Hacker Newsnew | past | comments | ask | show | jobs | submit | johnthescott's commentslogin

rule zero. reading is mostly work.

spread a false story in public news and monitor cell call graphs.

telcos already have strong teams themselves who monitor towers.


Regardless China was monitoring everything very easily.

https://www.pcmag.com/news/chinas-salt-typhoon-hacked-at-lea...


automate your fate.


spent a weekend with ai expert trying to get claude to grok a yacc grammar. claude confused the backus-naur of yacc itself with the grammar of my new language.


no need to store blob in database. too expensive.

why is blob storage even a "problem"? a crypto digest of the blob as a key covers vast majority of cases.

for blobs that do not change store only the crypto hash (160bits) of the large blob in the database?

    ripemd(sha256(sha256(blob)))
for the blobs themselves use any object store you please.

yawn.


a two bit, boolish data type used for simple replies from a network: true, false, null and waiting. called a "rummy".


funny.


brings back happy memories of my indigoII.


a bit of casual research will show you hegseth is much more than just a fox pundit.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: