Hacker News new | past | comments | ask | show | jobs | submit | mrln's comments login

The link does not work.


Worked fine for me.


Firefox seems to load it ok, if that helps.


The few times I built TUIs with ncurses I wondered: why do I have to program so much by myself? ncurses is so basic, I didn't have too much fun building UIs with it (more than once). Is there a wrapper or a more modern alternative out there that provides containers and widgets like most GUI frameworks do?


Sadly, I think the modern alternative for ncurses-based interfaces is javascript.


It is not the node that chooses the next one, but the client. A bad node cannot "fake" a good node, because it cannot cryptographically authenticate to be the new node the client selected (the client knows the public key of the newly selected node).


Yes, you can.


Is OSM not free-as-in-freedom?


AFAIK it is, but I thought I'd stick to claims I was all but certain of when posting from mobile and (because of that) not fact-checking

Bit of an ironic one to leave out though, considering my preferences with most of the software I use and enjoy.


> Where do you think the N in NOR and NAND come from?

That makes it sound like you could also do a NOT with XNOR, which is only the case if you can use a constant 0. But that would similarly also be the case for a XOR, but with the requirement of a 1.


That’s cool, but I meant to imply it is kind of backwards to make a NOT gate with a component that itself is fundamentally built out of a NOT gate.


> Open source isn’t handed down from God, it starts with one person deciding to type mkdir.

So poetic! I love that sentence!


It's not cosmetic in this case. As others have already pointed out, the elvish version handles a few minor but important special cases that bash does not handle.


If we're recommending YT channels, I'll go with bycloud. Very much likes talking about open models. However, the videos are very meme-fueled and not too technical. And they could be more frequent. But they help keeping me up to date.


What makes you say that? I haven't started reverse engineerinng it myself, but from all I have read, people who did have a very good understanding of what it does. They just can't use it themselves, because they would need to have the attacker's private key.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: