Hacker News new | past | comments | ask | show | jobs | submit | joeframbach's comments login

Firefox Android here, the page zooms in and out when I double tap on a keyboard.


1. Floor operator is `⌊n⌋`.

2. Exponentiation implementation depends on the size of the power. For very small powers normally they are represented as their reciprocal, then operated on within the exponent.

    y = b ** (1/x)

for very large x is rewritten as

    y = Math.exp(Math.log(b) / x)


I can *assure* you that php is expressly prohibited for use at Amazon.


Really? How come? What is the history with regarding to that? What are their reasoning? Does it apply to PHP >=8?


I have Tampermonkey scripts that delete Twitter entries from HN and anywhere else on the web. Seems to work well for me.


Would you mind sharing?


uBlock Origin rules:

    news.ycombinator.com##tr.athing:has(a[href^="https://twitter.com"]) + tr + tr.spacer
    news.ycombinator.com##tr.athing:has(a[href^="https://twitter.com"]) + tr
    news.ycombinator.com##tr.athing:has(a[href^="https://twitter.com"])
    *##a[href^="https://twitter.com"]:style(text-decoration: line-through !important)


I tried responding here but my comment isn't showing up -- was it autoremoved? I'm commenting with this meta-comment to check.


I see 3 very similar comments from you sharing block rules. Is one of your browser extensions hiding your own comments from you? Try viewing this thread in a no-extension browser.


...yes. The rule deletes this comment as well.


0.0.0.0 twitter.com

0.0.0.0 platform.twitter.com


Most likely, the example of the $55 FBA item has free shipping, but the $51 non-FBA item has a shipping cost > $4.


The Shimasen traditionally is made with cat skin. https://en.m.wikipedia.org/wiki/Shamisen. In the Clannad VN, one character names his cat "Shimasen".


On mobile, at least on Android, you can long-press on a title then dismiss the "open in" modal, but the hover effect remains.


This sounds like a violation of the CFAA per unauthorized use of computer resources. Think Apple would be held liable for it?


What computer resources are being used without authorization?


They gave Apple authorization to access their phone (the phone is not Apple property) in order to copy certain things into the cloud.

They uploaded new software and downloaded data they were not authorized to download without getting permission first.

I'm sure there is some cover your ass clause in the EULA that tries to protect them when they (accidentally or on purpose) violate the CFAA, but, in this case, they pretty clearly did things that exceeded their authorization.

The relevant part of the CFAA is a.1 (I removed the bits that are irrelevant):

> (a) Whoever—

> (1) having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such conduct having obtained ... restricted data, as defined in ... causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it ...

https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act


The data wasn’t transmitted, communicated or delivered to Apple. It’s E2E encrypted, so Apple can’t receive it.

The service isn’t capable of delivering the keychain to anything other than the user’s own devices.


Who do you think the other end is?

It’s Apple. They are the other end where the traffic is decrypted.

And yes they can see your stuff. We know this because law enforcement gets access to it all the time.

The keychain is just another keystore.


Please don't spread lies.

> They are the other end where the traffic is decrypted

Only for certain types of data, with certain settings. That does not include the keychain.

https://support.apple.com/en-us/102651

> And yes they can see your stuff. We know this because law enforcement gets access to it all the time.

What law enforcement typically gets access to is iCloud Backups, which is not end-to-end encrypted by default (but can be) and is not a mandatory feature. iCloud backups do not contain your keychain.

> The keychain is just another keystore

Nobody has said anything else? But Apple does not hold the key to decrypt it.


Your link (Dec 14, 2023) says they E2E encrypt it and do not store escrow keys, but this link (May 13, 2022) says they store escrow keys for keychain:

https://support.apple.com/guide/security/secure-icloud-keych...

Did they announce this change? It's a pretty major UI departure. In particular, if you have one Apple device and loose it, the 2022 article implies you can recover your keychain, but the 2023 article says you're completely screwed.

A lot of people rely on iCloud backup. It seems like there should be a device-wide toggle that lets you choose between the two behaviors for things like passwords, health data, and all the other E2E apps.


The platform security guide PDF (May 2022) on the page you linked is a lot more detailed and explains it better https://help.apple.com/pdf/security/en_US/apple-platform-sec...

The escrow is only an additional layer of security - your device still has to decrypt the downloaded keychain contents using your password AFTER proving to escrow that you're allowed to download the encrypted keychain using device or SMS 2FA or an iCloud security code.


That definition quickly becomes absurd. If I run "cat a.txt b.txt" but only give it authorization to read a.txt, does that mean Richard Stallman (or whoever wrote the program) is breaking the law? You might say consent is implied in that case but:

1. I thought implied consent was out of fashion these days

2. What if it's something like an IDE that reads the surrounding directories? VS code does that and I certainly didn't know that feature even existed before I first opened it, so how could have given authorization? Is Microsoft in breach of the CFAA?


> 2. What if it's something like an IDE that reads the surrounding directories?

Reading the directory in a software running on your computer is not the problem. The question is, is data from the surrounding directories transmitted to somebody else's computer, a.k.a. The Cloud?



California allows one hand, star, or heart shape in the plate.


Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: