Hacker News .hnnew | past | comments | ask | show | jobs | submit | captn3m0's commentslogin

Libra/Diem got sold to the bank they were partnering with (Silvergate) for $200M, which then filed for Bankruptcy.

https://en.wikipedia.org/wiki/Diem_(digital_currency)


https://en.wikipedia.org/wiki/Illegal_number has lots of examples. The color of your bits matter.

The best bet would be to factor satoshi's keys, and then publish them on something like OEIS for some novel-math reason, and let someone else steal them for you.


You can run Lotus 1-2-3 for Unix in modern Linux : https://github.com/taviso/123elf

Lotus 1-2-3 was the first spreadsheet I ever used around age 9 so this is really bringing me back!

I am shy to admit I used visicalc on an HP-85.....1980 ?¿? maybe...I learned the periodic table with a basic program I made on that piece of art.

What a great name :) ("elf" = 11 in German)

what's the relevance of 11 in this context?


I loved the author’s bio:

> Curt Cox is a 26-year-old, die-hard Dr. Who fan and Atari fanatic. His family bought an Atari 800 cassette system in 1982. He reads Adams, Asimov and ANALOG Computing. His extensive journalistic and programming talents are often overlooked because of his unnaturally good looks.


I'm trying to decide if I think it's more likely he wrote this bio or his mom did.

Antichamber (2013) is also worth mentioning: https://en.wikipedia.org/wiki/Antichamber

That game is so mind-bending

You can shorten your JSON queries using arrow notation in sqlite.

    SELECT
    settings -> '$.languages' languages
    FROM
    user_settings
    WHERE
    settings ->> '$.languages' LIKE '%"en"%';
I use them heavily with my jekyll-sqlite projects. See https://github.com/blr-today/website/blob/main/_config.yml#L... for example.

> If [..] we would receive a similar [DMCA] notice, then we most likely would have to disable the repository until the matter is resolved by court ruling if such is fought through by the project owners. This could include the code, issues, and documentation, which would immediately threaten/weaken the development community around that project.

https://blog.codeberg.org/on-the-youtube-dl-dmca-takedown.ht...


This only works for post-install script attacks. When the package is compromised, just running require somewhere in your code will be enough, and that runs with node/java/python and no bwrap.

node is also sandboxed within bwrap I have sandbox -p node if I have to give node access to other folders, I also have sandbox -m to define custom mountpoints if necessary and UNSAFE=1 as a last resort which just runs unsandboxed.

Just came back from the show. Loved it. Might go back for an IMAX viewing. I liked the book as well, and thought it was a good adaptation.

Cried a lot.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: