server tells you about.

An attacker impersonating a DNS server still won't be able to forge the DNSSEC signatures.


No, they can't. Why would they bother? They'll just impersonate the IP the CA uses for the ALPN challenge.

Well, this won't work with DNSSEC. It's a good argument for it.

An attack against BGP where the attacker takes over traffic for an IP address isn't at all prevented by DNSSEC.

The sequence there is:

1. I hijack traffic destined for an IP address

2. Anything whose DNS resolves to that IP, regardless of whether or not they use DNSSEC, starts coming to me

In this model, I don't bother trying to hijack the IP of a DNS server: that's a pain because with multi-perspective validation, I plausibly have to hijack a bunch of different IPs in a bunch of different spots. So instead I just hijack the IP of the service I want to get a malicious cert for, and serve up responses to let me pass the ALPN ACME challenge.


Sure. But you won't have a TLS certificate for that address, if the host uses a DNS-based ACME challenge and prohibits the plain HTTP challenge: https://letsencrypt.org/docs/caa/

So DNSSEC still offers protection here.


Ok, so deploying DNSSEC would specifically solve the threat model of an attacker who can perform a BGP hijack of IP addresses, but doesn’t want to hijack multiple DNS server IPs because that’s more work, for a domain that has CAA records and disallows validation by ALPN.

That feels like a pretty narrow gain to justify strapping all this to all my zones and eating the operational cost and risk that if I mess it up, my site stops existing for a while


> but doesn’t want to hijack multiple DNS server IPs because that’s more work

No. I'm saying that you can _not_ hijack a DNSSEC-enabled DNS name, even if you have a full control over the network.

The DNSSEC public keys for the domain are stored in the top-level domain zone. Which in turn is protected by a signature with the key from the root zone.


I don’t think you’re grokking what a BGP hijack looks like. The attacker steals traffic destined to an IP address at the routing layer. They aren’t hijacking a name, they’re hijacking traffic to the IP that name resolves to.

In the case of attacking the ALPN ACME validation, they hijack the IP address of the site they want a TLS certificate for: example.org resolves to 1.2.3.4, I hijack traffic to 1.2.3.4, the DNS flow is unchanged, the verification traffic comes to me, and I get a certificate for example.org

The DNS server hijack works the same way: I don’t try to change what ns1.example.org resolves to. I hijack traffic to the real IP that it resolves to and serve up responses for the site I want to hijack saying “yea, these are the records you want and don’t worry, the DS bit is set to true”.

Though it’s worth remembering that both DNS and BGP attacks are basically a rounding error compared to the instances of ATO-based attacks


I know exactly how BGP works, I actually implemented a BGP reflector long time ago. My home has two DIA circuits and my home network is announced via BGP.

> In the case of attacking the ALPN ACME validation, they hijack the IP address of the site they want a TLS certificate for: example.org resolves to 1.2.3.4, I hijack traffic to 1.2.3.4, the DNS flow is unchanged, the verification traffic comes to me, and I get a certificate for example.org

As I said, a CAA record in DNS will prohibit this, instructing the ACME CA to use the DNS challenge.

> I hijack traffic to the real IP that it resolves to and serve up responses for the site I want to hijack saying “yea, these are the records you want and don’t worry, the DS bit is set to true”.

And then your faked DNS replies will have a wrong signature because you don't have the private key for the DNS zone.

And DNSSEC-validating clients will detect this because the top-level domain will have a DNSKEY entry for the hijacked domain. You can't fake the replies from the top-level domain DNS because it in turn will have a DNSKEY entry in the root zone.


It's not just some weak relation.

The Behind the Bastards podcast works by having the podcaster invite a guest on the show and tell the story of an individual (or movement, like the Zizians) to provide a live reaction. And in the discussion about the Zizians, the light-bulb moment for the guest, the point where they made the connection "oh, now I can see how this story is going to end up with dead people," happens well before Ziz breaks with the Rationalists.

She ultimately breaks with the Rationalists because they don't view animal welfare as important as a priority as she does. But it's from the Rationalists that she picks up on the notion that some people are net negatives to society... and that if you're a net negative to society, then perhaps you're better off dead. It's not that far a leap to go from there to "it's okay for me to kill people if they are a net negative to society [i.e., they disagree with me]."


> But it's from the Rationalists that she picks up on the notion that some people are net negatives to society

That belief has nothing to do specifically with rationalism. (In fact, I think most people believe that some people are net negative for society [otherwise, why prisons?], but there is no indication that this belief would be more prevalent for rationalists.)


The podcast Behind the Bastards described Rationalism not as a cult but as the fertile soil which is perfect for growing cults, leading to the development of cults like the Zizians (who both the Rationalists and Zizians are at pains to emphasize their mutual hostility to one another, but if you're not part of either movement, it's pretty clear how Rationalism can lead to something like the Zizians).

I don't think that podcast has very in-depth observations. It's just another iteration of east coast culture media people who used to be on Twitter a lot, isn't it?

> the fertile soil which is perfect for growing cults

This is true but it's not rationalism, it's just that they're from Berkeley. As far as I can tell if you live in Berkeley you just end up joining a cult.


I lived in Berkeley for a decade and there weren't many people I would say were in a cult. It's actually quite the opposite. There's way more willingness to be weird and do your own thing there.

Most of the rationalists I met in the Bay Area moved there specifically to be closer to the community.


> it's strange and disappointing that in the vast space and history of FOSS tools, a proper open source browser never took off.

What makes you disqualify Firefox from being a "proper open source browser"?


> What makes you disqualify Firefox from being a "proper open source browser"?

- June 2024. Mozilla acquires Anonym, an ad metrics firm.

- July 2024. Mozilla adds Privacy-Preserving Attribution (PPA), feature is enabled by default. Developed in cooperation with Meta (Facebook).

- Feb 2025. Mozilla updates its Privacy FAQ and TOS. "does not sell data about you." becomes "... in the way that most people think about it".


Yes "PPA" is absolutely shady, it is a browser cooperating with ad companies behind user's back. I do not understand why I need this on my computer.

FOSS is a flexible term but carries the connotation of community ownership, and therefore independence from for-profit interests. That was an original selling point of FF, and to this day the user base is mainly comprised of individuals (who were at one point or another) seeking free and open alternatives. Sadly Mozilla as an organization has made increasingly user hostile decisions (deals with Google, recent changes in privacy policy, some telemetry on by default) and FF no longer lives up to the original promise. But yes, thanks to the code being open source there are off-shoots like LibreWolf and WaterFox that may be worthwhile (I haven't vetted them) but its the same dilemma as with chrome, the upstream code is captured and controlled by an organization that I don't trust to respect user privacy.

This is just making better the enemy of best.

In reality people espouse this opinion then continue using Chrome or Chromium browsers.


see original comment:

> Yet there really is little recourse for privacy enthusiasts


> FOSS is a flexible term but carries the connotation of community ownership, and therefore independence from for-profit interests.

That's certainly not true. Unless Red Hat, MongoDB, Chef, etc. are not open source.

While I love to believe that the FOSS world is an anarchist utopia that believes in wellbeing for all, I think there are plenty of profit driven people there. They just don't sell access to the code/software.


Firefox never took off.

At one point, Firefox (3.5 specifically) was #1, for a brief moment:

> Between mid-December 2009 and February 2010, Firefox 3.5 was the most popular browser (when counting individual browser versions) according to StatCounter, and as of February 2010 was one of the top 3 browser versions according to Net Applications. Both milestones involved passing Internet Explorer 7, which previously held the No. 1 and No. 3 spots in popularity according to StatCounter and Net Applications, respectively - https://en.wikipedia.org/wiki/Firefox_3.5

Then Chrome appeared and flattened both IE and Firefox.


lol, and I used neither. Opera all the way until...

Millions of people use it. What's the latest usage number? 5% or something?

There's 5 billion people on the internet. 5% of that is 250 million.

Some companies would kill for user numbers like that. Hell, some would slaughter entire villages.


Define taking off then. Everyone knows Firefox and some people even like it

I'll go a step further and point out that someone who is not only willing to parrot these views but has a fairly detailed rationale for why they believe them are so devoted to those views that I'd find a disavowal of them somewhat suspicious.

Fortunately, it's also pretty clear from other contextual clues that he sees no reason to disavow those beliefs.


Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: