← Back to context

Comment by tmsbrg

1 day ago

Some talks which sound really brilliant. I love [0] exploiting a memory leak for years before it's fixed. Also [1] I'm really curious about the custom crypto used in Chinese apps. Oh and curious about the found [2] GPG vulnerabilities. I think some of the politics ones are actually also very interesting. Looking forward to the streams.

[0] https://fahrplan.events.ccc.de/congress/2025/fahrplan/event/... [1] https://fahrplan.events.ccc.de/congress/2025/fahrplan/event/... [2] https://fahrplan.events.ccc.de/congress/2025/fahrplan/event/...

The first one is indeed fascinating...almost deserving of its HN post :-)

It has been submitted six times in the last 10 months, with a grand total of 1 comment...I though this site had Hacker in the title...

https://hn.algolia.com/?q=https%3A%2F%2Fgfw.report%2Fpublica...

  • Common misconception. HN uses "hacker" as in "the people who do the work that makes Y Combinator rich" rather than "someone who plays with technology". HN hackers are contrasted with CEOs and so on - people whose job is not the on-the-ground work.

    • > HN uses "hacker" as in "the people who do the work that makes Y Combinator rich" rather than "someone who plays with technology"

      I do believe that originally Y Combinator indeed did celebrate the people who play with technology, but I guess over the many years the focus has shifted.

      1 reply →