Preferences

TekMol
Joined 9,536 karma
In love with technology

  1. Hmm.. so the public channel is decentralized but the private channel is not.

    There is actually a technical solution to that then. Use the public channel to send/receive private messages. Every could publish a public key. Then everyone could send private messages to everyone by encrypting them with the public key of the receiver and sending them over the public channel.

    Shall we try it? My public key:

        -----BEGIN PUBLIC KEY-----
        MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKs9CbOAxSROEdm/+QGyDLdxITTq+YdbmIlOM0jemqKvLXinnBUDeDRSGXOoCnygXLFsm6R31szySqiVunasX/8CAwEAAQ==
        -----END PUBLIC KEY-----
    
    You can send me a private message by encrypting it here:

    https://anycript.com/crypto/rsa

    And then pasting the encrypted version into a reply to this comment :)

  2. Isn't Bluesky supposed to be decentralized?

    How can some party lock you out of it?

  3. Since even after 2 hours nobody is discussing the actual font, let me tell you what comes to my mind when I read anything about Google and design:

    They got phone design right.

    I just can't get my head around it that even Apple, which is supposed to be THE design company, is making phones that can't lay on a table without wobbling like a barstool on a crooked floor. It just feels so broken to me. So detrimental to my sense of aesthetics.

    Google phones tackled it with an elegant solution. Thanks for that. I wouldn't know what phone to use if Pixels didn't exist.

  4. You don't use public networks?

    And when you connect to a non-public WiFi for the first time - how do you make sure it is the WiFi you think it is and not some dude who spun up a hotspot on their laptop?

  5. My question was about known networks.

    As far as I know, access points only identify via their SSID. Which is a string like "Starbucks". So there is no way to tell if it is the real Starbucks WiFi or a hotspot some dude started on their laptop.

  6.     vulnerable to remote code execution from
        systems on the same network segment
    
    Isn't almost every laptop these days autoconnecting to known network names like "Starbucks" etc, because the user used it once in the past?

    That would mean that every FreeBSD laptop in proximity of an attacker is vulnerable, right? Since the attacker could just create a hotspot with the SSID "Starbucks" on their laptop and the victim's laptop will connect to it automatically.

  7. In the rare case (maybe once per month or so) where that happens, I start a script on my laptop that starts a webapp both the phone and the laptop can open in their browser and send text to each other.

    The overhead of starting it and typing "laptop.tekmol" into the browser on both machines is only a few seconds.

    That seems mich saner to me than to constantly have some interaction between the two devices going on.

  8. What works better as a native application?
  9. Strange, I don't need any of that.

    And when I hang out with people who ARE in Apple's ecosystem, to me it seems they struggle more to get things done than me.

    Why would I want a shared clipboard across multiple devices?

  10. As someone using Linux to build web applications, I wonder what about the Apple ecosystem could make it worth to have such a Damocles’ sword hanging over me my whole life.

    Am I missing something? My current perspective is that not only am I free of all the hassle that comes with building for a closed ecosystem, such as managing a developer account and using proprietary tools, it also comes with much harder distribution. I can put up a website with no wait time and everybody on planet earth can use it right away. So much nicer than having to go through all the hoops and limitations of an app store.

    Honest question: Am I missing something? What would I get in return if I invested all the work to build for iOS or Mac?

  11. Everyone could offer a cloud-hosted saas product that involves bun, right?

    Why invest into a company that has the additional burden of developing bun, why not in a company that does only the hosting?

  12. What is the business model behind open source projects like bun? How can a company "aquire" it and why does it do that?

    In the article they write about the early days

        We raised a $7 million seed round
    
    Why do investors invest into people who build something that they give away for free?
  13. The hole was of simple enough shape that I could just design it manually. I used SCAD, which is kind of a programming language supported by some tools that can convert it to STL.
  14.     you accidentally knock a hole in your wall,
        it’s probably cheaper to buy a flatscreen TV
        and stick it in front of the hole
    
    What I recently did is that I 3D-printed an object with PLA that exactly fit the whole and just glued that in with assembly glue.

    What does the HN panel say? Is it a solution? Or does it have any downside?

  15. Every instance would only get the messages that its members have subscribed to. How can any system be more efficient than this?

    A $5/month VM could ingest millions of messages per day. What's the problem?

  16. Why is this so complicated?

    Can't we build a social network with a simple protocol:

    1: Each user has a private key that they use to sign their messages.

    2: Each user keeps a list of instances who announced that one of their members follows them. When the user posts something, they broadcast the post to those instances.

    Shouldn't this be enough?

    It could all be url based. One user, one url.

    When Sue wants to read Joes latest posts, she sends this request:

    someserver.com/joedoe?action=latest_posts

    When Sue wants to follow Joe, she sends this request:

    someserver.com/joedoe?action=follow&from=otherserver.com/suelue&sig=f819h...

  17. I am using Git submodules for dependencies. My approach to a situation like this:

        1: Clone gh.com/someone/LibBar to gh.com/me/LibBar
        2: Fix the bug
        3: Send pull request to someone
        5: git submodule set-url lib/LibBar https://gh.com/me/LibBar.git
           git submodule sync lib/LibBar
           git submodule update --init --remote --recursive lib/LibBar
           cd lib/LibBar/; git checkout main; cd ../..
           git add .; git commit -m "Use my own version of lib/LibBar"
    
    And keep using my fork until upstream accepted my pull request. Then I switch the url of the dependency back.
  18. How about adding some image with a public http logger url like

    https://ih879.requestcatcher.com/test

    to each of the nonsense pages, so we can see an endless flood of funny requests at

    https://ih879.requestcatcher.com

    ?

    I'm not sure requestcatcher is a good one, it's just the first one that came up when I googled. But I guess there are many such services, or one could also use some link shortener service with public logs.

  19. My takeaway:

    Do not install apps. Use websites.

    Apps have way too much permissions, even when they have "no permissions".

This user hasn’t submitted anything.