hdhzy | 8 years ago | on: A Clever Line of JavaScript
hdhzy's comments
hdhzy | 8 years ago | on: A Clever Line of JavaScript
["1", "2", "3"].map(parseInt)
> [1, NaN, NaN]hdhzy | 8 years ago | on: Git hash function transition plan
If I could get just 1 satoshi every time I see this suggestion...
hdhzy | 8 years ago | on: Git hash function transition plan
hdhzy | 8 years ago | on: System76 ME Firmware Updates Plan
hdhzy | 8 years ago | on: Show HN: Messages by the community, forever etched on the Blockchain
hdhzy | 8 years ago | on: Free Data Ebook Archive
-2017-11-26 22:15:18-- http://www.oreilly.com/design/free/files/2016-design-salary-survey-report.epub
Reusing existing connection to www.oreilly.com:80.
HTTP request sent, awaiting response... 404 Not Found
2017-11-26 22:15:18 ERROR 404: Not Found.hdhzy | 8 years ago | on: Ask HN: Best development laptop?
hdhzy | 8 years ago | on: Ask HN: Best development laptop?
hdhzy | 8 years ago | on: Armed with tough computer chips, scientists are ready to return to Venus
hdhzy | 8 years ago | on: Armed with tough computer chips, scientists are ready to return to Venus
Not an expert in batteries but Wikipedia says molten salt batteries provide high amount of power only for a short period of time:
> Once activated, they provide a burst of high power for a short period (a few tens of seconds to 60 minutes or more), with output ranging from watts to kilowatts.
hdhzy | 8 years ago | on: Introducing ProtonMail Contacts
And there will never be especially for web apps because there are no parties interested in this. Look at what happened with HPKP. It looked good on the surface but it turned out that extreme security is a little bit too extreme.
> If you think that taking something that's 80% there and filling in the last 20% for yourself counts as something that's "already" possible, then nothing is new and everything is already possible.
I'm just pointing out that you can already construct a scheme with the same security properties as what you described. If you'd rather wait for some hypothetical standard and implementation that will probably never happen then that's your decision.
> This is really janky and not at all what I'm talking about. What I'm talking about is as simple as what happens now, e.g., "GitLab/Mastodon/Whatever XX.x Released".
Perfect is the enemy of good and "GitLab/Mastodon/Whatever XX.x Released" seems to be just good enough. For paranoid people OpenPGP is there to verify build artifacts.
hdhzy | 8 years ago | on: Introducing ProtonMail Contacts
For the record one can already do it if all resources would use Subresource Integrity. Hashes of leaf resources would be embedded in parent resources up to the root document that you could announce out-of-band (e.g. https://example.com on 23rd of November 2017 has hash 1234566...). Then you'd have a cryptographic proof (like a Merkle tree) that nothing in the page changed.
hdhzy | 8 years ago | on: Introducing ProtonMail Contacts
Yes, but virtually nothing protects against proxying requests. Non-exportable keys protect against using them when the device is powered off.
> Also, if the server is malicious on the first connection, then the server could just not use the webcrypto api to begin with, and just make use a key that the server knows instead.
Agreed, but it's kind of like Trust On First Use. I guess it depends on one's trust model if they consider it a good trade-off.
hdhzy | 8 years ago | on: Replacing x86 firmware with Linux and Go
hdhzy | 8 years ago | on: Let's Encrypt now holds 35% of the market
Well, CACert insisted on validating people but it turns out that it's not really necessary to know your customer to issue DV certs according to Baseline Requirements. Let's encrypt understood it and just did a minimal required job to be accepted (it's still a lot of work).
Instead of verifying people I'd gladly see X.509 replaced with OpenPGP w.r.t. trust model so that I could see who trusts who and why. OpenPGP has a mode of hierarchical trust with trust signatures, additionally they can be limited to a domain, that could be used to give people power to issue their own certificates for their own domains.
hdhzy | 8 years ago | on: Let's Encrypt now holds 35% of the market
hdhzy | 8 years ago | on: Samsung DeX
hdhzy | 8 years ago | on: Samsung DeX
DeX has one HDMI port (1080p), two USB 2.0 and one Ethernet.
I can't wait for the Linux on Galaxy project to see how working with Ubuntu through DeX would feel like.
hdhzy | 8 years ago | on: Show HN: Example of a polyglot microservice app