Hacker News new | past | comments | ask | show | jobs | submit | giucal's comments login

> I have wondered why we have case/esac, if/fi but while/done.

With the reverse-keyword convention we'd get "od", not "elihw", though.

    while ...    for ...
    do           do
        ...          ...
    od           od
The 'od' utility already existed, apparently, so Bourne opted for "done".

[edit: typos]


No, there’s OD. DONE is different but no less perverse.


You don't even need a VPN. Just replace ISP's DNS servers with, say, Cloudflare's

    1.1.1.1
    1.0.0.1
or maybe OpenDNS's.

[Edit: fixed wrong fallback address.]


I think they don't matter because:

1. they are all fixed or bounded quantities;

2. all algorithms are subject to them.

On the other hand, in practice, the input size is also bounded. You deal not with arbitrarily long arrays, for example, since memory is not infinite.

So, I think, asymptotic time complexity is meaningful as long as the inputs we are considering can grow so much -- while remaining bounded -- that a linearithmic algorithm indeed outperforms, say, a quadratic one for a large and relevant class of inputs.

And that may be why computational models make those assumptions; but I'm not remotely sure.


Not so, language is a convention. Look up "fascism" in a dictionary: you will find it has a well established meaning.


Your own attitude towards life or criminals is not something worth considering when seriously pondering this question.

Society is a collection of individuals; everyone has different opinions and feelings on almost anything: at least when we discuss such sensible matters, we should rationalize our arguments, stripping any trace of subjectivity.

> I don't understand the great value placed on human life.

Coming to the case, you may not value your life very much, but we can't say the same for the criminal who is facing a death sentence. Personally, I don't feel empathy for some criminals who consciously perpetrated atrocious crimes; I literally fail to care for them. Nevertheless, I can objectively understand that in a civilized country any human must be granted some undeniable rights.

> I see no reason not to put down humans who have malfunctioned.

Humans do not malfunction. Humans err, whether deliberately or not. They must have the right to redeem themselves. And even if they refused to, putting them to death would still be a miserable solution: it wouldn't mitigate the crime, nor would provide justice -- and I mean justice, not revenge. Indeed, it would be itself a crime.

Edit: typos and form


(Joke) The best Windows tablet is no tablet at all.


It works in both directions, but the purpose is different.

To put it simply:

Since you are supposed to be the sole owner of your private key, using it to encrypt something allows the public to verify your identity.


And that is how signatures work. But while encrypting only, does it still remains the same?


Sorry, I'm not sure I've understood your question.

Do you mean encrypting the same way we encrypt using public key?

If so:

No, because as far as I can tell, when you "encrypt" a message with your public key you are in fact encrypting a random symmetric key which has been used in turn to encrypt the message. (Both ciphertexts must be sent to the recipient.)

As you may infer, if we use the same mechanism but encrypt using the private key, we just cannot ensure the authenticity of the message.

Edit: corrected typos.


To communicate with the world, you encrypt with your private key, and the public decrypts with your public key.

To communicate with an individual, you encrypt with their public key and they decrypt with their private key.

The rule of thumb is, do you want the public to read it (decryption with public key) -- or do you want a private individual to read it (decryption with private key).


He will more likely beat them to death.


If a commit is signed, one can verify that the author is indeed who s/he claims to be. See https://git-scm.com/book/it/v2/Git-Tools-Signing-Your-Work.

Some excerpt:

Git is cryptographically secure, but it’s not foolproof. If you’re taking work from others on the internet and want to verify that commits are actually from a trusted source, Git has a few ways to sign and verify work using GPG.

In Git 1.8.3 and later, “git merge” and “git pull” can be told to inspect and reject when merging a commit that does not carry a trusted GPG signature with the --verify-signatures command.


Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: