uasm | 5 years ago | on: ICANN delays .org selloff after California’s attorney general intervenes
uasm's comments
uasm | 5 years ago | on: Tell HN: C Experts Panel – Ask us anything about C
Opened a random part of musl out of sheer boredom. Here's what I see:
https://git.musl-libc.org/cgit/musl/tree/include/aio.h
A bunch of return codes #defined like so (see https://git.musl-libc.org/cgit/musl/tree/src/aio/aio.c):
#define AIO_CANCELED 0 #define AIO_NOTCANCELED 1 #define AIO_ALLDONE 2
#define LIO_READ 0 #define LIO_WRITE 1 #define LIO_NOP 2
#define LIO_WAIT 0 #define LIO_NOWAIT 1
Why weren't they using an enum instead? I wouldn't sign off on this code (and I don't think it lives up to best practices).
uasm | 6 years ago | on: ‘War Dialing’ tool exposes Zoom’s password problems
Strange and snarky comment for a "Chief Technical Officer". Software constantly evolves, it's a process of continuous refinement.
Zoom's past success may have been partially attributed to "1st gen engineers" hitting the jackpot. Zoom's fate right now rests on the ability of those "2nd generation engineers" to keep the show going.
uasm | 6 years ago | on: Opera to support sites using the .crypto top-level domain
uasm | 6 years ago | on: X11 screen locking: a secure and modular approach
uasm | 6 years ago | on: Waymo Via
Sure.
Tuning in to last week's news - "Mass layoffs reported after Starsky Robotics fails to find buyer, investors" [0]. Starsky had a demonstrable path to "reduce the number of humans needed to haul cargo". What gives?
md5person | 6 years ago | on: Routed Gothic Font
So, a given "specification" (how a font looks to the human eye) can have many different "implementations" (ie. TTF files). The specific "implementations" themselves can be copyrighted, but somehow not the "specifications"?
If so... assume one TTF file which is copyrighted, pay-per-use license. Assume another TTF file, which is open-source, free to use and redistribute. The files both implement the "Helvetica" specification, rendering the same letters to the human eye. How "different" must the free implementation be from the paid one, for it to not be considered an infringement?
uasm | 6 years ago | on: Routed Gothic Font
How does this work from a copyright/legal perspective?
uasm | 6 years ago | on: Wasm3 – A high performance WebAssembly interpreter in C
uasm | 6 years ago | on: Wasm3 – A high performance WebAssembly interpreter in C
If the hardware executing this code is "stack-based" (or, does not offer enough general purpose registers to accomodate the funtion call) - this will need to be converted back to a stack-based function call (either at runtime, or beforehand). Wouldn't this intermediate WASM-to-register-based-bytecode translation be redundant then?
uasm | 6 years ago | on: Benchmarking DNS response times of TLDs
uasm | 6 years ago | on: Still Why No HTTPS?
Most websites now and days are over engineered."
That's awesome! Mind sharing some more details? (hosting plan/CDN/etc). Or even the URL?
uasm | 6 years ago | on: Really Fixing Getrandom()
How safe is it to use CPU jitter in a virtual machine?
uasm | 6 years ago | on: Chrome 77 Breaking Drag and Drop Events
(Quoted a comment from the thread on https://bugs.chromium.org/p/chromium/issues/detail?id=100574...)
Wasn't this specific version of Chrome rolling out to production users world-wide? Clearly there was a subset of users that was impacted by this (otherwise, a report wouldn't have been made in the first place). Not sure why they're asking the reporter about the state of their specific project?... :\
uasm | 6 years ago | on: VPN⁰: A Privacy-Preserving Distributed VPN
That's not a bad idea, actually. Who maintains those whitelists and how do they get updated? If you want to make the web somewhat usable for others, is it enough to whitelist "google.com"/"youtube.com" only (for example)?
uasm | 6 years ago | on: Which companies are using Erlang, and why?
uasm | 6 years ago | on: Show HN: Darklang
I agree.
> "There is a large - and growing - population of technically-minded people who understand the core concepts you're referring to (REST APIs, databases, HTTP, etc) and have ideas or needs for applications, but don't have the experience required to build non-naive implementations of their ideas."
Sure, but one could argue the Darklang approach is actually not that far from a "naive implementation" of those ideas. There's only so much you can do with prefab code and lock-in tooling. There's definitely a market for "Wix for SaaS software", but does Darklang strike the right balance?
md5person | 6 years ago | on: Show HN: Darklang
I don't see how the target can be entirely non-technical people, since this still assumes some knowledge around databases/functions/REST/HTTP/Schemas/etc.
Technical people have very little reason to use this, since this platform is a walled garden of proprietary tooling, and there's only so much you can achieve with abstractions and fancy ORM. You won't be able to break out of the mould when the time comes, so why waste your time in the first place? Do it right the first time and maintain your flexibility and freedom later on.
I believe the only remaining target audience here is technically-inclined people that want to build a cheap prototype quickly, just to test ideas. This is a playground basically.
uasm | 6 years ago | on: Israel accused of planting mysterious spy devices near the White House
Honest question:
Would WikiLeaks "work" if all we had was anonymous "former officials" making broad/general statements, providing no proof whatsoever?
What about Snowden's leaks? Imagine a really long article on Politico listing every single thing exposed in the Snowden docs, but without the names/documents/specifics. In a style very similar to what we have here in this Politico piece. Without us even knowing it was leaked by Snowden, but by some random "former NSA official".
Look, I'm not saying this Politico piece is right or wrong. All I'm saying is - this piece is making very big statements, backed by absolutely no proof whatsoever. And yet people are taking out the pitchforks... this isn't journalism, it's just spreading unsubstantiated FUD. And we should be discouraging this, not defending it.
uasm | 6 years ago | on: Israel accused of planting mysterious spy devices near the White House