racbart | 8 years ago | on: Many packages suddenly disappeared
racbart's comments
racbart | 12 years ago | on: A spreadsheet in fewer than 30 lines of JavaScript, no library used
* - this app looks and feels like “almost complete spreadsheet” yet it provides much less than 1% features of even a basic spreadsheet.
racbart | 12 years ago | on: Show HN: Test your E-Mail for IP Leaks
No idea why they don't advertise this feature. They wrote that they only tell about it to people that are actually having a problem about it. I guess it might be easier for them or for other email-ops to handle abuse/spam issues when this header is available?
racbart | 12 years ago | on: Show HN: Test your E-Mail for IP Leaks
racbart | 12 years ago | on: Show HN: Plug, the best way to discover new music on Mac
Just to let you know: I favorited a song (using menu bar) and then pulled to refresh in my favorites view. The song was shown twice on the list. Same after another refreshes. After restarting the app the song is shown only once, but after pulling to refresh it's doubled again. The second copy appears slightly after the first, so it's probably some list populating launched twice.
The app is awesome and I loved it at the first sight. Thank you! I didn't know Hype Machine before, but they seem to serve some good music.
You should provide links to iTunes & Amazon to allow easy purchases if someone would like to add songs to their music library.
racbart | 12 years ago | on: Majority is not Enough: Bitcoin Mining is Vulnerable
They assume working as a malicious/selfish pool having less than 50% of hash rate, but still a significant portion of the total hash rate. All other miners that are not part of the selfish pool are called honest miners.
When selfish pool finds a block, they don't advertise it but continue mining their forked, private blockchain. They have an advantage of one block over the public blockchain now. Of course they have no chance of building longer blockchain in the long term, as they have less than 50% of hashing power and the public blockchain will always get longer after some number of blocks. But what they count on is this:
Scenario 1: honest miners discover a block and the public blockchain gets the same length as the selfish blockchain. They immediately publish their block as soon as they discover someone else discovered a block. They hope to create a race condition and a public blockchain fork - so that some hones miners will get the “honest” block, but some of honest miners will get their “selfish” block and start mining using it as a base. Having some of the honest miners on their side they have a chance that their fork will get longer and the “honest” fork will be declined by the network.
Scenario 2: selfish pool is lucky and discovers another block, giving their blockchain two blocks advantage over the public blockchain. They continue mining and they publish one block for every block discovered by the honest miners. This creates race condition with some of the honest miners on their side, but they still have some blocks found and not published. They publish all their remaining blocks as soon as their advantage decreases to one block. The network chooses their branch as it's longer and they get all the reward coins from their secretly mined chain.
Now, I know nothing about blocks discovery/notification mechanisms over the network and how fast it works, so an important question to someone knowledgeable is if this is a probable scenario that their block published only after some competing block has been found and published has still a chance to get to some significant number of honest miners first so that they start mining over their block - as this is required for their strategy to work.
If the above is viable, then this strategy of course requires some significant hash rate share, but I remember that even having 10% of total hash rate, the probability that you will mine couple of blocks in a row is quite high - and that's all you need to create situations when you have two-three blocks advantage over the public blockchain.
racbart | 12 years ago | on: This seem legit...
racbart | 12 years ago | on: Get information about any country via a RESTful API
This data is static, that is it very rarely changes. The whole dataset is also very tiny. It's just better to store this data in-house and don't provide unnecessary point of potential failure by using an external service.
An idea on how to make it more useful is to provide downloadable data dump in several formats suited for immediate import into various data stores. An extra addition might be modules for popular frameworks providing access to this (local) data in all the ways your web service does.
I'm not trying to diss, just trying to find some value for real world usage. The service is neat otherwise.
racbart | 12 years ago | on: Amazon Kindle Matchbook is live
racbart | 12 years ago | on: Dawn of a New Internet Era
شبكة (xn--ngbc5azd) — Arabic for "web/network"
онлайн (xn--80asehdb) — Cyrillic for "online"
сайт (xn--80aswg) — Cyrillic for "site"
游戏 (xn--unup4y) — Chinese for "game(s)"
Source: http://www.circleid.com/posts/20131023_first_new_gtlds_go_li...
racbart | 12 years ago | on: Why Apple Wants Its Software to Be Free
Lowering prices for next generations of their hardware is also a sign that they really want to put their foot in as many users' doors as possible. I think they rarely lowered hardware prices just couple years ago, before they had this massive revenue stream called App Store.
racbart | 12 years ago | on: Why I'm going back to capturing credit cards up front
racbart | 12 years ago | on: What is the best way to programatically detect porn images? (2009)
At the end of the day I doubt there could be a fully bulletproof and always correct solution using current state of tech. But you need to factor much more than just skin color if you try to build an automated solution to this problem.
racbart | 12 years ago | on: What is the best way to programatically detect porn images? (2009)
Nudity != porn and certainly half-nudity != porn.
I'd rather go for pattern recognition. There's lot of image recognition software these days that can distinguish the Eiffel Tower from the Statue of Liberty and it might be useful to detect certain body parts and certain body configurations (for these shots that don't contain any private body part but there are two bodies in an unambiguous configuration).
racbart | 12 years ago | on: Square Cash
racbart | 12 years ago | on: P2P encrypted email is looking for funding.
This looks terrible. GPG solves this problem by not having keys and addresses bound mathematically and relying on web of trust to match keys to addresses. You can always revoke compromised keys and start using new ones. You can't do that if the address is mathematically derived from the private key.
Our email addresses are our identities these days. Any system that aims to replace email needs to provide some safe recovery in case the keys/passwords are compromised. It's just too risky to have unchangeable password/key for your identity.
racbart | 12 years ago | on: It’s not just the iPhone 5S — the 5C sensors aren’t accurate either
2.7 degree off means that if you hang a one feet width shelf on your wall, one edge will be 0.72" higher/lower than the other. Would that matter to you?
racbart | 12 years ago | on: FBI struggles to seize 600,000 Bitcoins from alleged Silk Road founder
racbart | 12 years ago | on: Will Americans trust Al Jazeera America? It depends how they browse the web
racbart | 12 years ago | on: Disagreeing with Bruce Schneier: More Crypto is Not the Answer
Rights and freedoms are never granted, they have to be taken. We shouldn't opt-out from our right to privacy and if you stop trying to circumvent governments' spying efforts, you basically opt-out. Even if a single isolated action seems futile, you shouldn't stop doing it, because if you stop, then they'll know that they can do their thing and they can escalate even more.
The only thing that can stop them from escalating, and create enough political or legal climate to change things to grant us privacy, are the actions from ordinary citizens who try to defy, regardless of how futile that seems. If there will be only criminals and enemies who will actively fight and try to avoid total surveillance, then it will be clear that it's a tool specifically against criminals and enemies and it will conclude as the end of the story.
Example: https://www.npmjs.com/package/duplexer3 which has 4M monthly downloads just reappeared, published by a fresh npm user. They published another two versions since then, so it's possible they've initially republished unchanged package, but now are messing with the code.
Previously the package belonged to someone else: https://webcache.googleusercontent.com/search?q=cache:oDbrgP...
I'm not saying it's a malicious attempt, but it might be and it very much looks like. Be cautious as you might don't notice if some packages your code is dependent on were republished with a malicious code. It might take some time for NPM to sort this out and restore original packages.