Preferences

coderatlarge
Joined 709 karma

  1. maybe an account has to build up cred or investment to be more trusted like on hn
  2. from the piece:

    “ the median age of the latest Y Combinator cohort is only 24, down from 30 just three years ago “

    does yc publish stats to validate?

  3. no ties to my other accounts would be ideal from my perspective

    i understand that it’s easier to get a stronger “trust” signal by being more invasive

    but hopefully the product will be so valuable that users will value their accounts as assets (like on hn) that they won’t want to compromise with bad behavior

  4. that’s good to know thanks but creates more special cases to manage if i just want to backup my stuff so i can manually recover when i need to (on lost device say).
  5. i wish there were a straightforward way to export a file of some sort that i can backup without creating yet another special case to manage.
  6. i just ran into a situation activating a new device in which apple were trying to send to a device i had forgotten to “properly” remove from that icloud account.

    and also another situation in which the 2fa code would flash on the remote device and disappear in a fraction of a second. i eventually captured it with screen recording but every time i did it the code was not accepted.

    my conclusion: apple had silently ruled that i would not be allowed to activate using that particular icloud account. no idea why. i tried a different one and things went through ok.

    arbitrary power in practice.

  7. well hn allows voting without email
  8. tying this data to a login instead of a pure cookie model like hn seems dangerous.
  9. i love that meme which shows three identical paper clips in a row but one is upside down relative to the others which is a minute difference. the caption reads “chaos German style”
  10. this carrier approval to move esim problem is more generalized on modern “smartphones”. unless you opt in to cloud providers holding your data there is no easy way afaik to migrate your authenticator apps to another phone. and a host of other authentication/authorization data is tied to the device in an opaque way. don’t get me started on apple’s unpredictable model of sending 2fa to some other “trusted” device which means tou never know what tou need to bring with you.
  11. in some countries (ex china) local carriers won’t provision esim for nonlocally made phones. including iPhone not specifically made for their market.
  12. if you do read french, proust’s “in search of lost time” (vol 1) is a lot more accessible and enjoyable than my high school teachers made it sound years and years ago. it even contains a depiction of what a learned engineer should be like.
  13. perhaps it then becomes a matter of policy to periodically reformulate the law so it is compact and understandable and illustrated with examples for the general public. i wonder if llms will be able to do this reliably ever.
  14. maybe we’re inching towards rule by law vs rule of law by making things so abstruse that you need a multiyear education to understand what is allowed, when and where.
  15. what a charming time it was when that generation discovered a bunch of stuff that now undergirds daily life:

    “ Dijkstra always believed it a scientist’s duty to maintain a lively correspondence with his scientific colleagues. To a greater extent than most of us, he put that conviction into practice. For over four decades, he mailed copies of his consecutively numbered technical notes, trip reports, insightful observations, and pungent commentaries, known collectively as “EWDs”, to several dozen recipients in academia and industry. Thanks to the ubiquity of the photocopier and the wide interest in Dijkstra’s writings, the informal circulation of many of the EWDs eventually reached into the thousands. “

    random sample of a trip note in which he is in ited to consult on a project that he thinks ought to be killed:

    https://www.cs.utexas.edu/~EWD/ewd06xx/EWD601.PDF

  16. i really appreciated the paper and as someone who has spent many years deciphering what the author calls 17th century-style proofs am completely aligned with the objective and the method. i personally find myself doing a version of what the author proposes (in private notes) to make sure i understand proofs i read in books or papers.

    even so it would have been timely, useful, and relevant to include a comparison to proofs in lean by comparison to TLA+ even though it is not Lamport’s personal project.

  17. it seems to me if these things were real and repeatable there would be published traces that show the exact interactions that led to a specific output and the cost in time and money to get there.

    do such things exist?

  18. maybe to avoid checking a box on an irs form?
  19. for those who need an easier introduction to the subject (no general integration theory required, just finite sums) i can highly recommend

    https://link.springer.com/book/10.1007/978-1-4614-0776-8

    it doesn’t say what a lie group is but it gets you down the road if understanding representations and what tou can do with them. dramatically easier than fulton and Harris for self-study.

  20. ruby comes preinstalled on macos. so if you want to script a mac without installers or non oob software, it’s that or perl or bash or appkescript.
  21. well the people who did the Higgs boson theory worked and re-worked for years all the prior work about elementary particles and arguably did a bunch of re-mixing of all the previous “there might be a new elementary particle here!” work until they hit on something that convinced enough peers that it could be validated in a real-world experiment.

    by which i mean to say that it doesn’t seem completely implausible that an llm could generate the first tentative papers in that general direction. perhaps one could go back and compute the likelihood of the first papers on the boson given only the corpus to date before it as researchers seem to be trying to do with the special relativity paper which is viewed as a big break with physics beforehand.

  22. crypto is a kind of live estimate of the frustration with government restrictions on using one’s own property. that in itself seems to have some social value.

    in the US, banks will question you if you try to withdraw your own cash from your own bank account past a certain limit set decades ago and never adjusted while the dollar continues to lose value.

  23. …or ‘08 capital controls and being prevented from withdrawing your own funds from your own bank account as happened in Greece back then.
  24. in many educational systems, aptitude in math (the more abstract, the better) is conflated with intelligence. so maybe many of us have internalized we should valorize it?
  25. ok so , in theory, “Mark” (the author of the original app in question in the original post) could change some of the verbiage around his app and resubmit claiming 230?
  26. i am not a lawyer, so please treat this as more of a question: my belief was that whether it’s ok to film in a public place is a matter of state law.
  27. > The governor could create and disband a militia to defend the state.

    so you’re saying a governor could declare their state to be under attack and organize a militia maybe even using state funds?

  28. is there some point of app abstraction where i can claim section 230 protection?
  29. thanks for sharing! someone had explained to me the concept of “color of money” in payment systems years back and this matches up well.

This user hasn’t submitted anything.

Keyboard Shortcuts

Story Lists

j
Next story
k
Previous story
Shift+j
Last story
Shift+k
First story
o Enter
Go to story URL
c
Go to comments
u
Go to author

Navigation

Shift+t
Go to top stories
Shift+n
Go to new stories
Shift+b
Go to best stories
Shift+a
Go to Ask HN
Shift+s
Go to Show HN

Miscellaneous

?
Show this modal