Hacker Newsnew | past | comments | ask | show | jobs | submit | dilawar's commentslogin

Reminds me of mercurial cvs!!

Yes it's bad enough that there's a chg to (barely) improve the command laten y.

(Side note this is why jj is awesome. A `jj log` is almost as fast as `ls`).


might is right. /s

A couple of years ago, I went through the process of signing a kenel minifiter that I wrote for our endpoint-security product. It was complicated, to put it mildly.

Imagine if we had a similar process for websites! Thanks Let's Encrypt.


Can't zero knowledge proof solve this problem?

Submit a zkp that you are over 18 to the website that requires it. The proof need not be tied to the identity of the user.

I personally don't think self-regulation works. It's harmful so the next best option is the government regulating it.


Problem? That's the intended result.

Doesn't matter if they can, because that's not how any of the shot callers want it done.

That is in fact how it is being done in the US and the EU.

This is how the eu standard for digital ID works already, the above post is uninformed fearmongering.

reminder - you have been mind read. whole this privacy talk is ridiculous

> I've always assumed peer review is similar to diff review. Where I'm willing to sign my name onto the work of others. If I approve a diff/pr and it takes down prod. It's just as much my fault, no?

Ph.D. in neuroscience here. Programmer by trade. This is not true. Less you know about most peer revies is better.

The better peer reviews are also not this 'thorough' and no one expects reviewers to read or even check references. Unless they are citing something they are familiar with and you are using it wrong then they will likely complain. Or they find some unknown citations very relevant to their work, they will read.

I don't have a great analogy to draw here. peer review is usually a thankless and unpaid work so there is unlikely to be any motivation for fraud detection unless it somehow affects your work.


> The better peer reviews are also not this 'thorough' and no one expects reviewers to read or even check references.

Checking references can be useful when you are not familiar with the topic (but must review the paper anyway). In many conference proceedings that I have reviewed for, many if not most citations were redacted so as to keep the author anonymous (citations to the author's prior work or that of their colleagues).

LLMs could be used to find prior work anyway, today.


Put some mustard on your head and let a cow lick it dry... The pull will grow hair and the cow tongue will cleanse your aura.

irresponsible to not mention the risk of Cud Cap and Sympathetic Udder Syndrome. I even heard of one guy got Raging Horn

>the cow tongue will cleanse your aura

It's like that three-finger meme from the Tarantino movie, lol.


Something similar: Kolmogorov complexity.

There is a finite size program that can generate infinite digits of pi (in infinite time). Kolmogorov's complexity of pi is finite even when the object is infinite.

It's not very surprising that it takes a few GB of a program to encode conscious 'us'. Humbling to think about it though...


For a demonstration of Kolmogorov complexity, it's good to watch "A mind is born"[0] by lftkryo. It's only 256 bytes, but can generate over 2 minutes of complex music and video. Also, the name is appropriate for this topic :D

[0] https://www.youtube.com/watch?v=sWblpsLZ-O8


Yeah but pi digits are essentially random noise, but any human is a precisely build system. E.g. there are exactly two identical eyes with nerves going to this precise area of brain, every time.

It's more like mega-efficient archive utility that unzips a few GB into a human, I just can't fathom it.


That's exactly the wrong way to think about it, and I'm surprised that so many devs think of it that way. We already have programs that works exactly like that (i.e. producing rich, complex output that would be many times the size of the input code + data if encoded raw): procedural generators. It's emergent complexity, not compression.


> It's emergent complexity, not compression.

They might be the same thing.

See also: https://news.ycombinator.com/item?id=31003493


That comment does not have anything to do with what we are discussing (i.e. R/DNA).


It should.

Original paper is behind a paywall and this article has no details

The abstract says

> Conditioned responses in this new magnetic map assay were unaffected by radiofrequency oscillating magnetic fields, a treatment expected to disrupt radical-pair-based chemical magnetoreception4,5,6, suggesting that the magnetic map sense of the turtle does not rely on this mechanism. By contrast, orientation behaviour that required use of the magnetic compass was disrupted by radiofrequency oscillating magnetic fields. The findings provide evidence that two different mechanisms of magnetoreception underlie the magnetic map and magnetic compass in sea turtles.



I keep hearing about this. I occasionally use PHP8 and so far I'm pretty happy with it. Is there any resource that teaches about security issues with modern PHP (version 8.x)?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: