<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: adament</title><link>https://news.ycombinator.com/user?id=adament</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 30 Apr 2026 10:09:24 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=adament" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by adament in "Free-threaded CPython is ready to experiment with"]]></title><description><![CDATA[
<p>But a synchronous function can and many do make network calls or write to files. It is a rather vague signal about the functions behavior as opposed to the lack of the IO monad in Haskell.<p>To me the difficulty is more with writing generic code and maintaining abstraction boundaries. Unless the language provides a way to generalise over asyncness of functions, we need a combinatorial explosion of async variants of generic functions. Consider a simple filter algorithm it needs versions for: (synchronous vs asynchronous iterator) times (synchronous vs asynchronous predicate). We end up with a pragmatic but ugly solution: provide 2 versions of each algorithm: an async and a sync, and force the user of the async one to wrap their synchronous arguments.<p>Similarly changing some implementation detail of a function might change it from a synchronous to an asynchronous function, and this change must now propagate through the entire call chain (or the function must start its own async runtime). Again we end up in a place where the most future proof promise to give for an abstraction barrier is to mark everything as async.</p>
]]></description><pubDate>Sat, 13 Jul 2024 08:16:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=40952612</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=40952612</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40952612</guid></item><item><title><![CDATA[New comment by adament in "Python types have an expectations problem"]]></title><description><![CDATA[
<p>This is function overloading, you can do the same thing in C++. In Python you type this using the overload decorator from the typing module.</p>
]]></description><pubDate>Mon, 29 Jan 2024 16:28:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=39178219</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=39178219</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39178219</guid></item><item><title><![CDATA[New comment by adament in "Shortening the Let's Encrypt chain of trust"]]></title><description><![CDATA[
<p>Would you care to elaborate which device it is? 12 years old means it at the most could have come with Honeycomb when you bought it. Has the base OS been updated since? It is great that you bought a device which presumably got OS updates for many years, unfortunately that is not common for android devices. And the problem is, if it did not get an OS update, the truststore did not get updated, and thus it does not trust the LetsEncrypt root CA sometime next year. Except for Firefox which luckily comes with its own root certificate list.<p>Iphone 7 got an iOS update to 15.7.7 in 2023 and its truststore contains the ISRG Root X1 certificate: <a href="https://support.apple.com/en-gb/HT212773" rel="nofollow noreferrer">https://support.apple.com/en-gb/HT212773</a> I am unsure which apps you cannot install but a quick look in the app store indicates that Zoom, LinkedIn, Notability, 1Password, Disney+ and Netflix all support iOS 15.7. And in my anecdotal experience I could find no app with a minimum OS requirement greater than 15.7. As far as I can tell you need to go back to iPhone 4S to find an iphone which does not support the LetsEncrypt root certificate. That device is only 11 years old, so still worse than your Android device. And I do not think there is a workaround by using a different browser like for Android.</p>
]]></description><pubDate>Tue, 11 Jul 2023 10:01:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=36678700</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=36678700</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36678700</guid></item><item><title><![CDATA[New comment by adament in "Shortening the Let's Encrypt chain of trust"]]></title><description><![CDATA[
<p>It is not a matter of the age of your hardware but your software. Ipad mini 4 got its latest OS update in 2023. The problem is that in the Android ecosystem it is unfortunately common to only have a short window of OS updates from the release date of the hardware.</p>
]]></description><pubDate>Tue, 11 Jul 2023 08:08:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=36677876</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=36677876</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36677876</guid></item><item><title><![CDATA[New comment by adament in "Shortening the Let's Encrypt chain of trust"]]></title><description><![CDATA[
<p>But usually these other devices can also update their software<i>, it is quite unique for the android operating system to run old and unupdatable software.<p></i>Or they should if they are web facing. For security reasons at least.</p>
]]></description><pubDate>Tue, 11 Jul 2023 08:06:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=36677861</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=36677861</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36677861</guid></item><item><title><![CDATA[New comment by adament in "Git and Jupyter Notebooks Guide"]]></title><description><![CDATA[
<p>But would you version it by storing it as output in an ipnyb file where it is overwritten if you rerun that cell? I would store the data in a versioned database or as separate data files in the repository (possibly stored in git-lfs). And I would store results of the analysis as data files / image files / whatever else, NOT as ephemereal outputs in an ipynb file. But I am pretty far down the “ipynb files are for local use only” path.</p>
]]></description><pubDate>Fri, 07 Jul 2023 17:03:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=36634771</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=36634771</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36634771</guid></item><item><title><![CDATA[New comment by adament in "{n} times faster than C"]]></title><description><![CDATA[
<p>If for some reason you really wanted to compute Fib(n) for ridiculously large numbers of n, you would probably use that [Fib(n), Fib(n-1)] = A [Fib(n-1), Fib(n-2)] for the transition matrix A = [[1, 1], [1, 0]] and thus [Fib(n+1), Fib(n)] = A^n [Fib(1), Fib(0)] and then use exponentiation by squaring to compute A^n directly and thus Fib(n) in log_2(n) steps.</p>
]]></description><pubDate>Fri, 07 Jul 2023 08:50:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=36629036</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=36629036</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36629036</guid></item><item><title><![CDATA[New comment by adament in "GIMP's 2022 Annual Report"]]></title><description><![CDATA[
<p>When I was a kid and trying to learn LaTeX this happened to me all the time on the library computers.<p>I do not think I have a point, you just made me remember some fun and dreadful moments.</p>
]]></description><pubDate>Mon, 30 Jan 2023 08:17:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=34577147</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=34577147</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34577147</guid></item><item><title><![CDATA[New comment by adament in "Bitwarden design flaw: Server side iterations"]]></title><description><![CDATA[
<p>I think your point is valid and important, especially considering the average user. However in my experience it worked surprisingly well with a long word based master password. Since I only needed to remember 1 password that I then used daily it was not that difficult. And typing it was quick since it was all lowercase which most keyboards are optimized for. However the issue came when I started using my password vault on my phone and tablet. I was way too slow at typing on them. I now have a 22 character password which takes the same time for me to type on a keyboard, maybe a bit slower, but is faster on my phone though still annoyingly slow.<p>As for 70 bits password, it might be enough, but you need a lot of iterations (2^58) if you want to completely make up for the lost security margin. Which will also be unusably slow in practice.</p>
]]></description><pubDate>Wed, 25 Jan 2023 17:28:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=34521259</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=34521259</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34521259</guid></item><item><title><![CDATA[New comment by adament in "Bitwarden design flaw: Server side iterations"]]></title><description><![CDATA[
<p>I am not a cryptographer but to my understanding, the number of PBKDF iterations is really only of concern for weak (low-entropy) passwords. If you know that your password has high entropy (>128 bit), for example because you generated it randomly uniformly from at least 2^128 possible outcomes[1], you are safe even if you used only 1 iteration. PBKDF is all about password strengthening, so if you are making changes for yourself the most effective change is just to use a secure password and stop worrying about key derivation functions.<p>[1] 28 characters in a single case, 23 characters if both upper and lower case are used, 22 characters if you include numbers, 12 words if you use a word list of 2000 words and sample uniformly</p>
]]></description><pubDate>Tue, 24 Jan 2023 08:08:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=34500853</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=34500853</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34500853</guid></item><item><title><![CDATA[New comment by adament in "Mold – A really fast linker"]]></title><description><![CDATA[
<p>If I recall correctly it is the standard libraries(such as libstdc++) that need this exception and not the compiler itself.</p>
]]></description><pubDate>Sat, 14 Jan 2023 23:03:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=34384998</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=34384998</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34384998</guid></item><item><title><![CDATA[New comment by adament in "End-to-end encrypted messages need more than libsignal"]]></title><description><![CDATA[
<p>That is good news, thank you! And I apologize for spreading incorrect information.</p>
]]></description><pubDate>Sun, 11 Dec 2022 09:28:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=33941644</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=33941644</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33941644</guid></item><item><title><![CDATA[New comment by adament in "End-to-end encrypted messages need more than libsignal"]]></title><description><![CDATA[
<p>Interestingly the FSF also requires copyright assignment for contributions to GCC, Emacs and some other GNU software.</p>
]]></description><pubDate>Sat, 10 Dec 2022 11:49:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=33931785</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=33931785</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33931785</guid></item><item><title><![CDATA[New comment by adament in "Quiet Quitting"]]></title><description><![CDATA[
<p>I had the same thought about the 200% thing. Actually I think it is either empty boasting or a difference of terminology. I understand giving 100% to mean: I give as much as I possible can. Giving 200%(or anything above 100%) sustainably for all your career sounds impossible by definition to me.<p>As an aside(since you used him for the author) I found it interesting that the author (according to her LinkedIn profile) is a woman. My initial prejudice was that giving so much more than everything to your work sounded like something that is only possible if you have a partner taking care of everything at home. And I immediately assumed this must be due to traditional family roles.</p>
]]></description><pubDate>Mon, 10 Oct 2022 15:30:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=33152642</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=33152642</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33152642</guid></item><item><title><![CDATA[New comment by adament in "Google loses EU appeal and is fined a record $4B"]]></title><description><![CDATA[
<p>But this is exactly what happens when you fine a company.<p>Unless you fine the company enough for it to go into bankruptcy in which case the shareholders are protected by limited liability and the creditors take the hit instead. But the bankruptcy angle is completely irrelevant to this case, none of the fines considered are close yo bankrupting Google.</p>
]]></description><pubDate>Thu, 22 Sep 2022 15:03:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=32939840</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=32939840</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32939840</guid></item><item><title><![CDATA[New comment by adament in "The search for dirt on Mudge"]]></title><description><![CDATA[
<p>My understanding is that under current EU market abuse regulations trading on inside information* that you overheard on the train is still insider trading. Sharing inside information in a manner not required to fulfill your role (i.e. with an analyst if you are a regular employee, or with a specific analyst before the general analyst community if you are the management) is also a violation of MAR (dissemination) even if nobody trades on it. It is only if the information is public that you can trade on it (with an exemption for market makers).<p>* Under MAR confidential information is not necessarily inside information, as one of the prerequisites for the information to be inside information it must be likely that it has a significant effect on the price of a financial instrument if made public.</p>
]]></description><pubDate>Wed, 14 Sep 2022 19:22:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=32842007</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=32842007</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32842007</guid></item><item><title><![CDATA[New comment by adament in "The Low Energy Trap"]]></title><description><![CDATA[
<p>Does it? The opening poster specifically wrote: “we need to produce less, consume less” that is not just non-geometric growth but negative growth. So in this case the opposite of live small can simply be zero growth, or further exponential growth for a limited time and then zero growth or linear growth.</p>
]]></description><pubDate>Sat, 20 Aug 2022 08:53:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=32530503</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=32530503</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32530503</guid></item><item><title><![CDATA[New comment by adament in "There aren't that many uses for blockchains"]]></title><description><![CDATA[
<p>No GP is arguing that since the blockchain cannot solve any of the mentioned problems, it does not provide any real benefit. The dispute for companies today are seldomly about whether they signed a contract (the part the blockchain could help settle - though you still need to provide the legal entity -> cryptographic key mapping) but how to interpret the contract and align the legal world(words on a page) with the real world (widgets delivered, machines broken, etc.).<p>If the problem was about enforcing a signature, you do not need a blockchain, each party to a contract can just store the cryptographic signature themselves or with one or more trusted custodians. That is a fundamental feature of cryptographic signatures not blockchains. And then you need some mapping from legal entities to public keys, but this might as well be a centralized database run by the government (potentially outsourced to a private contractor), after all in many jurisdictions the government already keeps a list of legal entities and metadata about them.</p>
]]></description><pubDate>Thu, 11 Aug 2022 09:35:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=32423395</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=32423395</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32423395</guid></item><item><title><![CDATA[New comment by adament in "There aren't that many uses for blockchains"]]></title><description><![CDATA[
<p>Assuming you are allowed to transfer into the base layer. Most currencies and finance have a similar decentralized base layer: Cash. However in many jurisdictions your ability to transfer into that base layer is severely restricted due to money laundering, anti-terror-financing and / or currency-control regulation.</p>
]]></description><pubDate>Thu, 11 Aug 2022 07:24:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=32422561</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=32422561</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32422561</guid></item><item><title><![CDATA[New comment by adament in "How fast is 12th Gen Intel Core?"]]></title><description><![CDATA[
<p>It does not make everybodys lives easier, it makes your life easier by easing the support burden at the cost of making the lives of those who have to live with those policies (marginally?) harder (or more annoying). It is quite a bold claim that those of us who do not shut down our laptops every night have no reason to do so, and you know better than us that it would come with no additional cost to us to do so.<p>It might very well be that it is preferable to the organization as a whole to sacrifice a bit of productivity everywhere for less burden on IT. But IMHO it should not be a decision which the IT department can make in isolation.</p>
]]></description><pubDate>Tue, 09 Aug 2022 13:41:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=32397719</link><dc:creator>adament</dc:creator><comments>https://news.ycombinator.com/item?id=32397719</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32397719</guid></item></channel></rss>