Hacker News new | past | comments | ask | show | jobs | submit | uHuge's comments login

How about a social login and storing preferred version and some sane defaults without login?


"One you see it print" typo.


Quick question: Can you split any key, like the password to my LUKS or password manager? Is there any limitation for the content of the file to be split?


I tested it on some multi-megabyte mp4 files and it still worked well - you can split whatever you want.

The AES keys are the example just because you can update your payload without having to redistribute the shards.


Home button? No simple copy from the URL field? Not in a share with menus unlike Firefox…


IMO current OmniBar UI on Chrome Android is great improvement. Mostly we just search, sometimes copy the URL, rarely edit URL. So they made search as default and made an option to copy/edit URL.


Obelix would be proud of them, perhaps. Otherwise let me spell "art" here…


First impression to me was that it is some sort of modern kinetic projectile[0] from aircraft weapons' testing. I've read US army used something of that shape in recent conflicts, but probably of smaller size.

[0] https://en.wikipedia.org/wiki/Lazy_Dog_(bomb)


It probably wouldn't be in such great shape after impacting at high speed though.


This is a really good point. I wonder if it could be some sort of new-fangled rail-gun projectile.


That is a misunderstanding and a simplistic depiction of the inner structure inside the event horizon sphere. True is we have no observations of the internals but time ending is in contradiction to the cones of particles ejected from the "hole", observed by astronomers.


Black hole jets do not originate from beyond the event horizon. They are made of matter in the accretion disk surrounding the black hole that spirals inward but is deflected and ejected by the black hole's magnetic field.


You get the pseudonymity and open/easy access there on the other hand.


> pseudonymity

I worry that many people are confused by this, and don’t understand that this will continue to get eroded as time goes on for completed transactions.


Could you explain a bit more about what you mean by that? My interpretation is that even if you completed a bunch of BTC transactions in a way that allowed you to maintain anonymity, over time, new methodologies or technologies will allow future investigators to trace you as a real person through those old transactions. This? Or something else?


That's the just of it. Many of these public ledgers, like Bitcoin, form a massive transaction graph. Blockchain analytics tools and companies de-anonymize nodes in these graphs by matching real-world transactions to blockchain transactions.


> just

gist

(in case you've ever wondered why gist.github.com is so named)


Yes that’s what I meant — my interpretation is the same as yours


And if you use a mixer or complex wallet setup to try and hide your identity, you are highlighting yourself in the future when more advanced analysis methods start to get used.


I'd agree with what you describe, which I'd call policy-baked corruption for short.

I strongly disagree on the notion that deciding the way each of us lives is on the shoulders of the profit-driven directors.


You have high-stake operations in relatively small code base, so you better pick a language and tools compatible with formal verification or even supporting it natively.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: