Hacker Newsnew | past | comments | ask | show | jobs | submit | sneela's commentslogin

I agree with other comments that this research treads a fine, unethical line. Did the authors responsibly disclose this, as is often done in the security research community? I cannot find any mention of it in the paper. The researchers seem to be involved in security-related research (first author is doing a PhD, last author holds a PhD).

At least arxiv could have run the cleaner [1] before the print of this pre-print (lol). If there was no disclosure, then I think this pre-print becomes unethical to put up.

> leading to the identification of nearly 1,200 images containing sensitive metadata. The types of data represented vary significantly. While device information (e.g., the camera used) or software details (such as the exact version of Photoshop) may already raise concerns, in over 600 cases the metadata contained GPS coordinates, potentially revealing the precise location where a photo was taken. In some instances, this could expose a researcher’s home address (when tied to a profile picture) or the location of research facilities (when images capture experimental equipment)

Oof, that's not too great.

[1] https://github.com/google-research/arxiv-latex-cleaner


Having arXiv run the cleaner automatically would definitely be cool. Although I've found it non-trivial to get working consistently for my own papers. That said, it would be nice if this was at least an option.


Leaks of read/write access to documents and GitHub, Dropbox etc credentials is certainly worrying, but location and author/photographer details in photo metadata? That's quite a stretch, and seems like the authors here are just trying to boost the numbers.

The vast majority (I would wager >(100 - 1e-4)) of location of research institutions is public knowledge and can be found out by simply googling the institution address (I am not aware of a single research institution that publishes publically where the location is confidential).


They responsibly disclosed it in their research paper. An unethical use would be to use those coordinates to gain state secrets about say, research facilities


This is a wonderful write-up and a very enjoyable read. Although my knowledge about systems programming on ARM is limited, I know that it isn't easy to read hardware-based time counters; at the very least, it's not as simple as the x86 rdtsc [1]. This is probably why the author writes:

> This code is more complicated than what I expected to see. I was thinking it would just be a simple register read. Instead, it has to write a 1 to the register, and then delay for a while, and then read back the same register. There was also a very noticeable FIXME in the comment for the function, which definitely raised a red flag in my mind.

Regardless, this was a very nice read and I'm glad they got down to the issue and the problem fixed.

[1]: https://www.felixcloutier.com/x86/rdtsc.


Bear in mind that the blog post is about a 32 bit SoC that's over a decade old, and the timer it is reading is specific to that CPU implementation. In the intervening time both timers and performance counters have been architecturally standardised, so on a modern CPU there is a register roughly equivalent to the one x86 rdtsc uses and which you can just read; and kernels can use the generic timer code for timers and don't need to have board specific functions to do it.

But yeah, nice writeup of the kinds of problem you can run into in embedded systems programming.



That was a neat idea back in the day but should disallowed now. Running downloaded executables considered harmful.


> Running downloaded executables considered harmful

Most executables are downloaded. :)


Not in the "Installation: just run `docker run kekw/our-shiny-ai-chatbot` in your shell" world we're living today.


I think the better example is the all-too-common: “Installation: Just run `curl -sL http://goo.gl/hsjdiNgtehsn | sudo bash`”


> This was in snapshots for more than 2 months, and only spotted one other program depending on the behaviour (and that test program did not observe that it was therefore depending in incorrect behaviour!!)

Fascinating. I wonder what that program is, and why it depends on the NUL character.


> Every 20 hours in South Africa a rhino dies for its horn.

I didn't know this statistic before - this is disheartening.


Here’s another one : between 24 and 150 animal species go extinct probably every day !

> current extinctions were ‘up to 100 times higher than the background rate.’

https://e360.yale.edu/features/global_extinction_rates_why_d...


Previous discussion from 2021: https://news.ycombinator.com/item?id=29269584


Zooming out, panning around, and seeing the milky is... jaw dropping in a way. I know it's silly because we've seen SO many photos of the universe, but I still get the goosebumps every time I think about it. And the detail too! You can really zoom in.

I tried to look for the moon, but it looks like it's not possible: https://old.reddit.com/r/askscience/comments/rwynmt/could_th...


If you host your own instance:

> SearXNG protects the privacy of its users in multiple ways regardless of the type of the instance (private, public). Removal of private data from search requests comes in three forms:

> 1. removal of private data from requests going to search services

> 2. not forwarding anything from a third party services through search services (e.g. advertisement)

> 3. removal of private data from requests going to the result pages

From: https://docs.searxng.org/own-instance.html#how-does-searxng-...

The docs mention a caveat below at "What are the consequences of using public instances?":

> If someone uses a public instance, they have to trust the administrator of that instance. This means that the user of the public instance does not know whether their requests are logged, aggregated and sent or sold to a third party.


All of that is fine but by simply having your IP, Google can continue to profile you in countless ways with data they collect in other ways and it wouldn't be expensive for them at all.


SearX acts as a proxy, you are not submitting your IP to Google.


i think since 'IP address' has become something of a baseline non-technical understanding of one of the critical components of networking, it becomes increasingly difficult for non-netpeeps to fully grasp the many uses and non-uses of addressing.

a proxy (or proxies) and how they can shield but one or many of ' your' IP addresses throughout an egress packet's many hops (and from who or what destination it or those addresses can be shielded) is a pretty advanced concept when you think about it.

not to mention that, at this point, bare source IP address is a pretty dilute tracker compared to other current methods of identity profiling or traffic fingerprinting.

nice succint correction on your part regardless.


We're talking about self hosting, right? The proxy is using the same IP.


if self-hosting, that may very well be correct.

a few examples of a self-hosted design that would not, include policy-based routing over a VPN with one or multiple tunneled hops, or through another external proxy. (and then there's also that 'onion' routing 'protocol' there—but i'm not clear if/how that integrates with clearnet destinations like publicly-accessible search engines if at all.)


Looks like it's a firefox thing. I tested in Ungoogled Chromium and it works fine for me too.


It's incredibly annoying when this isn't taken care of. Alt + Left Arrow becomes impossible to use and I have to resort to using my mouse.

Don't Microsoft's support pages [1] do this as well? I just checked with a random support page [2] and it looks like the middle redirection url is the same. Is that a different thing?

[1] support.microsoft.com

[2] https://support.microsoft.com/en-us/windows/fix-file-explore...

(Firefox if that matters. Currently on Linux, has happened on Windows)

Edit: I just checked on Ungoogled Chromium and it looks like this (the microsoft support) isn't an issue. It's only on Firefox. That's bizarre.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: