Hacker Newsnew | past | comments | ask | show | jobs | submit | ceequof's commentslogin

Robot cars don't have hands.


There are several much simpler ways a robot car could connect itself for charging. This is just gee-whiz tech for its own sake, and it's fine for Tesla to do, don't get me wrong.

But as someone who can't afford to buy a Tesla, and who wouldn't spend that kind of money on a car even if I had it, I'd rather see the R&D going into more affordable, more practical EVs that I might actually consider purchasing.


Because the people who are skilled with robotics should instead be working on chemical engineering and process management?

I'm tired of seeing this fallacy of "one thing being developed means that another thing is being put on the sideline". It looks to me like Tesla have the best people on the jobs they need to be on, and just adding "more" isn't going to speed things up more than having more mothers will speed up pregnancy.


May I borrow that line? It's a great way to express a point that I frequently try to make.


But that is The Tesla Master Plan. Pay for the R&D with luxury vehicles before producing more adorable ones.

Build sports car

Use that money to build an affordable car

Use that money to build an even more affordable car

While doing above, also provide zero emission electric power generation options

http://www.teslamotors.com/blog/secret-tesla-motors-master-p... (August 2006)


*before producing more adorable ones"

Oops, I meant "affordable" but "adorable" works too I guess. :-)


> There are several much simpler ways a robot car could connect itself for charging.

I was wondering if Tesla would introduce conductive charging at some point; install a base in your garage, park on top of it, car's charged by morning. Perhaps not feasible with the amount of energy they need to transfer?


Even if technically feasible, it'd be a waste - the most efficient inductive charging systems still lose more than 10% of the energy.


  There are several much simpler ways a robot car could 
  connect itself for charging
That's a bold assertion. What's your suggestion that would be simpler than a cable driven arm like in the OP? A couple linear actuators in the base, no precision bearings.


How could you possibly defend against a malicious merchant? They can just have a video camera pointing at the terminal, no amount of encryption would defend against that.


The first few transactions would probably go through, but then some people would notice and report strange transactions. I was told by someone working in that industry that credit card companies would figure out who's the source and cut them off / sue them if it was malicious. I'm not sure if that kind of data mining / correlation is common - I'd really like to hear some details / other confirmations.


Cash


If I run out of stuff on the front page, then I go to /newest



ctrl+f "kiddo"

  1 of 9 results


  (But it would be nice if the next-gen solar panels 
  installed on a car would be efficient enough to provide 
  enough power for a car drive)
You only get about 1.5KW of light per square metre, on average. A car has maybe 4-8 square metres of usable solar panel space, so guess you could get 3-6KW of power using superexpensive cutting-edge 3-junction solar panels that manage 50% efficiency.

Model S has a 310KW motor. Assume you only run it at 10% of rated power when cruising, and that's 31KW of power draw. More than that, of course, since the motor controller won't be perfectly efficient.

No way you can run a consumer vehicle on solar panels built into the body.


It can work as a range extender, though, especially if factoring in charging while you stop for a bite to eat, shop, visit the office, etc. In addition, if you're an occasional driver, it can be charged and ready to go if you simply park it in a sunny spot.

I'd pay extra for such solar panels in the roof.


It's used quite often among PL nerds: http://lambda-the-ultimate.org/


USG is a fairly widely used initialism for United States Government in some circles.


Gatún Lake of the Panama Canal is also freshwater, at 26m elevation.

Generally, the big risk with elevated freshwater lakes connected to the sea by locks isn't saltwater contamination, but the disastrous flood that would happen if all the lock gates were opened at the same time. A lot of work was put into the safety measures, most of which have been removed due to cost in recent decades: https://en.wikipedia.org/wiki/Panama_Canal_locks#Safety_feat...

If a flight of locks was completely opened, Gatún would promptly drain out of them, wiping out everything downstream. You could imagine the entire canal would be offline for months to years as infrastructure was rebuilt and the lake was refilled by rainwater.


https://pando.com/2014/07/16/tor-spooks/

  In 2006, Tor research was funded was through a no-bid
  federal contract awarded to Dingledine’s consulting
  company, Moria Labs. And starting in 2007, the Pentagon
  cash came directly through the Tor Project itself —
  thanks to the fact that Team Tor finally left EFF and
  registered its own independent 501(c)(3) non-profit.

  How dependent was — and is — Tor on support from
  federal government agencies like the Pentagon?

  In 2007, it appears that all of Tor’s funding came from
  the federal government via two grants. A quarter million
  came from the International Broadcasting Bureau (IBB), a
  CIA spinoff that now operates under the Broadcasting Board
  of Governors. IBB runs Voice of America and Radio Marti, a
  propaganda outfit aimed at subverting Cuba’s communist
  regime. The CIA supposedly cut IBB financing in the 1970s
  after its ties to Cold War propaganda arms like Radio Free
  Europe were exposed.

  The second chunk of cash — just under $100,000 — came
  from Internews, an NGO aimed at funding and training
  dissident and activists abroad. Tor’s subsequent tax
  filings show that grants from Internews were in fact
  conduits for “pass through” grants from the US State
  Department.


All this is public information, repeated many many times by the Tor developers themselves. It's on the "financial reports" section of torproject.org. Go and check it out.

It's good to be critical of things especially where security is concerned, but if the code is open, the protocol is open, the development is open, I don't see how it matters if it was a US Navy project?

(Pando's articles usually lack substance)


https://www.torproject.org/about/sponsors.html.en

The NSA fully-funded and wrote SELinux, too. So what?


I am naive on this topic.

Sincere question: don't these facts call the utility of SELinux and Tor into question?

If the answer is "because math", well... I don't speak math. Being illerate in this manner, I must depend on the reputations of the parties involved (and the reputations of the parties that report who was involved!).

So... Can a person who does not trust the NSA trust products they paid for?


> Can a person who does not trust the NSA trust products they paid for?

Remember a couple of things:

* The NSA relies on SELinux as a part of their internal computer security system. (However, as the NSA document leaks reveal, even the best system fails when poorly configured!)

* Both SELinux and Tor are open source software, developed in the open. It's not unthinkable that there's a problem with the design of the software of either project, but the commit history and mailing lists of both projects are available for public perusal and audit.

* Well regarded security researchers have looked at both Tor and SELinux and declared them to be reasonably well designed systems that do what they say on the tin.

Anyway. If the NSA involvement really squicks you out, there's always either Grsecurity and PaX [0] or AppArmor [1]. Grsecurity is primarily developed by Brad Spengler. PaX is developed by an anonymous cabal known as PaX Team. [2] AppArmor has been developed by Canonical (the Ubuntu guys) since ~2009.

[0] https://en.wikipedia.org/wiki/Grsecurity

[1] https://en.wikipedia.org/wiki/AppArmor

[2] AIUI, it is the PaX Team's refusal to identify themselves that prevents Grsecurity and PaX from ever being merged into mainline Linux.


> The NSA relies on SELinux as a part of their internal computer security system.

And DISA STIGs (e.g., for RHEL) require SELinux to be enabled and enforcing.


Man, those STIGs are both a blessing and a curse for defense contractors.

A blessing, 'cause if your system is configured as per the STIG, there's not a damn thing the auditors can say when they roll through.

A curse for many folks deploying a Linux system, 'cause if your particular variant of Linux doesn't have a STIG, -regardless of how similar it is to one that does- IME there's next to nothing you can do to get an auditor to approve the hardening work you've done.


Slightly off-topic here, but flipping through this[1] Abstract Algebra textbook(2009), I found it amusing that the author thanks NSA for support among others :D.

[1] http://www.amazon.com/Algebra-Chapter-Graduate-Studies-Mathe...


You can definitely trust the sensational value in finding out that any project advocating freedom and data security would be exploited by a government.

That's what I do, it's not perfect but I love reading source code and figuring out how things work so I know others, much smarter than me, love that too.

The public cases of the US government going after Tor, for example, have all read like external attacks on the protocol design flaws to build a larger case.

I would be more suspicious over placing exit nodes in libraries because I assume they're state owned in the US. Don't know since I'm not from there though. I just think it's sort of ironic because the attacks that have been performed all required possession of exit nodes.


> I would be more suspicious over placing exit nodes in libraries...

Librarians are more often rabidly pro-privacy and pro-anonymity than not. They're often very well read, well educated, and know their history.

> I just think it's sort of ironic because the attacks that have been performed all required possession of exit nodes.

Unless you have information that I do not (if you do, please link to it) control of a single exit node gives you no more power than your ISP already has over you. What attacks were you thinking of? Keep in mind that Tor explicitly does not protect against:

* An adversary that can listen to the communication between a large number of nodes in the Tor network and targeted Tor users. (Similarly, Tor cannot protect against a malicious adversary who controls a very large number (1/3? 51%? I can't remember) of the nodes in the Tor network.)

* Tampering with or recording of the data that leaves or is returned by a Tor exit node. (Again, this is an attack that anyone between you and your communication partner can launch, whether you're using Tor or not.)


>Librarians are more often rabidly pro-privacy and pro-anonymity than not. They're often very well read, well educated, and know their history.

Few librarians are involved in network operations at the library though. I'm just speaking from my experience here in Sweden but that stuff is usually handled by a local IT department or out sourced to a company.

So the danger would be in having a federal oversight on network operations of libraries. I do not believe we have that in Sweden at least. Probably the US government allow libraries to manage themselves on that front too.

>Unless you have information that I do not (if you do, please link to it) control of a single exit node gives you no more power than your ISP already has over you. What attacks were you thinking of? Keep in mind that Tor explicitly does not protect against:

Exit nodes, as in plural.

So hypothetically if the federal government did manage network operations for libraries in the US, and the Tor network was successful in onboarding many libraries in this project, that could mean massive control of Tor exit nodes.


I don't think they're state-owned, but they depend on community and county (and maybe state and Federal) sources for funding. Depending on the community politics, libraries could face funding cuts for running exit nodes.

If the library staff are at all bureaucrat-savvy, they can probably obfuscate the activity. I hope so. I think this is a very good idea.


I think he means state-owned in the sense that the IC can easily watch the traffic going to and leaving the exit node, and with many exit nodes leveraging this into a passive attack on the network.

If this is true, if ToR is to stick to a goal of establishing truly anonymous browsing, ToR needs to establish links through a diverse number of jurisdictions.


That is interesting. Yes, many states have a "schools and libraries" WAN which public and private EDU-related facilities participate in. Said network is surely monitored by commercial network appliances. (BlueCoat et al.)

I haven't heard of them being monitored in more competent ways, but the opportunity is surely there.


Don't take this the wrong way, but... this is hardly news. From top of the Tor Project's "Who uses Tor?" page:

"Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the Naval Research Laboratory.[0] It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications." [1]

The article you link to quotes one of the original TOR authors, but fails to link to his words. They're here. [2]

Even if Tor hadn't originally been built by the NRO, spooks would still be using it for their "open source" intelligence gathering: it is effective, well-built software that protects against the threats that it claims to protect against.

That Pando Daily article attempts to claim that the fact that NSA captures Tor traffic makes Tor a danger. The leaked NSA slides from which that fact comes from also reveal that NSA captures and stores (for a long time) all encrypted traffic that they cannot decrypt. [3] This means that connecting to a non-USian site using SSL/TLS makes you just as much a target as Tor usage. :)

I get that people freak out about government funding of this project or that project, but there are a few things to keep in mind here:

1) Tor is open source and is developed in the open. [4]

2) Respected cypherpunks and cryptographers have periodically evaluated the project and declared it to be effective and high quality.

3) A weakening of Tor or the Tor Network reduces its value for intelligence gathering and covert law enforcement operations.

I welcome your questions and/or comments. :)

[0] That phrase links to http://www.onion-router.net/

[1] https://www.torproject.org/about/torusers.html.en

[2] https://lists.torproject.org/pipermail/tor-talk/2011-March/0... (Notice that this is an official Tor Project mailing list archive, and that the message is still visible. :) ) Extended discussion is available here: http://www.cryptome.org/0003/tor-spy.htm

[3] Other NSA slides reveal that the NSA can't actually break Tor. They have to rely on endpoint compromise or improper configuration of hidden services to unmask Tor users.

[4] https://gitweb.torproject.org/tor.git/


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: