<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: jewbacca</title><link>https://news.ycombinator.com/user?id=jewbacca</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 17 Apr 2026 13:07:46 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=jewbacca" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[StarCraft 2: Lowko vs. AlphaStar]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.youtube.com/watch?v=3HqwCrDBdTE">https://www.youtube.com/watch?v=3HqwCrDBdTE</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=20598763">https://news.ycombinator.com/item?id=20598763</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 03 Aug 2019 04:58:23 +0000</pubDate><link>https://www.youtube.com/watch?v=3HqwCrDBdTE</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=20598763</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20598763</guid></item><item><title><![CDATA[Mobile TEMPEST / van Eck setup]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.youtube.com/watch?v=BpNP9b3aIfY">https://www.youtube.com/watch?v=BpNP9b3aIfY</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=17650557">https://news.ycombinator.com/item?id=17650557</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 31 Jul 2018 04:32:19 +0000</pubDate><link>https://www.youtube.com/watch?v=BpNP9b3aIfY</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=17650557</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=17650557</guid></item><item><title><![CDATA[New comment by jewbacca in "Ecuador will hand over Julian Assange to the UK"]]></title><description><![CDATA[
<p>I've always considered this bit of writing from 2006 to be Assange's (and Wikileaks') central thesis:<p>----<p>"The non linear effects of leaks on unjust systems of governance<p>[...]<p>The more secretive or unjust an organization is, the more leaks induce fear and paranoia in its leadership and planning coterie. This must result in minimization of efficient internal communications mechanisms (an increase in cognitive "secrecy tax") and consequent system-wide cognitive decline resulting in decreased ability to hold onto power as the environment demands adaption."<p><a href="https://web.archive.org/web/20071020051936id_/http://iq.org:80/#Thenonlineareffectsofleaksonunjustsystemsofgovernance" rel="nofollow">https://web.archive.org/web/20071020051936id_/http://iq.org:...</a><p><a href="https://cryptome.org/0002/ja-conspiracies.pdf" rel="nofollow">https://cryptome.org/0002/ja-conspiracies.pdf</a><p>----<p>I still believe that this will bear out in the long-run, and <i>has</i> already begun to bear out in smaller-scale cases, but it is becoming apparent that in many cases this is like a "the market can stay irrational longer than you can stay solvent" situation, and has really barely begun.<p>As for Assange personally, I still kinda believe in him, though I recognize that is on shakier ground than it may once have been.  After 8 uninterrupted years of however an honest and empathetic person might describe his conditions, I would not be surprised, nor would I particularly fault him for losing it a bit, and letting his personal situation (... being fucking <i>personally</i> targeted for destruction by an unfathomably powerful global-scale system of secretive injustice) compromise his personal pretence towards the objective neutrality on which his thesis's large-scale fruition is predicated.</p>
]]></description><pubDate>Sat, 21 Jul 2018 18:06:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=17582998</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=17582998</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=17582998</guid></item><item><title><![CDATA[New comment by jewbacca in "Lambdas and Functions in Python"]]></title><description><![CDATA[
<p>Someone replied with and then unfortunately deleted an extremely good suggestion.<p>Instead of each operation taking a variable number of numbers and then <i>either</i> returning a value <i>or</i> directly changing the state of the stack (which was also a bug in my previous gist, in pushing the result of C and AC): homogenize the types of the operations by making <i>all</i> of them take a stack and return a stack.<p>You could also wrap all of the basic arithmetic functions with a higher-level function so that, eg, `add` would still not actually have to be aware of the stack:<p><pre><code>    import math, operator

    def stackFunction(arity, function):
        return lambda stack: stack[:-arity] + [function(*stack[-arity:])]

    class rpn_engine:
        def __init__(self):
            self.stack = []
            self.catalog = {"+":    stackFunction(2, operator.add),
                            "-":    stackFunction(2, operator.sub),
                            "*":    stackFunction(2, operator.mul),
                            "/":    stackFunction(2, operator.truediv),
                            "^2":   stackFunction(1, lambda x: x * x),
                            "SQRT": stackFunction(1, math.sqrt),
                            "C":    lambda stack: stack[:-1],
                            "AC":   lambda stack: []}

        def compute(self, operation):
            self.stack = self.catalog[operation](self.stack)

        def push(self, number):
            self.stack.append(number)</code></pre></p>
]]></description><pubDate>Sun, 17 Jun 2018 15:50:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=17332865</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=17332865</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=17332865</guid></item><item><title><![CDATA[New comment by jewbacca in "Lambdas and Functions in Python"]]></title><description><![CDATA[
<p>Most of the code by volume in this post's final product (and most of the ugliness you're probably seeing in it) comes from dealing separately with the arity of different operations (`compute_operation_with_one_operand`, `compute_operation_with_two_operands`, etc) -- which retains a whole lot of copy-paste-but-change-one-small-thing-in-the-middle boilerplate.<p>That can be taken further and generalized out.<p>It's been a while since I did much Python metaprogramming-navel-gazing, but if you can't do something to automatically detect the arity of the operations' lambdas/functions, you can at least explicitly annotate the operations data with their arity -- which is already implicitly being done (as code instead of data) in `compute`'s 3 if-statements + the 3 "compute_with_N_operands" functions.<p>From there, you'll only have 1 case once, instead of 3 cases with each one manifesting in 2 different places.  And just about half of the code disappears.<p>----<p>edit: since adjkant already covered the "automatically detect the arity of the operations' lambdas/functions" approach to removing all the cases, (<a href="https://news.ycombinator.com/item?id=17329772" rel="nofollow">https://news.ycombinator.com/item?id=17329772</a>), here is the gist of what I meant by "explicitly annotate the operations data with their arity":<p><pre><code>    import math, operator

    class rpn_engine:
        def __init__(self):
            self.stack = []
            self.catalog = {"+":    (2, operator.add),
                            "-":    (2, operator.sub),
                            "*":    (2, operator.mul),
                            "/":    (2, operator.truediv),
                            "^2":   (1, lambda x: x * x),
                            "SQRT": (1, math.sqrt),
                            "C":    (0, self.stack.pop),
                            "AC":   (0, self.stack.clear)}

        def compute(self, operation):
            (arity, op) = self.catalog[operation]
            operands = reversed([self.stack.pop() for _ in range(arity)])
            return self.stack.push(op(*operands))</code></pre></p>
]]></description><pubDate>Sat, 16 Jun 2018 21:50:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=17329664</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=17329664</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=17329664</guid></item><item><title><![CDATA[3D printed tourniquet: Day 2 of Gaza field trials ends badly (May 14)]]></title><description><![CDATA[
<p>Article URL: <a href="https://medium.com/@trklou/3d-printed-tourniquet-day-2-of-gaza-field-trials-ends-badly-may-14-970b3f291e7">https://medium.com/@trklou/3d-printed-tourniquet-day-2-of-gaza-field-trials-ends-badly-may-14-970b3f291e7</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=17079670">https://news.ycombinator.com/item?id=17079670</a></p>
<p>Points: 21</p>
<p># Comments: 4</p>
]]></description><pubDate>Wed, 16 May 2018 02:50:07 +0000</pubDate><link>https://medium.com/@trklou/3d-printed-tourniquet-day-2-of-gaza-field-trials-ends-badly-may-14-970b3f291e7</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=17079670</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=17079670</guid></item><item><title><![CDATA[New comment by jewbacca in "Show HN: Password-protect a static HTML page"]]></title><description><![CDATA[
<p>You don't need to control the server<p>But you can still control access to the content, distributing the password by other channels.<p>A plausible use case for this (... like basically any crypto thing) would be clandestine organizing.  <i>Significantly</i> less sophistication required, and much less of a trail left, to put a static site online.<p>Shit, you wouldn't even need to host it as a site: you could drop it somewhere as text, eg on a pastebin or in a forum comment, with "save as .html and open" instructions.  And you could distribute the encryptor itself the same way.<p>The really great thing about this is that you could do practical human crypto, without Alice or Bob needing any special knowledge or equipment besides a web browser, using arbitrary uncontrolled public infrastructure.<p>... though if someone knows the password + controls the infrastructure you've used, they could substitute their own content.<p>... also short password + direct access to ciphertext -> easy brute force.<p>... also everything here: <a href="https://news.ycombinator.com/item?id=14554187" rel="nofollow">https://news.ycombinator.com/item?id=14554187</a><p>Wouldn't use it for anything state-level or life-or death. 
 There are mitigations, but that would increase the difficulty and necessary sophistication for using it. 
 Actually, this probably falls into the uncanny valley where it seems just accessibly cyberpunk enough to be extremely dangerous to anyone relying on it.  But still, really cool IMO.</p>
]]></description><pubDate>Wed, 14 Jun 2017 18:39:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=14554930</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=14554930</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14554930</guid></item><item><title><![CDATA[Something's up with the new Netflix rating system]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.youtube.com/watch?v=hMliusRrr90">https://www.youtube.com/watch?v=hMliusRrr90</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=14527911">https://news.ycombinator.com/item?id=14527911</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 10 Jun 2017 16:29:22 +0000</pubDate><link>https://www.youtube.com/watch?v=hMliusRrr90</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=14527911</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14527911</guid></item><item><title><![CDATA[New comment by jewbacca in "Ask HN: What are we doing about Facebook, Google, and the closed internet?"]]></title><description><![CDATA[
<p>Yeah.  This was pretty upsetting to discover.  I had been blindly using my reddit upvote history as a supplementary personal log of sorts, for many years.  And most of that's now just gone.<p>Thank god I haven't made over 1000 comments or posts with any one account.<p>The data's all still in the database, but due to their caching setup, only the last 1000 of anything is publicly indexed.  While everything's technically reachable, it's all deep web.  To recover something private like upvoted or saved posts, we're talking heat-death-of-the-universe, through a full-table-scan squeezed through brute-forcing a search box, while authenticated, with rate limits.</p>
]]></description><pubDate>Thu, 08 Jun 2017 22:56:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=14517818</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=14517818</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14517818</guid></item><item><title><![CDATA[New comment by jewbacca in "Ask HN: What are we doing about Facebook, Google, and the closed internet?"]]></title><description><![CDATA[
<p>At least Google and Twitter have data takeout.<p>I recently discovered that, on Reddit, anything beyond your more recent 1000 posts/comments/upvotes is totally irrecoverable to you, even via scraping.</p>
]]></description><pubDate>Thu, 08 Jun 2017 22:36:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=14517705</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=14517705</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14517705</guid></item><item><title><![CDATA[New comment by jewbacca in "Redditors design worst volume sliders possible"]]></title><description><![CDATA[
<p>> Please make a noise as loud as you want the volume to be<p>I'm not sure this is a bad idea...</p>
]]></description><pubDate>Thu, 08 Jun 2017 20:54:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=14517123</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=14517123</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14517123</guid></item><item><title><![CDATA[New comment by jewbacca in "Did the Intercept bungle the NSA leak?"]]></title><description><![CDATA[
<p>That was exactly Julian Assange's original thesis:<p>----<p>"The non linear effects of leaks on unjust systems of governance<p>[...]<p>The more secretive or unjust an organization is, the more leaks induce fear and paranoia in its leadership and planning coterie. This must result in minimization of efficient internal communications mechanisms (an increase in cognitive "secrecy tax") and consequent system-wide cognitive decline resulting in decreased ability to hold onto power as the environment demands adaption."<p><a href="https://web.archive.org/web/20071020051936id_/http://iq.org:80/#Thenonlineareffectsofleaksonunjustsystemsofgovernance" rel="nofollow">https://web.archive.org/web/20071020051936id_/http://iq.org:...</a><p><a href="https://cryptome.org/0002/ja-conspiracies.pdf" rel="nofollow">https://cryptome.org/0002/ja-conspiracies.pdf</a></p>
]]></description><pubDate>Wed, 07 Jun 2017 01:17:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=14502996</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=14502996</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14502996</guid></item><item><title><![CDATA[A Sequence Problem]]></title><description><![CDATA[
<p>Article URL: <a href="http://raganwald.com/2017/06/04/sequences.html">http://raganwald.com/2017/06/04/sequences.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=14482561">https://news.ycombinator.com/item?id=14482561</a></p>
<p>Points: 7</p>
<p># Comments: 1</p>
]]></description><pubDate>Sun, 04 Jun 2017 17:44:35 +0000</pubDate><link>http://raganwald.com/2017/06/04/sequences.html</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=14482561</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14482561</guid></item><item><title><![CDATA[New comment by jewbacca in "Just Say No"]]></title><description><![CDATA[
<p>Sorry: there is not an will never be a general answer to that question.</p>
]]></description><pubDate>Fri, 28 Apr 2017 18:21:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=14221787</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=14221787</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14221787</guid></item><item><title><![CDATA[New comment by jewbacca in "Long-Term Thinking and Nuclear Waste"]]></title><description><![CDATA[
<p>> nudging the dry casks sunward<p>[Note: I realize you might already get this.  But for the sake of having the discussion in public, where this is a very common misunderstanding of space travel, and also because I enjoyed writing it:]<p>It's true that, in space, without air resistance, Newton's first law reaches its fullest expression: when you push something, it's going to keep going.<p>In a frame of reference with no gravity happening in it -- like a totally empty universe, or if you're restricting the area you're looking at to the interior or immediate vicinity of a space ship over a short period of time -- then it's going to keep going <i>in a straight line</i>.  ie: if you give something a push in what looks like the direction of something else, it'll get there.  And it wouldn't matter how hard the push was, it would still get there eventually.<p>But if you're working in frame of reference with a lot of gravity happening in it, straight lines stop being the usual mode of movement.  If you start at rest and push straight towards something, you're going to curve away from your apparent initial trajectory, towards the source of the gravity.  You can't just gently push directly towards something and eventually end up there.<p>"Well", you say, "we can still just push directly towards the source of the gravity -- which is our destination anyway."  Absolutely!  We'd successfully end up there, and it would even still be a straight line.  <i>If</i> we were starting at rest.<p>But we're not starting at rest: we're starting out with a velocity of about 100,000 km/h, in a direction <i>perpendicular to</i> a straight line towards the sun.  The velocity of the orbit of the earth around the sun.<p>Starting from there, if we were to give a <i>really big push</i>, <i>directly towards the sun</i>, say a ~15,000 km/h push (the magnitude of the push that moved the Apollo missions from low-earth orbit onto a collision-course with the moon)... that would just leave us in a slightly off-center orbit, which only gets very slightly closer to the sun at its closest point.  And actually moving just a little faster than we were (~101,000 kh/h), at an angle less than 10 degrees closer to "towards the sun" than our previous direction of travel.<p>Think hypotenuse of a triangle.  Pythagorean theorem and stuff.  Really big width (our initial orbital velocity around the sun), relatively small height (our big push towards the sun).  If we want our hypoteneuse (our actual velocity vector) to get really steep (point directly towards the sun), and changing the height of the triangle is our only move (again, pushing towards the sun), we'd basically need our triangle to achieve infinite height (infinitely big push towards the sun).<p>We could actually do significantly better by making our push in the direction <i>opposite to our initial orbit</i>, rather than directly inwards towards the sun.  With a push of the same magnitude, now we're orbiting at only 85,000 km/h, making our orbit dip lower at its closest point.<p>In fact, that reveals what we <i>actually</i> need to do to dump something into the sun: <i>stop orbiting it</i>.<p>Cancel (almost) all of our initial 100,000 km/h of orbital velocity.  By accelerating 100,000 km/h in the opposite direction to our orbit.  When that's done, we <i>fall</i> into the Sun.<p>----<p>No extensive comment on the logistics of this.  Your [2] link discusses that more fully.<p>My point is that "nudge something in the right direction in space, and it'll get there eventually" is not actually a thing that can happen in any practical sense.<p>tldr: play Kerbal Space Program.</p>
]]></description><pubDate>Sun, 19 Mar 2017 01:42:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=13904660</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=13904660</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13904660</guid></item><item><title><![CDATA[New comment by jewbacca in "EFF Border Search Pocket Guide"]]></title><description><![CDATA[
<p>The upside-down part:<p>----<p>Before your trip:<p>• <i>Reduce the data you carry.</i> Consider using temporary devices, deleting data from your regular devices, or shifting data to the cloud.<p>• <i>Encrypt.</i> Use strong full-disk encryption, not just weak screen-lock passwords.<p>• <i>Passwords.</i> Use software to make them long, unpredictable, and memorable.<p>• <i>Backup.</i> In case agents seize your devices, backup your data.<p>• <i>Power down.</i> Do it before arriving at the border, to block high-tech attacks.<p>• <i>Fingerprint locks.</i> They are weaker than passwords, so don’t rely on them.<p>• <i>Apps and browsers.</i> Agents use them to get from devices to cloud content. Consider logging out, removing saved login credentials, and uninstalling.<p>• <i>But be aware:</i> Unusual precautions may make border agents suspicious.<p>At the border:<p>What if border agents instruct you to unlock your devices, provide your passwords, or disclose your social media information? There is no “right” answer.<p>• <i>Be safe.</i> Stay calm and respectful. Do not lie to agents, which can be a crime.<p>• <i>If you comply,</i> agents may scrutinize and copy your sensitive data.<p>• <i>If you refuse,</i> agents may seize your devices. They also may escalate the encoun-ter, for example, by detaining you for more time.<p>• <i>If you are a U.S. citizen,</i> agents must let you enter the country.<p>• <i>If you are a lawful permanent resident,</i> agents might raise complicated questions about your continued status as a resident.<p>• <i>If you are a foreign visitor,</i> agents might deny you entry</p>
]]></description><pubDate>Sat, 18 Mar 2017 23:07:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=13903975</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=13903975</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13903975</guid></item><item><title><![CDATA[EFF Border Search Pocket Guide]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.eff.org/document/eff-border-search-pocket-guide">https://www.eff.org/document/eff-border-search-pocket-guide</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=13903959">https://news.ycombinator.com/item?id=13903959</a></p>
<p>Points: 3</p>
<p># Comments: 1</p>
]]></description><pubDate>Sat, 18 Mar 2017 23:03:48 +0000</pubDate><link>https://www.eff.org/document/eff-border-search-pocket-guide</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=13903959</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13903959</guid></item><item><title><![CDATA[New comment by jewbacca in "Long-Term Thinking and Nuclear Waste"]]></title><description><![CDATA[
<p>Their second citation[2] is actually all about this (... I realized as I was 25 minutes into writing my own version).<p>"nudging the dry casks sunward" is still a really bad choice of words, given the massive prevalence of that particular space travel trope.<p>----<p>[2] <a href="http://www.universetoday.com/133317/can-we-launch-nuclear-waste-into-the-sun/" rel="nofollow">http://www.universetoday.com/133317/can-we-launch-nuclear-wa...</a></p>
]]></description><pubDate>Sat, 18 Mar 2017 22:15:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=13903774</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=13903774</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13903774</guid></item><item><title><![CDATA[New comment by jewbacca in "Run Linux on hard disk firmware (2013)"]]></title><description><![CDATA[
<p>> jellybean part<p>...<p>> In the electronics industry, a "jelly bean" component is one which is widely available, used generically in many applications, and has no very unusual characteristics—as though it might be grabbed out of a jar in handfuls when needed, like jelly beans. For example, the μA741 might be considered a jelly bean op amp.<p>[Wikipedia]</p>
]]></description><pubDate>Sat, 18 Mar 2017 21:36:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=13903641</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=13903641</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13903641</guid></item><item><title><![CDATA[New comment by jewbacca in "C++ value category cheat-sheet [pdf]"]]></title><description><![CDATA[
<p>Softer entry to the whole concept of lvalues/rvalues in general:<p><a href="http://eli.thegreenplace.net/2011/12/15/understanding-lvalues-and-rvalues-in-c-and-c" rel="nofollow">http://eli.thegreenplace.net/2011/12/15/understanding-lvalue...</a></p>
]]></description><pubDate>Sat, 18 Mar 2017 19:06:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=13902932</link><dc:creator>jewbacca</dc:creator><comments>https://news.ycombinator.com/item?id=13902932</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13902932</guid></item></channel></rss>