Hacker Newsnew | past | comments | ask | show | jobs | submit | salibhai's commentslogin

If they are on the MS Stack, Azure can help with scaling.


What's the difference exactly?


Bitcoin are not destroyed except by accident, it's just that the creation of new bitcoins will eventually taper off to zero. Deflation will only occur if demand continues to rise, which is likely but not guaranteed.


Looking at the source code.. wow.. just wow https://github.com/benjojo/APLPrimeCheck/blob/master/prime.a...


Any benefit to Yubikey over Authenticator? EDIT: good points here: https://bitcointalk.org/index.php?topic=159444.0


This is old. They old Yubikeys with HOTP provided some advantages over authenticator, but new Yubikeys provide U2F which is much more resilient against phishing attacks.

https://www.yubico.com/applications/fido/

Moreover, U2F does not present itself as a USB keyboard (which had security implications on X11, since every application can listen in on keyboard events.)


Pretty cool that you can make an online moneybag like this. I wonder what other creative gaming (easter egg hunts?) can occur from using this concept


There are a few bounties set up in the blockchain itself. For example, here are some that pay out if you submit a verifiable hash collision for various hashes https://bitcointalk.org/index.php?topic=293382.0 and an explanation https://www.reddit.com/r/Bitcoin/comments/1mavh9/trustless_b...


Seems like a bad idea turning off phishing notifications and browser warnings

http://kb.mozillazine.org/Browser.safebrowsing.enabled Firefox 2.0 incorporates the Google Safe Browsing extension in its own Phishing Protection feature to detect and warn users of phishy web sites.


I think using a blocker extension like uBlock Origin restores (at least partially) this functionality without involving Google.


Right, but then you're just changing who you leak data to, you're not stopping the leak.

EDIT: wow, downvotes? Getting a list from EasyList is just as much a leak as getting a list from Google. Someone has your IP either way.


> Getting a list from EasyList is just as much a leak as getting a list from Google. Someone has your IP either way.

The problem with SafeBrowsing isn't downloading the list, it's that it sends data back to Google if it finds a match. Malware lists with AdBlock plugins don't do this.


My understanding was that Google's malware list is a two prong approach:

  1: An all-in-one lump download of blacklists
  2: Optionally, "Enhanced" also sends hashed URLs to Google in case specific sub-pages aren't on the list, etc
Easylist, of course, only offers #1. Firefox, by default, uses both, which is less private, but seemingly still configurable to use only #1.

Citations:

http://www.google.com/tools/firefox/safebrowsing/faq.html

https://developers.google.com/safe-browsing/firefox3_privacy...

http://www.pclinuxos.com/forum/index.php?topic=124878.0


Yeah. I personally don't care if something is from Google but other people do. I'm quite surprised this stupid list that doesn't even explain what each setting actually does is on page 1.

(Edit: Oh, it seems it was updated in the meantime.)


It does send your IP address to Google, when you download the filter. And I can't tell if "Enhanced Protection" is enabled which actually sends your URLs to Google.



I couldn't find Browser.safebrowsing.remoteLookups in my about:config. Does it still apply?

upd: I am searching for it in the Firefox sources now. Just for curiosity: there are 117512 files in 8610 directories totaling 743 MB, and search in files is really slow even on SSD.


browser.safebrowsing.remoteLookups works indeed, I could confirm this using Fiddler. For some reason, Notepad++ couldn't find a mention of 'remoteLookups' in sources.


    > time egrep -Rni remotelookup . 
    ./toolkit/devtools/gcli/source/lib/gcli/types/selection.js:81:    spec.remoteLookup = (typeof this.lookup === 'function');
    ./toolkit/devtools/gcli/source/lib/gcli/types/selection.js:128:  if (this.remoteLookup) {
    egrep -Rni remotelookup .  2.01s user 0.32s system 99% cpu 2.346 total


A key that's not in the config file uses the defaults. You can just add the key by going into about:config , right clicking anywhere in the list, and choosing New, and in this case, boolean, and set it to false.




What about interrogation and exclamation marks?


%3F. I got it


From January 2015


Futures sounds a lot like Promises to me. Or am I wrong?


Yes, the two terms are unfortunately both synonymous (comparing different implementations of the pattern in different languages), and usually have specific meanings in the context of any given implementation. Often, as here, Promise is the write handle and Future is the read handle.



Senders hold promises, and receivers hold futures. A promise represents a "promise" to deliver a value at some point to the holder of the future.


In Canada, I used to get a lot of recruiters contact me from Monster and Workopolis, but now I get a lot from LinkedIn. Just a few days ago a manager at Amazon reached out to me on LinkedIn. So it's definitely helpful, I wouldn't discount it.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: