Hacker Newsnew | past | comments | ask | show | jobs | submit | rollulus's commentslogin

I think “simulate” would’ve been a more accurate word than “build”.

I also expected hardware to be involved. But in the context of a list of tutorials on how to use this live coding tool the title makes sense though.

They miss out how not-square the "square wave" is for a start. Its pulsewidth varies wildly across the compass.

I think you're right. We have a `pwm(hz,width)`[0] but I didn't try it. Was more focused on the ramp/sawtooth. Can't decide which one sounds better.

[0]: https://loopmaster.xyz/docs/generators/pwm


Always the square for classic acid house - the saw is better for more modern (and worse ;-) distorted acid techno

Well that depends on your luck, it could be a valid one about 1/16th of the time.

1/64, actually, because RFC-compliant (variant 1) UUIDv4 requires fixed values for both the version nibble and two bits of the variant nibble.

The fact that we're discussing this at all is a reasonable argument for using a library function.


While it might be invalid, will most libraries choke if you give them a pseudo UUIDv4?

What do you mean? Are you talking about validation of UUIDs?

If you generate random bytes, which are unlikely to conform to the UUIDv4 spec, my guess is that most libraries will silently accept the id. That is, generating random bytes, will probably work just work.

But what libraries are you talking about? What is their purpose?

Nice, thanks and I agree.

Anyone knows why this is called “decryption”? I thought that the mechanism was simply a fuse that would deny reading/debugging operations, is there actual crypto involved?

This article (with high slop vibes) and another article on their site (linked in the comments) seem to suggest that post quantum encryption mitigated the Sybil attack, without explanation. I fail to understand how the two are even related.


Definitely generated, testing a ML model I'm training. it flags as claude mostly.


Came here to say this. Seems like the attack was an accident and it ended. Nothing was mitigated


Cool theory but that should result in other attacks that peak in February too, can you give examples?


[citation needed]


So do I read it correctly that good old detective work did the job, and that breaking e2e encryption and client side scanning wasn’t needed? Politicians tell me a different story.


This is actually both.

It's not a big secret to journalists that such stories are just another kind of entertainment that never fails to attract the public. Certain people constantly work in that genre.

Readers want to be assured that something is excluded. I visit the good sunny side of the internet, and horrors are on some “darknet”. I live in the better part of the town, and horrors happen in bad districts. Me and my friends are “normal people”, never “victims”. Wars are far away. I am not responsible for anything.

Certain people's careers are made in such pandering.

So they tell a thrilling detective story, and at the same time publicly shame Facebook to make people think that more control over “important services” and more backdoors are needed. Only for serious cases, of course. You wouldn't want to support those people, would you? Good. Now show us you licence number for internet usage.

Lies upon lies upon lies.


Not that I agree with either of those things but I think the implicit argument is that breaking encryption would lead to faster arrest and fewer years of abuse for the victims.


They don't even arrest pedophiles when they have them on video tape and a client list when the president is on them. This has all become one big joke, justice I mean. There is no justice.


You’d think so, but the police already have tons of methods they don’t use. The bottleneck is always staffing, not crazy shit they wouldn’t even be allowed to use.


Except people wouldnt post such material to TOR if they knew the crypto is backdoored. They'd post it to an alternative that ignores the law


I thought that your “background in literature” contributed to the “well-written docs”, but that was LLMs!


No, I was helped (.md files only) by AI to rewrite but the majority of the doc is written by myself, I just asked for help from the AI for formatting for example.


Anecdotal, and even meta-anecdotal, but hey: four months ago I started to supplement omega 3 thanks to this hyperbolic HN comment: https://news.ycombinator.com/item?id=45169875

Unlike the commenter, I didn’t suddenly turn into a chess grandmaster, but I did notice that my winter blues didn’t show up this year, the first time in a decade!


Not weird, that’s tradition by now.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: