Hacker Newsnew | past | comments | ask | show | jobs | submit | more coderholic's commentslogin

They're not in the blog post, but they're in the full list with 1.2% market share (which happens to be the same as Linode's share): http://w3techs.com/technologies/overview/web_hosting/all


It could use a single http lookup to http://ipinfo.io instead!


Not strictly a curl hack, but you can quickly get your IP geolocation details with curl and http://ipinfo.io (full disclosure, it's my service):

  $ curl ipinfo.io
  {
    "ip": "208.54.39.206",
    "hostname": "mce2736d0.tmodns.net",
    "city": "Los Angeles",
    "region": "California",
    "country": "US",
    "loc": "34.0522,-118.2437",
    "org": "AS21928 T-Mobile USA, Inc.",
    "postal": "90013",
    "phone": 213
  }
  
Or just your IP

  $ curl ipinfo.io/ip
  208.54.39.206
  
Or any other field (eg. city)

  $ curl ipinfo.io/city
  Los Angeles
  
Or lookup another IP

  $ curl ipinfo.io/8.8.8.8
  {
    "ip": "8.8.8.8",
    "hostname": "google-public-dns-a.google.com",
    "city": "Mountain View",
    "region": "California",
    "country": "US",
    "loc": "37.3860,-122.0838",
    "org": "AS15169 Google Inc.",
    "postal": "94040",
    "phone": 650
  }
Or a specific field for that IP:

  $ curl ipinfo.io/8.8.8.8/org
  AS15169 Google Inc.


If you start a comment out with "not strictly [related to linked article]" and hijack the discussion by plugging a website it seems like the decent thing to do is mention that you are the developer behind said website. I think this is even more important when you include so much <pre> text that the other comments are pushed so far down the page.

Full-Disclosure: Some people still believe in it


Thanks for the tip. I've updated the comment to add the disclosure. Definitely not my intention to hide it though, it's clearly listed in my profile.


> the decent thing to do is mention that you are the developer behind said website

or just use a fake account ... like anybody else :D


I can't probably count how many times I use this in a week. Thank you very much for this service :)


And I've just spent a bit of time playing with this service. I think that authors should be proud of their work and claim credit up front on HN.


Regardless how good your service could be, this is completely unrelated to the article.


If you're interested in using the http://ipinfo.io API for this, so you don't have to worry about keeping your database up to date and you get additional details, let me know. I'd be happy to hook you up with a free unlimited plan specifically for this site.


Sweet, I'd be interested! Ping me with your contact information, and I can let you know once I've wired it up to use that.


It seems like your getting this info from ARIN? Do you happen to have any restrictions on this API? Thanks!


Amazing animation transitions on the buttons!

If you like this site you should also check out http://www.calm.com, which in addition to various ambient and nature sound/videos has guided meditation sessions.


I believe metaballs[1] were used. Very impressive application of concept.

[1] https://en.wikipedia.org/wiki/Metaballs


If you're interested in trying it out but don't know where to start then you might want to take a look at http://calm.com (I work there), or our mobile apps on android and ios (both called "calm").


If you're interested in getting started with meditation, checkout http://calm.com, and our iPhone and Android apps (search the stores for "calm")


Wow! I took the 2min one and it made me feel great. I especially love the ending with [SPOILER]"this is you, alive and present"[SPOILER].

Thanks a lot!


That's quite nice. Simple to implement but very nicely done.


Thanks for the recommendation. I just grabbed myself a copy of the 2005 edition from Amazon!


That's interesting, I didn't know about these trusted authorities. Here are the IPs:

    $ curl -s https://gitweb.torproject.org/tor.git/plain/src/or/config.c | grep -Eo "([0-9]{1,3}\.){3}[0-9]{1,3}:" config.c | sed 's/://'
    128.31.0.39
    86.59.21.38
    194.109.206.212
    82.94.251.203
    131.188.40.189
    193.23.244.244
    208.83.223.34
    171.25.193.9
    154.35.32.5
    199.254.238.52
I get the same country list as you:

    $ cat ips | xargs -I% curl -s http://ipinfo.io/%/country | paste - ips | sort
    AT  86.59.21.38
    DE  131.188.40.189
    DE  193.23.244.244
    NL  194.109.206.212
    NL  82.94.251.203
    SE  171.25.193.9
    US  128.31.0.39
    US  154.35.32.5
    US  199.254.238.52
    US  208.83.223.34
And here are the organizations they're associated with:

    $ cat ips | xargs -I% curl -s http://ipinfo.io/%/org | paste ips -
    128.31.0.39 AS3 Massachusetts Institute of Technology
    86.59.21.38 AS8437 Tele2 Telecommunication GmbH
    194.109.206.212 AS3265 XS4ALL Internet BV
    82.94.251.203   AS3265 XS4ALL Internet BV
    131.188.40.189  AS680 Verein zur Foerderung eines Deutschen Forschungsnetzes e.V.
    193.23.244.244  AS50472 Chaos Computer Club e.V.
    208.83.223.34   AS40475 Applied Operations, LLC
    171.25.193.9    AS198093 Foreningen for digitala fri- och rattigheter
    154.35.32.5 AS14987 Rethem Hosting LLC
    199.254.238.52  AS16652 Riseup Networks


(I'm from The Netherlands)

For what it's worth, XS4ALL has a tremendous reputation when it comes to privacy in The Netherlands, being one of the first ISPs in NL, founded by true hackers. They were the first (and only one?) that started disclosing how many subpoenas they were receiving from the government, have fought a lot against blocking TPB in court, etc -- I'm not surprised at all they are the ones hosting the Tor servers (I am a customer, and am allowed to run an Exit node, and they are very supportive when they receive abuse complaints, their entire customer support staff knows about Tor). I would be surprised if they would easily cave to a government order / seizure of their servers.


Do note that XS4ALL is owned by KPN, which is a monolith like Comcast or Verizon. If the authorities come knocking hard enough, KPN will make sure it it shut down, or worde. XS4ALL is a good provider, I enjoy my IPv6 and fiber to home very much, service is good, they still provide a shell server which I use for IRC, I like them

I do however have my doubts about KPN...


Sad as it might be, I have to agree with you. Upon acquisition, KPN said it will let XS4ALL be as independent as possible, and as far as I can tell, they put their money where their mouth is (let them fight court battles, where KPN (the ISP) does not), but if there is little legal room for XS4ALL to move in, KPN will make sure XS4ALL complies.

On the other hand, XS4ALL is always looking for the boundaries of privacy and free speech -- if there is no more (legal) room left, and as such have reached the boundary, I have no doubt they would comply. But they probably make a big stunt out of it again, using it as a marketing opportunity, which KPN, of course, will have no problems with. As long as they comply with the law.


MIT runs Lincoln Lab which is a think tank / R&D facility for the military. You have to pass through an armed checkpoint to get to the the complex located on an AF base. I would consider that node compromised already.


Note that 'the military' and 'a hypothetical government agency opposed to Tor' are not necessarily the same thing.

Counterintuitively sometimes the best protection is to operate under another agency. That makes moving against Tor a battle of internal politics rather than a legal battle.

'The government' rarely has uniform views on something as complex as Tor.


The mistake of course being that the military (and the CIA, it's very useful for their assets) is pro-TOR and were the ones who developed it. It's the FBI/NSA that are anti-TOR. The government is rarely monolithic, especially when it comes to the security divisions.


It's not monolithic but power is magnified. A branch of the military relying on Tor for operational security ensures that the DoD will be at least split on officially sanctioning the technology.


I'm confused. Are you saying that the MIT Tor node is at Lincoln Lab, or are you suggesting that anything MIT-affiliated is tainted because of LL?


You realize that Tor came out of the US Naval Research Laboratory, right?

https://www.torproject.org/about/overview


It's also open source. Can we stop with this fucking red herring already? He's talking about a service, right now, under the direct control of the US military. You're talking about grant funding for an open source tool.

Stop.


No, he's not. He's talking about a single research laboratory MIT runs on a military base. Which somehow makes the entire university under direct control of the military?


FWIW according to the listserv traffic at MIT CSAIL right now, some members of the community seem to believe that the TOR node lives in CSAIL, not LL.


Assuming the PTR RRs are accurate, that would appear to be true:

  $ traceroute 128.31.0.39
  ...
  15  mitnet.trantor.csail.mit.edu (18.4.7.65)  40.218 ms  40.661 ms  40.900 ms
  16  asperta.helicon.csail.mit.edu (128.30.0.246)  45.345 ms  47.082 ms *
  17  belegost.csail.mit.edu (128.31.0.39)  44.074 ms !X  45.023 ms !X  45.549 ms !X


I have 0 Trust on MIT, since Aaron Swartz incident. I consider that place no more than deep shit.

I Don't want to believe, if I can trust a Tor Network passing through that gate in MIT


I remember reading something very similar to this (but can't remember where, ha), where it said the important thing about reading is how if affects your general thinking rather than the individual pieces of information that you're likely to remember (or not).

I spent several years reading a ton of different books on economics and I can recall very few facts from those books, but it did and has completely altered my world view of many things.

pg's analogy of a program where you've lost the source code doesn't feel quite right, because you can't make modifications to the program without the code. Some sort of machine learning model seems more appropriate, where you've lost the original training data but can still update the model later with fresh data (a new book), and end up with a better/different model, but then lose that training data again.


I think a machine learning model provides a nice version of Graham's "The same book would get compiled differently at different points in your life."

Using an artificial neural net analogy instead of a compilation analogy: "The same book would optimize your neural net towards a different local minimum at different points in your life."


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: