Hacker Newsnew | past | comments | ask | show | jobs | submit | pl4nty's commentslogin

I had to scroll too far for someone to mention third-party CI. GitHub Actions free runners have always sucked, but the third-party runner ecosystem is really strong for those who can afford it. imo the APIs are far better than the rest of the product - I suspect enterprise customers are strong-arming GitHub to keep them reliable. and there's always third-party CI like tekton if Actions' yaml is too annoying

there are quite a few features like this. I actually did a comparison of chromium vs edge headers yesterday, it's a lot more than a rebrand. shame the source code is proprietary

https://github.com/pl4nty/msedge/commit/96aa52634072b12fa175...


> windows store requires a MS account

they avoid mentioning it, but the Microsoft managed package format (MSIX) works just fine without the Microsoft Store. create an App Installer manifest, stick it on a website, and get semver-d differential updates across multiple architectures for free: https://learn.microsoft.com/en-us/windows/msix/app-installer...

msft have woefully underinvested in the ecosystem and docs though. I wish they'd fund me or others to contribute on the OSS side - electron could be far simpler and more secure with batteries-included MSIX


That's interesting and unexpected. How does the update check, notification & install process work?

EDIT: I think your link answered some of these questions. I’m on .msi myself so can’t benefit from it yet anyway.. basically these things need to be managed by the app bundlers like electron & tauri otherwise we’re asking for trouble. I think..


> Until now the only way to do that was on device

as usual, Apple's implementation is exceptional, but far from the first. see https://confidentialcomputing.io/ and its long history


  2019 Linux Foundation Confidential Computing
  2015 Intel SGX (Skylake)
  2014 Apple Secure Enclave (A8, iPhone 6)


> 2015 Intel SGX (Skylake)

Might be worth pointing out that SGX was compromised repeatedly and comprehensively by speculative execution attacks, e.g.

https://www.usenix.org/conference/usenixsecurity18/presentat...


Signal famously bet the (contact discovery) farm on SGX. A controversial design decision at the time, for good reason.

https://news.ycombinator.com/item?id=15340729


ARM TrustZone launched with the Arm1176JZ-S in 2004.


Absolutely right. My comment was strictly about “for consumer use at planet scale.” It’s the aggressive adoption and rollout of confidential computing architecture in an easy to use consumer platform that I’m celebrating here. (Including a 12 figure financial commitment!) Prior to PCC, smartphones generally had to process data on device to ensure privacy.


thanks for this, can't believe I've never come across it. I've been building git scraping tools for years, but didn't know it was a popular pattern


this, because msft spent years and many $$$ to build an open-source ecosystem. apple hasn't done that yet, so I'm not sure why anyone would trust them


Amazing that you comment that on an announcement that is one large effort of many that Apple have been doing to build an open-source ecosystem over many years...


shame they paywalled JWT authn behind their expensive PaaS offering :(

forced us to use an alternative, and paywalling security features in an "open source" product didn't make us feel comfortable for a long-term investment like a db

https://github.com/ClickHouse/ClickHouse/pull/68634#issuecom...


this is really helpful, thanks. how much are third-party models changing these workflows (LLMs etc)? would you still spend as much time on feature engineering and evaluation? I'm wondering whether any saved time would be refocused on hosting, especially optimizing GPU utilization


I host a usable web app like this, including a complete CLI via WebAssembly. it's surprisingly useful for teaching, kind of like CyberChef

https://openssl.tplant.com.au/


I host a usable web app for this idea, including a full CLI via WebAssembly to illustrate the trade-offs

https://openssl.tplant.com.au/


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: