Hacker Newsnew | past | comments | ask | show | jobs | submit | hackpelican's commentslogin

They don’t treat Israeli* women like a second class citizen.

They’re totally fine treating gentile women, men and children as cattle. Slaughtered and imprisoned at will.


Do you really believe this “altruistic” angle?


Yes, I don't want to live under Islamic rule.


I might be convinced that the Administration was concerned about people being forced to live under Islamic rule if it was as eager for war with Saudi Arabia as it is with Iran.

(I wouldn't support it any more in that case, but I would be more inclined to believe that its motivation might actually have anything to do with "Islamic rule".)


Many people want to though, and no one is forcing you to.


Where do you live where Islamic rule is a worry?


Note how they won't answer. They're affected by media FUD.


So when do we start adding a “(mis)” at the start of their name?


Doesn’t sound like a bad thing to evaluate the most obvious alternative to build confidence before officially pulling the plug.


The most obvious alternative would be Zig. I don't see any Swift adoption outside the Apple ecosystem.


The key requirement is memory safety, which would rule out Zig.


Last time I checked, Zig was breaking it's stdlib, so it's not an alternative imo


I cannot tolerate children crying or being generally loud.. unless it’s my kid, then it barely registers at worst, enjoyable at best.


At one point it started spitting out its CoT in the comments of the code it’s supposed to be changing.


Ah yeah I've seen that too. Definitely seems related.

I suspect this is also something like the "inverse" of a prompt hijacking situation. Basically it's losing track of where its output is flowing to (whereas prompt injection is when it loses track of where its input is flowing from).


Yes over USB 2.0 until recently.


8x engineer


How does routing work?

How do I know that for device A to reach device B, I need to go through device C but not D?

And if I try to go through device D but device C actually delivers the message, then does device D get paid? How would you validate which devices actually participated in the transmission of the message? How does this not turn into a privacy nightmare?


This is a problem solved multiple times in the past.

Look up "distributed peer to peer" e.g. kademlia


Kademlia relies on an already existing all-to-all mesh (the internet). Nobody has created an actual mesh routing protocol which works very well.


I’m glad you implicitly agree that blockchains have failed to find any use case other than cryptocurrencies.


I don't, as that's a ridiculous thing to say.


Is it though?

Where are blockchains widely used nowadays, pray tell?


Transparency logs like [Certificate Transparency](https://datatracker.ietf.org/doc/html/rfc6962) use permissioned chains (and other things) to distribute trust in the internet public key infrastructure.

That's all I can think of, though.


My understanding is that CT uses Merkle trees, which can also be used in a Blockchain, but that seems to be where the association dies. Just because two things use the same underlying data type doesn't mean one is a use of the other.


My point is: when was the last time when K-means clustering or the Bayesian theorem got a cult, spawned a 10000 fake currencies and were touted as a panacea for all societal problems? The hype behind blockchain, which is just a distributed mathematically sound log of stuff, is just a bunch of misinformation shouted loudly by charlatans and uninformed enthusiasts.

It's the same thing with LLMs, they are basically an extremely sophisticated autocomplete, but I'll be damned if I don't see 1911 articles per day that claim they are sentient, and Sam the perv needs just a couple more billion dollars to reach AGI, just behind the corner. The average pundit's critical thinking is just so disappointing.


I'm not sure if you meant to reply to me? I generally agree with your points, but my specific reply was dismissing the idea that Certificate Transparency is a good use of Blockchain..


this does not use a blockchain.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: