- Isn't Bluesky supposed to be decentralized?
How can some party lock you out of it?
- Since even after 2 hours nobody is discussing the actual font, let me tell you what comes to my mind when I read anything about Google and design:
They got phone design right.
I just can't get my head around it that even Apple, which is supposed to be THE design company, is making phones that can't lay on a table without wobbling like a barstool on a crooked floor. It just feels so broken to me. So detrimental to my sense of aesthetics.
Google phones tackled it with an elegant solution. Thanks for that. I wouldn't know what phone to use if Pixels didn't exist.
- You don't use public networks?
And when you connect to a non-public WiFi for the first time - how do you make sure it is the WiFi you think it is and not some dude who spun up a hotspot on their laptop?
- My question was about known networks.
As far as I know, access points only identify via their SSID. Which is a string like "Starbucks". So there is no way to tell if it is the real Starbucks WiFi or a hotspot some dude started on their laptop.
Isn't almost every laptop these days autoconnecting to known network names like "Starbucks" etc, because the user used it once in the past?vulnerable to remote code execution from systems on the same network segmentThat would mean that every FreeBSD laptop in proximity of an attacker is vulnerable, right? Since the attacker could just create a hotspot with the SSID "Starbucks" on their laptop and the victim's laptop will connect to it automatically.
- In the rare case (maybe once per month or so) where that happens, I start a script on my laptop that starts a webapp both the phone and the laptop can open in their browser and send text to each other.
The overhead of starting it and typing "laptop.tekmol" into the browser on both machines is only a few seconds.
That seems mich saner to me than to constantly have some interaction between the two devices going on.
- What works better as a native application?
- Strange, I don't need any of that.
And when I hang out with people who ARE in Apple's ecosystem, to me it seems they struggle more to get things done than me.
Why would I want a shared clipboard across multiple devices?
- As someone using Linux to build web applications, I wonder what about the Apple ecosystem could make it worth to have such a Damocles’ sword hanging over me my whole life.
Am I missing something? My current perspective is that not only am I free of all the hassle that comes with building for a closed ecosystem, such as managing a developer account and using proprietary tools, it also comes with much harder distribution. I can put up a website with no wait time and everybody on planet earth can use it right away. So much nicer than having to go through all the hoops and limitations of an app store.
Honest question: Am I missing something? What would I get in return if I invested all the work to build for iOS or Mac?
- Everyone could offer a cloud-hosted saas product that involves bun, right?
Why invest into a company that has the additional burden of developing bun, why not in a company that does only the hosting?
- What is the business model behind open source projects like bun? How can a company "aquire" it and why does it do that?
In the article they write about the early days
Why do investors invest into people who build something that they give away for free?We raised a $7 million seed round - The hole was of simple enough shape that I could just design it manually. I used SCAD, which is kind of a programming language supported by some tools that can convert it to STL.
What I recently did is that I 3D-printed an object with PLA that exactly fit the whole and just glued that in with assembly glue.you accidentally knock a hole in your wall, it’s probably cheaper to buy a flatscreen TV and stick it in front of the holeWhat does the HN panel say? Is it a solution? Or does it have any downside?
- Every instance would only get the messages that its members have subscribed to. How can any system be more efficient than this?
A $5/month VM could ingest millions of messages per day. What's the problem?
- Why is this so complicated?
Can't we build a social network with a simple protocol:
1: Each user has a private key that they use to sign their messages.
2: Each user keeps a list of instances who announced that one of their members follows them. When the user posts something, they broadcast the post to those instances.
Shouldn't this be enough?
It could all be url based. One user, one url.
When Sue wants to read Joes latest posts, she sends this request:
someserver.com/joedoe?action=latest_posts
When Sue wants to follow Joe, she sends this request:
someserver.com/joedoe?action=follow&from=otherserver.com/suelue&sig=f819h...
- I am using Git submodules for dependencies. My approach to a situation like this:
And keep using my fork until upstream accepted my pull request. Then I switch the url of the dependency back.1: Clone gh.com/someone/LibBar to gh.com/me/LibBar 2: Fix the bug 3: Send pull request to someone 5: git submodule set-url lib/LibBar https://gh.com/me/LibBar.git git submodule sync lib/LibBar git submodule update --init --remote --recursive lib/LibBar cd lib/LibBar/; git checkout main; cd ../.. git add .; git commit -m "Use my own version of lib/LibBar" - How about adding some image with a public http logger url like
https://ih879.requestcatcher.com/test
to each of the nonsense pages, so we can see an endless flood of funny requests at
https://ih879.requestcatcher.com
?
I'm not sure requestcatcher is a good one, it's just the first one that came up when I googled. But I guess there are many such services, or one could also use some link shortener service with public logs.
- My takeaway:
Do not install apps. Use websites.
Apps have way too much permissions, even when they have "no permissions".
There is actually a technical solution to that then. Use the public channel to send/receive private messages. Every could publish a public key. Then everyone could send private messages to everyone by encrypting them with the public key of the receiver and sending them over the public channel.
Shall we try it? My public key:
You can send me a private message by encrypting it here:https://anycript.com/crypto/rsa
And then pasting the encrypted version into a reply to this comment :)