throwawayReply | 8 years ago | on: Why it took a long time to build the tiny link preview on Wikipedia
throwawayReply's comments
throwawayReply | 8 years ago | on: How North Korea’s Hackers Became Dangerously Good
Now that is propaganda.
throwawayReply | 8 years ago | on: Viability of unpopular programming languages
https://www.tiobe.com/tiobe-index/visual-basic-dotnet/
There is no way that in reality visual basic is surging up the charts and more popular than most other languages, instead I would guess they are attributing some .Net results to VB instead of C#.
for comparison, this is the google trends chart of visual basic: https://trends.google.com/trends/explore?date=all&q=visual%2...
throwawayReply | 8 years ago | on: Singing road strikes wrong chord with Dutch villagers
throwawayReply | 8 years ago | on: Exit scammers run off with $660M in ICO earnings
if I sell 100 tokens for a dollar then convince someone to buy 1 token for 10 dollars, if I run off with the money I've not run off with $1000 even if it feels like it for the people left with tokens.
throwawayReply | 8 years ago | on: Kafka, GDPR and Event Sourcing
That is what this article is about, and methods to deal with that.
throwawayReply | 8 years ago | on: GDPR and automated email marketing
throwawayReply | 8 years ago | on: Web Authentication: Proposed API for accessing Public Key Credentials
2. A fingerprint hash isn't a cryptographic hash because you need to be able to match to nearby matches. A small variation in input needs to have a small variation in the hash so a distance function can be applied.
Those are terrible properties for a password.
throwawayReply | 8 years ago | on: Web Authentication: Proposed API for accessing Public Key Credentials
edit: The original headline before being changed, "Web standard brings password-free sign-ins to virtually any site", and contained a paragraph espousing fingerprints in place of passwords.
throwawayReply | 8 years ago | on: Common Mistakes in Firebase Security Rules
How does cascading make sense at all if lower-down rules don't supersede higher rules?
throwawayReply | 8 years ago | on: Probabilistic Filters By Example
My multiset was:
a, b, c, d, e, f, g, h, j, abc, def, asd, asds, 3g46stb6vy6vsyosyvosfsdfsdsah, oooooooooooooooo
Then trying oooooooooooooooo a second time, the bloom filter correctly says it might be in the set. The cuckoo filter says it is not.I assume this is just a javascript bug in implementation, because previously the filter said it might be in the set, actually adding it to the set then gave a false negative when trying it again.
throwawayReply | 8 years ago | on: Facebook Container Extension: Take control of how you’re being tracked
Obviously this would need a white-list (and a pair<from,to> whitelist, not just "this domain is OK list) to allow SSO scenarios.
throwawayReply | 8 years ago | on: Facebook's Zuckerberg will not appear before British MPs
throwawayReply | 8 years ago | on: You probably don't want to run Firefox Nightly any more
throwawayReply | 8 years ago | on: Ask HN: Why is PayPal's password length limit still a thing?
https://security.stackexchange.com/questions/39849/does-bcry...
Given this, it seems reasonable to restrict input below a length where the password will become (effectively) truncated by blowfish.
That length is also well above 10 characters however.
throwawayReply | 8 years ago | on: Google and LG creates VR AMOLED 120 Hz at 5500 x 3000
For that you'd need multiple displayport cables.
throwawayReply | 8 years ago | on: What Works and Why: Opus Magnum
Personally I managed to keep up with the global optimums early on in the shenzhen campaign but as it went on my solutions were progressively worse than the population. (Or least the portion of it left still completing those puzzles.)
The personal satisfaction is still the main driver of course, I think having the base binary "solved or not" solution is a good way to gate progression as you can choose to optimize as you go through or do a success pass and then revisit for optimisations which suits different play styles. (Personally I like to optimize as I go).
throwawayReply | 8 years ago | on: Eve Online Chat Is Moving to Ejabberd
throwawayReply | 8 years ago | on: Securing your Linux web server
throwawayReply | 8 years ago | on: CRPG Book Released
The game itself is was fun, more than tricky (almost impossible for the 9 or 10 we were at the time) and there aren't many games which combine all it's best elements. As the book says, the custom spell rune system was a treat. Creating a spell which shot a missle which exploded and also fired other missles around it was really fun.