Hacker Newsnew | past | comments | ask | show | jobs | submit | Khoth's commentslogin

Four types! You missed Ibiricus female, ie the next generation of queen


It's mostly talking about the case where someone receives an encrypted message which is intended to later be published openly. If it was padded by adding stuff, an attacker can try to reconstruct the original plaintext by removing the flowery adjectives, whereas if things were deleted the attacker doesn't know what to add.


In particular, the length of a message is not encrypted when encrypting the text. So if the encrypted message is shorter, you know exactly how much to remove to get back the original, and then just need to guess what to delete. If the message is longer, it is much harder to guess whether to add flowery adjectives, a new sentence, change a pronoun for a name, or some other change.


It's not just about the actual sound effects, it's also the writing. The movie clip the article uses as an anchor shows people using silencers to have a gunfight in public with bystanders having no idea it was happening. That's not just hollywood sound direction, it's hollywood giving a completely wrong impression about how good silencers are and why they exist


NP-complete is indeed the intersection of NP-hard and NP.

If you can solve any NP-hard problem then you can solve any NP-complete problem (because you can convert any instance of an NP-complete problem to an NP-hard problem), so NP-hard problems are "at least as hard" as NP-complete problems.

(But an NP-hard problem might not be in NP, ie given a purported solution to an NP-hard problem you might not be able to verify it in polynomial time)


Someone who knew or guessed that you were doing it could find your key very quickly by trying out every beacon value in the time range your key was generated in


For 2/3, it does indeed work with fractions internally. For pi, it uses some floating point representation I think, you get about 50 digits.


Whether family names are more differentiated depends on where you live.

The USA has a wide variety, but there are also places like Vietnam where only a handful of family names are in common use and more than 30% of people are Nguyens.


Not sure about the pageant part, but it's a major problem when connecting to a compromised server leaks the client's private key.

(For example, if an attacker has compromised server A and you connect to it, they can now use your key to connect to server B which you also use)


Now I feel better for never using the same key for different servers.


The search keyword to learn more is "post-quantum cryptography"

RSA and ECC cryptography could be broken, but (with a probably rocky transition period) we could move to other algorithms which are still secure.

Crytocurrency I'm not sure about.

I suspect probably keeping it secret - announcing it would push everyone to move from crypto you can break to crypto you can't.


I use one to get rid of fixed headers on a page

   javascript:(function()%20{%20var%20s,e,i,ee=document.getElementsByTagName('*');%20for(i=0;%20e=ee[i];%20i++)%20{%20s=getComputedStyle(e);%20if%20(s%20&&%20s.position%20==%20'fixed')%20e.style.position='static';%20}%20})();


ya, same, I don't know where I got this one but I modified it to include sticky

javascript:var ni%3Ddocument.createNodeIterator(document.documentElement,NodeFilter.SHOW_ELEMENT,function(node)%7Breturn document.defaultView.getComputedStyle(node,null).getPropertyValue("position").match(/sticky|fixed/) %3F NodeFilter.FILTER_ACCEPT : NodeFilter.FILTER_REJECT%3B%7D)%3Bwhile(currentNode%3Dni.nextNode())%7Bconsole.log(currentNode.remove())%3B%7D


Can't live without this. The 10% of the time it doesn't work makes me sad. Super useful from cVim/Vimmium etc, I keep it mapped to 'gh'


I use that all the time (to get rid of any fixed element, incl footers and floating sidebars)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: