Hacker Newsnew | past | comments | ask | show | jobs | submit | Daviey's commentslogin

I think you've confused issues in society with kinetic war.

One mainly, although not always, harms individual wellbeing, whilst the other causes mass death and lines on the map to change.

Hopefully you can work out which is which.


"Hello, this is Lenny" - well known Asterisk configuration from 20 years ago.

And, “They have been carried away by monkeys!”

I got curious about how many wheelbarrows of cash $20bn actually is.

Two ways to think about it: weight vs volume.

By weight (assuming all $100 bills):

$20,000,000,000 / $100 = 200,000,000 bills

Each bill is roughly 1g, so total mass is ~200,000 kg

A typical builder’s wheelbarrow can take about 100 kg before it becomes unmanageable

200,000 kg total / 100 kg per wheelbarrow ≈ 2,000 wheelbarrows (weight limit)

By volume:

A $100 bill is ~6.14" × 2.61" × 0.11 mm, which comes out to about 102 cm³ per bill

200,000,000 bills × 102 cm³ ≈ 20,400 m³ of cash

A standard wheelbarrow holds around 0.08 m³ (80 litres)

20,400 m³ total / 0.08 m³ per wheelbarrow ≈ 255,000 wheelbarrows (volume limit)

So,

About 2,000 wheelbarrows if you only care about weight

About 255,000 wheelbarrows if you actually have to fit the cash in

So the limiting factor isn’t how heavy the money is; it’s that the physical volume of the cash is absurd. At this scale, $20bn in $100s is effectively a warehouse, not a stack.


I think your volume per bill should be 6.14 * 0.0254 * 2.61 * 0.0254 * 0.00011 ≈ 1.137e-6 m³. That means about 227 m³ total volume, or about 2800 wheelbarrows.

Something wrong about representing the weight of US dollars in metric units.

They should have converted to Euros first.

> Something wrong about representing the weight of US dollars in metric units.

The traditional unit of measure of truckloads of money is (drum roll) a dump truck. A large dump truck holds 16-20 cubic yards.

https://www.catdumptruck.com/standard-dump-truck-size-chart/


Then what do you say to 6.14" × 2.61" × 0.11 mm = 102 cm³

How many pounds is it? Whos on first?

The movie Blow had a scene about the logistics dealing with tons of cash. Even before thinking about laundering, it’s a huge PITA.

I think you’re off by about a factor of 100 on the volume of a single bill. So both cases it’s in the ballpark of 2000 wheelbarrows.

A better way to think of it is: If you got a dollar a second for the next 63 years, you still would not have gotten $2B.

Your volume of a single bill is a bit off.

Oh good, I can postpone my migration for personal projects.


Or, rather, you have more time to execute it. They _will_ rug pull again, this is Microsoft ffs.


It's the classic strategy of floating an extreme change, "listening to feedback", and then coming back later with the price they intended to charge all along.


That's the signal I'm getting here and they're not even being coy about it, they're just postponing some form of inevitable price increase.


Honestly, the author is spot on about the normalisation problem. I've watched this play out at multiple organisations. You implement TLS inspection, spend ages getting certs deployed, and within six months `curl -k` is in half your runbooks because "it's just the corporate proxy again".

He's also absolutely right about the architectural problems too, single points of failure, performance bottlenecks, and the complexity in cloud-native environments.

That said, it can be a genuinely valuable layer in your security arsenal when done properly. I've seen it catch real threats, such as malware C2 comms, credential phishing, data exfiltration attempts. These aren't theoretical; they happen daily. Combined with decent threat intelligence feeds and behavioural analytics, it does provide visibility that's hard to replicate elsewhere.

But, and this is a massive but, you can't half-arse it. If you're going to do TLS inspection, you need to actually commit:

Treat that internal CA like it's the crown jewels. HSMs, strict access controls, proper rotation schedules, full-chain and sensible life-span. The point about concentrated risk is bang on, you've turned thousands of distributed CA keys into one single target. So act like it. Run it like a proper CA with proper key signing ceremonies and all the safeguards etc.

Actually invest in proper cert distribution. Configuration management (Ansible/Salt/whatever), golden container base images with the CA bundle baked in, MDM for endpoints, cloud-init for VMs. If you can't reliably push a cert bundle to your entire estate, you've got bigger problems than TLS inspection.

Train people properly on what errors are expected vs "drop everything and call security". Document the exceptions. Make reporting easy. Actually investigate when someone raises a TLS error they don't recognise. For dev's, it needs to just work without them even thinking about it. Then they don't need to work around it, ever. If they need to, the system is busted.

Scope it ruthlessly. Not everything needs to go through the proxy. Developer workstations with proper EDR? Maybe exclude them. Production services with cert pinning? Route direct. Every blanket "intercept everything" policy I've seen has been a disaster. Particularly for end-users doing personal banking, medical stuff, therapy sessions, do you really want IT/Sec seeing that?

Use it alongside modern defences. ie EDR, Zero Trust, behavioural analytics, CASB. It should be one layer in defence-in-depth, not your entire security strategy.

Build observability, you need metrics on what's being inspected, what's bypassing, failure rates, performance impact. If you can't measure it, you can't manage it.

But Yeah, the core criticism stands though, even done well, it's a massive operational burden and it actively undermines trust in TLS. The failure modes are particularly insidious because you're training people to ignore the very warnings that are meant to protect them.

The real question isn't "TLS inspection: yes or no?" It's: "Do we have the organisational maturity, resources, and commitment to do this properly?" If you're not in a regulated industry or don't have dedicated security teams and mature infrastructure practices, just don't bother. But if you must do it, and plenty of organisations genuinely must, then do it properly or don't do it at all.


Hallelujah!

But I have to say, big regulated orgs are often not competent to do things this (the right) way but don't have the option of not doing it at all.


QubesOS would like a word with you. https://www.qubes-os.org/


BBC Newsnight aired the story first in June 2020.

Also, the BBC first reported on the boat immigration crisis on "BBC South East" regarding small boat arrivals in 2014.

GB News wasn't launched until June 2021, so they can't take much credit here.

Daily Mail is likely to buy The Telegraph, which honestly worries me.


It's a barrier not because it is hard, but because people are not familiar with it. Ask a non-technical user using the GUI to edit their display settings and they'll be equally flummoxed.


Interestingly, I feel polar opposite to you. Digging through a clunky GUI, going multiple levels deep, to find a tick box is annoying.. When I can just run a single one-line to achieve what I need. I suppose different strokes..


MacOS has the best of both worlds - you can interact with propertylists through the gui, or you can use the commandline.


Not just that, but technologies which took me many months or even years to become and expert at, the latest generation of engineers seem to be able to pick up in weeks. It's scary how fast the world is moving.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: