Hacker Newsnew | past | comments | ask | show | jobs | submit | nenreme's commentslogin

That's also how their border guard works.


This sounds like scintillating scotoma: https://en.wikipedia.org/wiki/Scintillating_scotoma


It doesn't: the GP didn't mention any scintillation.

My aura was similar to their description. I would be reading, and the words before or after the current one would be gone. I figured it was the migraine disrupting the visual processing parts of the brain so much so that the automatic filling in of the blind spot stopped working.


I used to experience weird "I know there's something there but can't see it" (e.g., words, my hand) at particular angles from the center of what I was looking at. It turned out that my blood pressure was so low that I was very near to fainting. It was especially bad on days when I was dehydrated, which was the big clue. Once I started drinking water much more often, the experience hasn't happened again.

I realize there are people experiencing migraines and other painful experiences, but if you have occasional "I can't see right / my head hurts" experiences, consider seeing if drinking a lot more water helps. ;)


I thought the blind spot was out near the periphery of your vision , not near the center


The optic disc is quite close to the macula, which has the most cone-rich area of the retina (the fovea) & is where light is focused by the lens.


From the first paper that you linked (available freely on sci-hub) it looks like they were unable to proove that their method actually works. They made simulations with small problems but are not sure if this method will work for larger problems.


You download 32 bytes hash and check it using 20 byte hash from the magnet link.



Is there any plan to allow base64, longer hashes and selecting the hash algorithm in the magnet uri format?


No such plans. What would be the motivation anyway? A different hash function for the infohash calculation wouldn't change anything since other parts of the protocol would still use sha256 (v2) or sha1 (v1). So if this is about security, you wouldn't be changing the weakest link.

Not to mention that this would not be compatible with other peers, there is no algorithm-negotiation in the network protocols, so how would they know which hash you're using? The magnet link is pretty much the far end of the process, you'd have to change a lot of other things first.


> They were booted out of Russia

What do you mean by that? I'm in Russia and using PIA with no issues.



Why are you posting not publicly accesible links? Am I now supposed to register at linkedin to read news here?


it's publically accessible afai can see. Not sure what problems you're facing o.O


They didn't. You did.


> Can you imagine the uproar if Visa said the same thing? It would be totally unthinkable.

No, that's exactly what Visa says, they call it chargeback. That's why it is hard to buy bitcoins with bank cards.


Yes, and you can dispute it, by contacting your them/your bank.

Who do I call if bitscoins just evaporate from my wallet thanks to this fork?


If a government outlaws a currency and you sold your house for that currency, who could you possibly call?

Bitcoins transacted before July 31 WILL stay in your wallet. They are not going to evaporate any time soon.


And this is not was I was replying to. Gp was comparing this to a chargeback.

But now that you bring up governance, bitcoin is essentially being steered by a handful of mining pools, not by loosely knit community of private individuals :)


Decentralized currency comes with its own strengths and weaknesses. The tech is still in its infancy. Take it or leave it.


Then seems to me it's on its deathbed, not in its infancy. A handful of Chinese mining pools will decide which fork retains any value...so much for decentralization.


You are conflating Bitcoin with decentralized currency.


I always configure git and all editors on Windows to use LF line endings. It is so annoying that so many applications use CRLF endings by default, I never understood reason for that, I'm always using LF and have no issues.


D is memory unsafe by default so it probably has a lot of them.


D runs in @system by default but there are @safe which enforces safety and @trusted (like unsafe in Rust). Those are all attributes you can write libraries in like @nogc etc.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: