Hacker News new | past | comments | ask | show | jobs | submit | Kikawala's comments login


I think that's something totally unrelated that just happens to have the same name. I don't see anything in their docs that even hints at a UNIX command called "lockr", let alone one that makes sense to call like that.


"The item you've requested is not currently available in Apple Music in the United States"


yeah. i mean just put an mp3 up on the web somewhere. ffs


Even more live views at the main page: https://www.foto-webcam.eu/


Below submission had over 1,000 votes before being flagged.

https://news.ycombinator.com/item?id=40117443


If you haven't already, this is probably a good time to switch to EdDSA keys. EdDSA signatures don't require RNG nor modular math unlike ECSDA signatures.


EdDSA signatures are specified to use deterministic nonce generation, so you're correct that they do not require randomness. But they certainly do require modular arithmetic in order to implement the elliptic curve operations!


Despite being fairly old, many systems still don't support eddsa. As an example, the reference browser/ca spec doesn't allow it: https://cabforum.org/working-groups/server/baseline-requirem.... Last I tried, even let's encrypt won't grant an ed25519 cert despite it being in tls 1.3 (2018?).


> Last I tried, even let's encrypt won't grant an ed25519 cert despite it being in tls 1.3 (2018?).

Talk to the CA/Browser Forum. §6.1.5 Keys Sizes:

> For RSA key pairs the CA SHALL:

> * Ensure that the modulus size, when encoded, is at least 2048 bits, and;

> * Ensure that the modulus size, in bits, is evenly divisible by 8.

> For ECDSA key pairs, the CA SHALL:

> * Ensure that the key represents a valid point on the NIST P-256, NIST P-384 or NIST P-521 elliptic curve.

> No other algorithms or key sizes are permitted.

* https://cabforum.org/uploads/CA-Browser-Forum-TLS-BRs-v2.0.2...

* https://cabforum.org/working-groups/server/baseline-requirem...

Ed25519 (and Ed448) was only 'recently' approved by NIST FIPS 186-5 in February 2023.


Then make your own CA.


I don’t think RNG or modular math were really the culprits here. PuTTY’s k value generation is deterministic and the biasing was caused by a mismatch of integer sizes and the resulting leading zeros. The offending operation is named mod, so that’s related to modular arithmetic, but the modulo (521 bits) was bigger than the SHA512 output (512 bits) from deterministic k generation. I linked earlier to a post where I break this down at the source code level.



Thanks for that. I will go through the whole video later but that at least covered the basic premise.

Essentially, due to the technique used for collision detection, tiny gaps in the geometry causes collision system to treat parts of the scene as having very thin walls that stretch to the top of the play space. Depending on if Mario's quarter steps align with this little gap means that a collision can be made despite it not being visible. Also explains why they impact Mario sometimes and not others.

Like throwing a marble through a mesh fence but you cannot see the fence. Odds are you will make it through but it is essentially chance.


This is exactly it, thanks!


  The drones did not carry dosimeters to measure radiation because they had to be lightweight and maneuverable
You can probably measure the radiation from the noise seen in the camera images.


"The San Francisco police department has arrested a man in connection with the burning of two Teslas, but he is not a suspect in the torching of a Waymo robotaxi in Chinatown last month as the department initially said. "


MaxCLL: 186 nit

MaxFALL: 147 nit

Very low light levels on this HDR Blu-ray.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: