Hacker Newsnew | past | comments | ask | show | jobs | submit | bspammer's commentslogin

The best antidote to this kind of thinking is to realise you would have been tempted to sell so may times over the last decade, that there's close to zero chance that you'd still be holding it today.

To make a lot of money with bitcoin you either need to have been a true believer for a ridiculously long period of time, or find the password to an old wallet you'd forgotten about.


Kotlin and even modern Java are both preferable for me. There’s no shortage of JVM roles.

If your entire stack is using optionals then Java can be acceptable. It’s not a terrible language otherwise. Checked exceptions are a failure IMO because they only check for some types of errors.

Yeah that surprised me too - I would have assumed that ZFS had a bunch of "store and retrieve" tests in many different configurations that would have caught this.

No amount of in-transit encryption can help when google controls the OS.

It's unexpected to me that someone with the technical knowhow to build spyware like this and a nice web interface for it, made basic mistakes like storing passwords in plaintext and piping unescaped user input into database queries.

I'd be willing to bet that getting their user's passwords is part of their goal. So they would need to be stored somewhere.

Something I've learned over the years is that even very talented developers can be really bad at security.

In many cases it's just not something that's taught at school or that is covered in training. So it's a mindset that just isn't there, even when they're great at other parts of the craft.

If you're building anything that is going to be exposed to the public Internet and you aren't, at some point, going through the exercise of "how can people break or abuse or hack this" then you're missing a step for sure.


Malware developers often prioritize functionality and speed-to-market over security hygiene, operating under the "security through obscurity" fallacy that nobody will bother attacking their infrastructure.

They probably just didn't care to

It's one of my most used utilities, as someone who can't help but nerd-snipe myself on the regular. Example questions that I've used it for, just in the last week:

If I work 42 hours/week, how many minutes is that per year?

I've downloaded 4.91GB in the last minute, what's that in Mbps? How long will it take to download a 76GB game?

This AWS feature costs $0.045/hour, how much is that per month?

This guy I read about traveled 58,000km in 27 years, what's his average speed in m/s?

How much would a 10cm sphere of gold be worth in GBP?

If a 36 inch pipeline can deliver 25580 acre-feet of water in a year, how fast is the water flowing in m/s?


Also check out Kragen's examples from a thread a couple of years ago!

https://news.ycombinator.com/item?id=36988917


Wow, that’s an awesome resource actually. Thanks!

> How much would a 10cm sphere of gold be worth in GBP?

Is there some trick to this? Or do you have to input it like:

You have: 4/3pi(10 cm)^319320 kg/m^345000 GBP/kg

(What ChatGPT gave me)


units has (I assume room temp/pressure) densities for all elements, as well as some precious metal prices and currency exchange rates (you need to run the units_cur program regularly to update the database for these). It also has tab completion to make discovering these a bit easier.

The invocation is

You have: goldprice * golddensity * spherevol(10cm/2)

You want: GBP


Neat! Thank you!

TIL -- thank you, brother!

You can just save a step and ask ChatGPT the answer. It can google the current spot price of gold.

Sure, but then I need to do all the math to verify the answer it gives me isn’t gibberish anyway.

You can just save a step of double-checking everything by using WolframAlpha

https://www.wolframalpha.com/input?i=%2810cm+sphere+of+gold+...


What if its wrong

>25580 acre-feet of water

This is why we can't have nice things.


That makes sense to me for any image you want to share publicly, but for private images having the location and capture time embedded in the image is incredibly useful.


If you are uploading it to a website you are sharing it. Even if the image is supposedly "private" you have to assume it will be leaked at some point. Remember, the cloud is just someone else's computer, and they can do what they want with their computer. They may also not be entirely competent at their job.


Yes, once something has been shared (or stolen), you lost control over it, be it information or an image. EXIF data is fine, if it never leaves your device or if your device is not compromised.


If by private you mean "never shared", I agree.


This is a feature that could probably be added to sponsorblock. They have the data already.


Twitch seems to have won the war against adblockers by injecting directly into the video stream. It’s been months now and I still see ads. I assume it isn’t as easy as you say to skip them otherwise uBlock would have done it already.


The core difference is that when Twitch plays an ad, they'll never send you that part of the video. [1] So buffering doesn't help. If YouTube would do this, you could have a custom player that preloads enough of the video so that all ads could be automatically skipped and as a viewer you wouldn't notice their existence. However, on Twitch, even if you're willing to give up the live factor and would buffer, you still would have missing parts of the video where an ad was placed. So you would lose content. [2]

--

[1] They do send a super low resolution stream with no audio, but not the actual quality you are watching in.

[2] Right now Twitch does not stop sending content in markets where they don't have ad inventory. So there are actually browser extensions already that will use a custom foreign market server to proxy the video during ad breaks, so that you can still have an 100% effective ad blocker.


For livestreaming it's easier because you can't skip forward anyway


I was also surprised by this, does that mean it used to be impossible to not have a publicly routable IP in AWS?


Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: