Hacker News new | past | comments | ask | show | jobs | submit | rboyd's comments login

My wife believes that our success is due to her “manifesting” and “vision boarding”.

Meanwhile, I’ve work my ass off for what we have.


She seems unwell.

end of an era

linear.app seems ok


+1 for linear.app. It's somewhat similar in feel to PT. It's very responsive and has vim style key bindings. We switched a year ago and haven't looked back.


probably discussed in the bitcointalk thread, but how do we know it's not just the creator of the puzzle reclaiming his own bitcoin?


It got stolen from the original solver by someone who noticed the transaction and posted a bigger fee


By what means might you prove or disprove this theory?


Having the the solver post all 2^66 -2 incorrect private keys would prove that they solved it fairly and had no prior knowledge of the key.

You'd just need to download the 6,505,548 TB list of keys and re-derive the public key for each to check that they're valid; unfortunately it would take in the ballpark of a kiloyear of compute time assuming you have 3x RTX 3090s.


Quite a few projects in the home automation space would be well-served by open-source projects.

Where I live I get extreme lightning storms that take out some of my electronics quite often. I've replaced the boards that control my swing gates twice. They're like $400 per board. This year I got tired of paying that and I replaced them with DIY esp8266 + relay modules running esphome. But this could be wildly improved with custom open source PCBs.

Another example: I've spent a lot of money on robotic lawn mowers. There's a lot of room for a good open-source contender in this arena too. Some of the top of the line commercial mowers use RTK for gps positioning (no more boundary wire) and try to incorporate computer vision algorithms for planning, but they're not super amazing, and they're also not very hackable. If the entire stack was open source then I am sure a big community would sprout around it and I think the open-source robot would quickly become the best available. You can leverage other open source projects like ardurover to get going pretty quickly.

If you take on either of these please let me know and I'll be a happy customer #1.


FTA: "If we offload the RCA learning/categorization part to the LLM (whatever that means), we wouldn't be able to make much progress in the enhancing reliability and safety part."

But you don't offload it in the sense that you expect the tool to completely take the wheel.

You ask it for suggestions to inform a human. If the suggestions turn out to only be a distraction in your environment then you abandon the tool.

For plenty of environments the suggestions will be hugely useful and save you valuable time during an ongoing outage.


They are specifically talking about automating RCA, not about tool-assisted RCA.


Go read the papers on automated RCA. The algorithms are designed to suggest top K candidates for RCA. By definition at least k-1 are going to be wrong.

https://arxiv.org/abs/2305.10638


I've been working on similar lately. Changepoint detection over our metrics time series, and using that to inform automated root cause analysis.

I think your work was mentioned on our team channel this week.

I found these papers to be pretty interesting:

https://arxiv.org/abs/2305.10638 https://arxiv.org/abs/2402.02357

Anything else I should be reading?


remember Denthor's tutorials in Turbo Pascal? https://news.ycombinator.com/item?id=8837545

http://textfiles.com/programming/astrainer.txt

would be fun to get an old dos machine going with Pascal IDE and run through all those again


Thank you. I am glad to invite you into channel on libera https://news.ycombinator.com/item?id=41355232


Companies operate on a high level of fear and trust. This is the security vendor, so in theory they want those updates rolled out as quickly as possible so that they don't get hacked. Heh.


Seems like a modern operating system would have an automatic rollback mechanism for cases like this.


Windows has restore points that do this in the event of a failed update, but this wasn't Windows.


I guess after mapping the services used you would find the accounts worth going for and those become SIM swap targets


Seems like there's a lot of cross referencing well beyond MFA that this'll likely be used for.

Way easier to target phish people's bank logins, if you know what banks they are regularly communicating with.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: