Hacker Newsnew | past | comments | ask | show | jobs | submit | more CoastalCoder's commentslogin

Are you sure that a lot of individuals hold those contradictory positions?

Or do the contradictions only exist across multiple persons?

(Tangent: anyone know if there's a term for this fallacy? I.e., claiming that an attribute exists for some/all of a group's members, when in fact that attribute only applies to the collective itself?)


Worth mentioning that RiffTrax has a large catalog of riffed shorts (and a few lousy films) that don't require that.

E.g., two of my favorites: "Shake Hands with Danger" and "More Dangerous than Dynamite".

And the ones dubbed by Bridget and Mary Jo are great! Before them, the only narrator group I really liked was Mike+Kevin+Bill.


Have you made any of this work public?

It sounds really interesting.


I'm starting to. One of the libraries I've started on recently is open source. I'm still really early in that process, but I started extracting a few functions for the optimized single and double linked list containers and will be moving onto the red-black and AVL tree containers soon. Once these are done, I should be able to model check the thread, fiber, and socket I/O components.


Yup! Step 1: fill your printer with two liters of distilled water.


> someone making diamond hands.

To what is this referring?

I got the Hitler reference, but not this one.


When you google "German politician diamond hands" you get the answer: Angela Merkel


One of my favorite kitchen hacks is to make batches of roux and then freeze it. I break off chunks when and as needed.


That's because your comment is only 3 levels deep.

Let's revisit this when it's Reply to Reply to Reply to Reply :)


Or "Watson". I lose track.


I think it's an interesting question. Whether or not it can be discussed well here isn't so obvious.


What are you people talking about. Have you even looked at the article?

The names of the Asian/Indian people GP is referring to, are explicitly stated to be hallucinations in the article. So, high vs low trust society questions aside, the entire assertion here is explicitly wrong. These are not authors submitting hallucinated content, these are fictitious authors who are themselves hallucinations.

You are making up a guy to get mad at


Is it possible for you to name the KVM model?

It sounds like a potential risk is to the public.


It is this one: https://www.amazon.com/dp/B0CP4PD3SM

I did post a review there citing my security concerns.

Honestly I didn't go further with the investigation because if someone really has all my data, I'm worried about retribution.


Was the network port bridged to both PCs all the time (as the description makes it sound, or did only the "active" PC get a functioning network connection? Could you tell from the FDB of the upstream device, if there were more than two MAC addresses active on the port? Did you (hopefully) open it up and make PCB pictures before chucking it?


This picture from the list of product pictures [0] indicates that the thing acts as an Ethernet bridge. It probably exposes itself as a USB-C gigabit Ethernet device to the machine it's plugged into.

Page four of TFM [1] supports this theory.

Also, this functionality is called out in the product listing and in the manual. I'm over here laughing my ass off because OP got so frightened by this clearly-documented feature that they immediately threw the thing in the trash, rather than first investigating to see if the source of the network traffic was the machines plugged into the device.

[0] <https://m.media-amazon.com/images/I/71GglDmzCYL._SL1500_.jpg> (If this direct link fails, it's the image that has the header "A Stable Gigabit Ethernet Port".

[1] <https://avaccess.com/wp-content/uploads/2024/01/UM-_-iDock-C...> (This is the "DOWNLOAD USER MANUAL" link in the Downloads subsection of the More Information section of [2])

[2] <https://www.avaccess.com/products/idock-c20-kvm-switch-docki...>


I'm not an expert on this, but know enough to know the KVM doesn't need its own IP. In fact, the KVM I replaced it with provides ethernet to both my machines (at the same time) without getting its own IP.


The manual, as OP said, does not offer any explanation, why the device might show up with an additional MAC/IP at the upstream switch port, and which services it might offer. OP sounds knowledgeable enough to be able to exclude the possibility, that the additional MAC/IP could be from one of the PCs, like e.g. when playing with VMs using an internal bridge in the Hypervisor.

Maybe the device has a bigger "cousin" device, that includes "control via APP", and this feature was not properly/fully disabled on this one.


> why the device might show up with an additional MAC/IP at the upstream switch port

> the thing acts as an Ethernet bridge

A USB-C NIC has its own MAC and would thus get its own IP.


The network was active for both machines connected to it. And it had its own IP. So 3 MAC addresses in total. I didn't ever open it up. But maybe someone will be interested in buying one and exploring more.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: