Hacker News new | past | comments | ask | show | jobs | submit | GraemeL's comments login

Castle Bravo was a ground burst and produced a crater about 2Km across. The debris from the crater ended up as fallout.

Tsar Bomba was detonated at an altitude of 4Km, the shock wave prevented the fireball from reaching the ground and producing a crater, so it produced less fallout.


That's clearly wrong. Debris from a crater is just what it is: harmless ash, with no dangerous isotopes. See [1] for the correct answer.

[1]: https://news.ycombinator.com/item?id=28479051


Neutron flux from the explosion will turn the atoms of surrounding harmless materials into heavier isotopes that are, in fact, dangerous.


And more importantly, the fission products from the bomb condense/agglomerate onto debris from the ground, allowing them to fall out more quickly.


Accelerando

> In IP geek circles, Manfred is legendary; he's the guy who patented the business practice of moving your e-business somewhere with a slack intellectual property regime in order to evade licensing encumbrances. He's the guy who patented using genetic algorithms to patent everything they can permutate from an initial description of a problem domain – not just a better mousetrap, but the set of all possible better mousetraps.


That's the one! Thanks


They used to offer that functionality but removed it years ago.

I've been using this userscript since then. https://greasyfork.org/en/scripts/1682-google-hit-hider-by-d...

It might be called Google Hit Hider by Domain but the author has expanded it to cover most major search engines over the years.


I've used a similar script; the problem is, for certain searches, literally every result is a pinterest link, and you end up with a blank page.


The Firefox version has the ability to block third party scripts masked as first party ones through the use of CNAMEs. Chrome doesn't expose APIs to let extensions do it.


Also this: https://news.ycombinator.com/item?id=20050173

> The blocking ability of the webRequest API is still deprecated, and Google Chrome's limited matching algorithm will be the only one possible, and with limits dictated by Google employees.

Firefox + uBO + uMatrix will block everything you can reasonably block without making your internet life miserable in the other extreme (although uMatrix can be a pain sometimes).


While uMatrix may be a bit of a pain, once you have your basic rulset and whitelists setup it functions very well, and beyond that, it really helps you understand what makes the modern web so shitty, and helps you know which sites are part of that and which aren't, which I think is pretty invaluable. Like many things, it may take more upfront investment but it's worth it imho.

If I could force every webdev to browse their site with a fresh uMatrix install I would.


I was most amused when he used my site as his test example in the uMatrix manual.

https://github.com/gorhill/uMatrix/wiki/How-to-create-rules-...


I've been using this userscript since Google dropped the ability to block results years ago. It works across a bunch of search engines.

https://greasyfork.org/en/scripts/1682-google-hit-hider-by-d...


Me too. It's been great

I've also cobbled together a Tampermonkey script which I wittily call "HackerChoose" which allows me to similarly block domains from appearing on HN. Unfortunately my JS-foo isn't up to making it interactive, so I have to manually update the list of banned domains. But, if anyone's interested, here it is:

This actual Tampermonkey stub script imports the full userscript from a location elsewhere on my hard drive. This makes it easier to maintain the list of banned domains by editing that imported file directly, rather than having to make edits from within Tampermonkey's clunky interface:

https://pastebin.com/raMSWMDi

This is the imported userscript. I pretty much lifted it from one someone else had made and then twiddled it a bit. So apologies to whoever the original author was, but I've forgotten where I got it, so can't give you the credit:

https://pastebin.com/SbtfXEby


Ignore it. They got the password from a data breach somewhere.

Change the password on any other site that you use that password for.

Using a password manager makes it much easier to use unique, complex passwords for each site you have a login for.


Thanks, anyway I have changed all the password since that time.


Their submission got flagged so it vanished from the new links page. They think HN is doing it automatically for certain sites.


The link was not flagged it was just hidden to other users but not shown to users who are not logged in. Please see my explanation below.


I've had problems with pretty much every in-ear bud I've had up until I bought the AirPod Pro's. Not had a single time when I've felt they have even started to come loose.

I wear them with the stalks pointing forward at around 45 degrees.


Many of the streamers I watch on Twitch use Streamlabs for multiple things including donations. Can't vouch for them personally but they are certainly the most common on that platform.


uBlock Origin blocked 15 items on the page for me (20%) when I bypassed their geoblock. Not great, not terrible.

I didn't see anything out of the ordinary in what was filtered so it's probably just knee-jerk.


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: