The best Hacker News stories from All from the past week

Go back

Latest posts:

I built Excel for Uber and they ditched it

My favourite API is a zipfile on the European Central Bank's website

Unity’s new pricing: A wake-up call on the importance of open source

The Tyranny of the Marginal User

Bug in macOS 14 Sonoma prevents our app from working

Credit card debt collection

Any sufficiently advanced uninstaller is indistinguishable from malware

iPhone 15 and iPhone 15 Plus

UK air traffic control meltdown

Microsoft has not stopped forcing Edge on Windows 11 users

Microsoft has not stopped forcing Edge on Windows 11 users

Touch Pianist

Maybe Rust isn’t a good tool for massively concurrent, userspace software

Bun v1.0.0

Chrome now tracks users and shares a “topic” list with advertisers

NSO group iPhone zero-click, zero-day exploit captured in the wild

UK pulls back from clash with Big Tech over private messaging

Internet-connected cars fail privacy and security tests conducted by Mozilla

Is this Duplo train track under too much tension?

Ask HN: I’m an FCC Commissioner proposing regulation of IoT security updates

Hi everyone, I’m FCC Commissioner Nathan Simington, and I’m here to discuss security updates for IoT devices and how you can make a difference by filing comments with the FCC.<p>As you know, serious vulnerabilities are common in IoT, and it often takes too long for these to be patched on end-user devices—if the manufacturer even bothers to release an update, and if the device was even designed to receive them. Companies may stop supporting a device well before consumers have stopped using it. The support period is often not communicated at the time of sale. And sometimes the end of support is not even announced, leaving even informed users unsure whether their devices are still safe.<p>I’ve advocated for the FCC to require device manufacturers to support their devices with security updates for a reasonable amount of time [1]. I can't bring such a proposal to a vote since I’m not the chairman of the agency. But I was able to convince my colleagues to tentatively support something a little more moderate addressing this problem.<p>The FCC recently issued a Notice of Proposed Rulemaking [2] for a cybersecurity labeling program for connected devices. If they meet certain criteria for the security of their product, manufacturers can put an FCC cybersecurity label on it. I fought hard for one of these criteria to be the disclosure of how long the product will receive security updates. I hope that, besides arming consumers with better information, the commitments on this label (including the support period) will be legally enforceable in contract and tort lawsuits and under other laws. You can see my full statement here [3].<p>But it’s too early to declare victory. Many manufacturers oppose making any commitments about security updates, even voluntary ones. These manufacturers are heavily engaged at the FCC and represented by sophisticated regulatory lawyers. The FCC and White House are not likely to take a strong stand if they only hear the device manufacturer's side of the story.<p>In short, they need to hear from you. You have experienced insecure protocols, exposed private keys, and other atrocious security. You have seen these problems persist despite ample warning. People ask, ‘why aren’t there rules about these things?’ This is your chance to get on the record and tell us what you think the rules should be. If infosec doesn’t make this an issue, the general public will continue falsely assuming that everything is fine. But if you get on the record and the government fails to act, the evidence of this failure will be all over the Internet forever.<p>If you want to influence the process, you have until September 25th, 2023 (midnight ET) to file comments in the rulemaking proceeding.[4] Filing is easy: go to <a href="https://www.fcc.gov/ecfs/search/docket-detail/23-239" rel="nofollow noreferrer">https://www.fcc.gov/ecfs/search/docket-detail/23-239</a> and click to file either an ‘express’ comment (type into a textbox) or a ‘standard’ comment (upload a PDF). Either way, the FCC is required to consider your arguments. All options are on the table, so don’t hold back, but do make your arguments as clear as possible, so even lawyers can understand them. If you have a qualification (line of work, special degree, years of experience, etc.) that would bolster the credibility of your official comment, be sure to mention that, but the only necessary qualification is being an interested member of the public.<p>I’m here to listen and learn. AMA. Feel free to ask any questions about this or related issues, and I’ll answer as many as I can. I just ask that we try to stay on the topic of security. My legal advisor, Marco Peraza, a security-focused software engineer turned cybersecurity lawyer, will be answering questions too. I’m open to incorporating your ideas (and even being convinced I’m wrong), and I hope that my colleagues at the FCC are as well. Thank you!<p>Edit: The Q&A is over now, but please keep this great discussion going without us. Thanks again everyone for your input. Don't forget to file comments if you want to make sure your arguments get considered by the full FCC.<p>[1] <a href="https://www.fcc.gov/document/simington-calls-mandatory-security-updates" rel="nofollow noreferrer">https://www.fcc.gov/document/simington-calls-mandatory-secur...</a><p>[2] <a href="https://www.fcc.gov/document/fcc-proposes-cybersecurity-labeling-program-smart-devices" rel="nofollow noreferrer">https://www.fcc.gov/document/fcc-proposes-cybersecurity-labe...</a><p>[3] <a href="https://www.fcc.gov/document/fcc-proposes-cybersecurity-labeling-program-smart-devices/simington-statement" rel="nofollow noreferrer">https://www.fcc.gov/document/fcc-proposes-cybersecurity-labe...</a><p>[4] If your comments are purely in response to arguments made in other comments, you have an extra 15 days, until October 10, 2023.

< 1 2 3 ... 35 36 37 38 39 ... 119 120 121 >