Hacker Newsnew | past | comments | ask | show | jobs | submit | munchlax's commentslogin

Perhaps because they is plural. Plural is reserved for the royal family in some cultures.


'They' is also used when gender is unknown and has been for a long, long time.

Person_1: I found this great blogger whose writing I think you'd love.

Person_2: Oh, really?! What do they write about?


Only in English.


It's an English fucking word.


There exists makefiles that don't allow DESTDIR, as in

  mkdir derp
  gmake install DESTDIR=$PWD/derp
Distribution maintainers have to patch this :(


I'm accustomed to setting this up with `./configure --prefix`.


That was almost never the case. We just didn't know any better


I've replaced all my GPT disklabels with Sun disklabels because I refuse to let them talk.

UEFI still boots. Spec said it can boot from fat in an eltorito floppy image and sun disklabels sit in the second or so sector. Spec also said it abstracts the type of volume so all boot methods always work for all drives. ISO images don't use the first 4kB so it doesn't see there's disklabel at all

So now I can mount the ssd as iso9660 but there's also partitions on it of which the third spans the entire drive (of course, because that's the c partition)


I love this example.

This is pretty advanced, and who knows if anybody else is doing it exactly like this or not, but it is exactly what the hardware is supposed to be easily capable of, just as easily as what the vast mainstream users are getting out of the hardware by "default".

This type versatile performance is built-in just like the mainstream arrangement is built-in, the thing is you have to figure it out for yourself through the complex web of capabilities that have been long bypassed in order to make the default experience seem like it is actually simpler or more reliable, when it is not.


And ridiculously expensive


Not neccesarily a guise of security, but perhaps a different means of security. E.g. securing stock investments, profits, monies, etc. Nothing is 100% secure, you can't be in the void and still call it a void, etc


I bet those are just a rounding error to their profits.


I think it is and it doesn't just end there. It's develop and distribute binaries.

Everyone is still free to develop and distribute source code.


And good lock unlocking anything over 5 years old because the updated website doesn't support what you've got. Been there, it sucks.


To be fair, for "anything over 5 years old" you can probably find a privilege escalation exploit.


Do tell me when you find one for unlocking the bootloader of an LG G6, been looking for one for a few years now :)


A 1st gen Verizon Moto X bootloader unlock would be nice as well.


the question is not "being able to", the question is "being able to with a reasonable effort".

wandering the web to find an exploit is way beyond my spare time.


That might get you root but not a bootloader unlock.


Many of them are actually not bootloader locked.

iiuc the OG Verizon Pixel has an unlockable bootloader, but the operating system doesn't let you unlock it, meaning root access should allow unlocking the bootloader.

some devices have a legitimately locked bootloader, which means you're SOL.


There are privilege escalation CVEs in bootloader code too. I remember unlocking some very early locked bootloaders this way in the early days of android.


So much rarer now. Its getting more and more locked down unfortunately.


A lack of security vulnerabilities isn't really a matter of being "locked down" but rather "not broken"


It doesn't make sense to choose between a snake that bit you and another that bit you earlier.

If you don't want to be bitten, get out of the snake pit.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: