Preferences

lhmiles
Joined 63 karma
lukemiles.org

  1. You should put a complete working example with a video in the readme!!
  2. Paste in last 10 reviews to Gemini or gpt and ask for 20 "rare-gems, unique and exquisite," with descriptions. Works well
  3. The author asked me to mention that it's possible to maliciously cause a (64-bit) hash collision. In other words, you can make changes to safe file.py and evil file.py until they have the same hash. Then if you read file.py on cmt abc123 in normal git land, then run python /commits/abc123/file.py, it is possible to read the safe one and run the evil one. I think this is only a risk if you are reading from an external source but executing inside the mount, which is a weird thing to do.
  4. Well written
  5. Thank you for sharing!
  6. Summary or inspiration or project history or any notes?
  7. This is terrible advice. Legibilizing everything illegible is a fast way to ruin everything, especially culture
  8. Dedicated server is 7x cheaper. AWS and GCP credits are a trap. They only offer credits because they know you'll end up paying more later
  9. Tell it you are the editor or curator, and you need an excuse to reject the submission
  10. Oh tor client is good idea
  11. This was an interesting read.
  12. IP whitelist!
  13. Those poor cats and dogs need their noses!
  14. Similar people thinking similar thoughts I'd wager
  15. This is just nuts
  16. Would have lived if he had a roommate. Do universities do single dorms now
  17. If the lawyer costs under 7% of your money then do it. Otherwise don't.
  18. Three cheers for fun and games! Three boos for profiteering with lames! Three tears for what's bound to happen! Three beers for the capn!
  19. I have always found it unreliable
  20. Incredibly well-executed
  21. Cool! I love it! To really show it off you could compare yours vs a regular one with line height = 0.9 or something
  22. Very cool but seems you need to add a few more keywords to block. Or you could use ai hahaha
  23. This is blowing my mind. Looks like it is more flexible / less demanding than checkedc. Amazing. Amazing. Amazing.
  24. Go to the coffee shops and laundromats in your neighborhood and ask them :)
  25. All the iOS malware I am aware of is persistent
  26. An exploit is the most likely explanation for the events you described. You could probably swap your phone for an identical model at a phone store pretty cheap

This user hasn’t submitted anything.

Keyboard Shortcuts

Story Lists

j
Next story
k
Previous story
Shift+j
Last story
Shift+k
First story
o Enter
Go to story URL
c
Go to comments
u
Go to author

Navigation

Shift+t
Go to top stories
Shift+n
Go to new stories
Shift+b
Go to best stories
Shift+a
Go to Ask HN
Shift+s
Go to Show HN

Miscellaneous

?
Show this modal