Hacker Newsnew | past | comments | ask | show | jobs | submit | phumberdroz's commentslogin

Location: Europe / Portugal

Remote: Yes -> but happy to travel from time to time

Willing to relocate: no

Technologies: Golang, PostgreSQL, Redis, kafka, k8s, terraform, aws, azure (many more but this is what I am most comfortable with)

Résumé/CV: https://my.visualcv.com/phumb-hn/

Email: see cv


> - Can't tab cycle through minimized windows

> - Windowing system sucks compared to Windows

Checkout: https://github.com/lwouis/alt-tab-macos solved most of my pains with it.


Never typed a 2FA code from the phone to the computer?

Just copying them on the iPhone and pasting them on the mac is super convenient.


I never felt like syncing my devices besides steam cloud saves. Too much convenience makes me uncomfortable. Especially if it means mixing corporate and personal stuff.


On android you can view your sms messages at messages.google.com allowing you to easily copy and paste it


Yeah, can also view email on both phone and computer since forever ago - this is not even remotely similar to the shared clipboard of an iPhone and Mac, where you don't need to open any links or programs, install anything, configure anything - you just copy on phone/computer and then instantly are able to paste on phone/computer.


Have you ever wanted to copy anything from A->B that wasn't a 2fa text, a password, or a url? I certainly haven't. An android phone out of the box supports syncing tabs and passwords and provides a trivial way to copy 2FA codes with a built in feature.


So your argument is that because the things to copy are few, this feature doesn't matter? Or what? I fail to see how what you say contributes to the discussion of vertical integration in any way.


Not few none. People need to share files, tabs, messages, mails. If you can share the things people actually want shared then sharing the clipboard itself has zero value.


Your response is completely irrelevant to the discussion of vertical integration. Whether or not you find use in it is up to you, and I don't really care.


I had issues as well and reached out to their support they provided me with detailed graphs of the battery usage over time and when the cat was in the wifi zone where it does seem to turn off the gps as well as mobile network to safe energy.

I adjusted my wifi to cover a bit more of my garden area and since then battery life has increased to 2-3 days.


We're using Tractive with our dog and regularly get a full week. And that includes 2-3 walks per day that are outside of the wifi zone.


We are using tractive for our cat. He is fairly active and the battery last around 2 days. Not awesome but also not that bad for the increased comfort that we know where he is.

With the collar that comes with it, he loses it every couple of weeks usually nearby bushes but we always find it and everything is good to go from there.

But it comes with a subscription.


Do you have a link to that study would like to share that with someone.



The best time I had so far was with dockertest[0] in go it allows you to spin up containers as part of your test suite which then allows you to test against them. So we have one go pkg that has all our containers that we need regularly.

The biggest benefit there is no need to have a docker compose or have other resources running locally you just can run the test cases if you have docker installed. [0] https://github.com/ory/dockertest


The only time I would think this is a valid security issue if those were tokens that were previously not public. But that should not be the case right?


Sure, if someone checked in a secret to a repo that at some point was public, and got crawled by co-pilot - they should cycle that secret, so it's no longer valid - rather than only mark the repo private and/or nuke the secret from the repo history.

But there's another side to this - if you write code using co-pilot against a popular Api - and co-pilot gives you a valid key - and you access data or a system you aren't supposed to - would you be liable under the various draconian antighacker laws?

If you pick up a key card from the street, and enter someone's home - you'd be trespassing after all..


That is a good question and I think you should be. After all you are still the Person that writes and produces the code just with the help of a tool. Similar to a lockpick. (I hope that makes sense)


Lets hope so... I expect that these were accidentally committed to a public repo

However, while the keys are then already leaked, you'd have to go search for them. Copilot suggests you use them in you editor. That is not quite the same imo.

It goes from deliberately searching and using leaked keys to having them handed to you without context. I feel it is a bit like finding an unlocked bike, if you take it, it is still stealing. But here there is a guy at the bike parking lets say that is handing out bikes to anyone passing by. Not the best analogy, but i think it covers my point ;)


I think it would be more like a friend telling you to take the bike or saying it is his bike and you can take it for a ride.

But yes I get your point but I also believe people still need to apply some sense to what co pilot suggests.


do you have a more detailed example on how this could look like?


The article starts by discussing SKIP LOCKED




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: