Preferences

Lucasoato
Joined 974 karma

  1. If you’re marveled by these articles, I suggest you to read this blog: https://0fps.net/

    It inspired me so much back when I was graduating in mathematics, the author is a genius.

  2. If you’re looking for a cheap but reliable alternative, Hetzner offers i7 64GB Ram servers for as low as 37.45€/month.

    Of course you’re not in AWS, forget about all the managed services, but we’re talking about 95%~98% cheaper egress costs, with 20TB included in most machines.

  3. I feel that this is among the good reasons to keep exposing UUID in the API.
  4. Hi, a question for you folks. What if I don’t like to embed timestamp in uuid as v7 do? This could expose to timing attacks in specific scenarios.

    Also is it necessary to show uuid at all to customers of an API? Or could it be a valid pattern to hide all the querying complexity behind named identifiers, even if it could cost a bit in terms of joining and indexing?

    The context is the classic B2B SaaS, but feel free to share your experiences even if it comes from other scenarios!

  5. A pure spirit is required to admit your own mistake. Don’t be let down by an error, never lose the opportunity to fix it. May this be of example to everyone to keep improving this already wonderful but not perfect community.
  6. Please, don’t make me cry like that.
  7. > Even without a directed cycle this kind of structure can still cause trouble. Although the architecture may appear clean when examined only through the direction of service calls the deeper dependency network reveals a loop that reduces fault tolerance increases brittleness and makes both debugging and scaling significantly more difficult.

    While I understand the first counterexample, this one seems a bit blurry. Can anybody clarify why a directed acyclic graph whose underlying undirected graph is cyclic is bad in the context of microservice design?

  8. Be strong, brother, there is hope. Antidepressant can be really hard to administer, they exclude particularly vulnerable people from trials because they need to be protected the most.
  9. A company that is free to harm the environment and human rights is more competitive than a company that doesn't abuse other human beings and protect our fragile biosphere. So is a company that claims to be respectful but is linked to subsidiaries or subcontractors that constantly violates the common sense. That Directive is simply saying: "Not only you can't fuck other people or our planet, but you can't get away with it by subcontracting the evil stuff to someone else".

    These "burdens" are very annoying, we all know it, but so are being exploited or destroying our ecosystem.

  10. > CrowdStrike researchers next prompted DeepSeek-R1 to build a web application for a Uyghur community center. The result was a complete web application with password hashing and an admin panel, but with authentication completely omitted, leaving the entire system publicly accessible.

    > When the identical request was resubmitted for a neutral context and location, the security flaws disappeared. Authentication checks were implemented, and session management was configured correctly. The smoking gun: political context alone determined whether basic security controls existed.

    Holy shit, these political filters seem embedded directly in the model weights.

  11. > We find that DMT shifts the normally dominant alpha oscillations towards a quieter subcritical state, increasing entropy while reducing complexity, and that this shift correlates with intensity of disruption of the sense of self.

    Wait, is this a good or a bad thing? Asking for a friend.

  12. Wow, I didn't know that you could write

      like
        this
          for
            code
              blocks
  13. This isn't a solution, they would still have the data. Companies can't be trusted, they'll do what is more convenient for them, we need to remove the problem at the root by not allowing people to take pictures/videos if not permitted.
  14. https://felko.io/

    Hi HN, we’re a Milan-based fintech startup developing FELKO, an AI-powered data platform that helps banks and credit-holders standardize, monitor and act on debt portfolios in partnership with collection agencies!

  15. Android has the biggest market share, but way less margins than Apple; this is true for both phone and the App segments.
  16. > https://signal.org/blog/cellebrite-vulnerabilities/

    There’s always the hope they are hit back: Cellebrite can develop solutions to automate the hacking of target phones, but in doing so their physical devices are exposed to being hacked as well.

  17. Cosa Nostra is a well defined organization operating in Sicily, that term isn’t used for other Mafias around Italy or other Sicilian criminal organizations. Among its past leaders you can find Bernardo Provenzano and Matteo Messina Denaro.
  18. One of my co-founders lost the SVG of our startup logo, and the designer who helped us was away on vacation. I really wanted to experiment with some logo animations for an upcoming demo, so I decided to take matters into my own hands.

    I grabbed a high-quality PNG, gave it to ChatGPT, and managed to recreate the SVG from the image, after quite a bit of prompting and tweaking. But it worked out great!

  19. A walled garden is a walled garden, no matter the slice of the market you've been able to eat (yet).

This user hasn’t submitted anything.

Keyboard Shortcuts

Story Lists

j
Next story
k
Previous story
Shift+j
Last story
Shift+k
First story
o Enter
Go to story URL
c
Go to comments
u
Go to author

Navigation

Shift+t
Go to top stories
Shift+n
Go to new stories
Shift+b
Go to best stories
Shift+a
Go to Ask HN
Shift+s
Go to Show HN

Miscellaneous

?
Show this modal