Hacker Newsnew | past | comments | ask | show | jobs | submit | 2014-10-19login
Stories from October 19, 2014
Go back a day, month, or year. Go forward a day, month, or year.
1.Simple CPU (simplecpu.com)
617 points by michael_fine on Oct 19, 2014 | 62 comments
2.Making sure crypto remains insecure [pdf] (cr.yp.to)
439 points by zorked on Oct 19, 2014 | 171 comments
3.Safari is sending every search query to Apple (gist.github.com)
327 points by MrGando on Oct 19, 2014 | 124 comments
4.How a lawyer, mechanic, and engineer blew open an auto scandal (pando.com)
269 points by waffle_ss on Oct 19, 2014 | 130 comments
5.Use a Fake Location for Cheap Airfare (businessinsider.com)
276 points by ZeljkoS on Oct 19, 2014 | 121 comments
6.My First Keyboard Build (davecooper.org)
268 points by gurgus on Oct 19, 2014 | 78 comments
7.Data Visualization with JavaScript (jsdatav.is)
222 points by nahname on Oct 19, 2014 | 21 comments
8.Shall we fork Debian? (debianfork.org)
214 points by kissgyorgy on Oct 19, 2014 | 274 comments
9.Go home Twitter, you're drunk (twitter.com/abhaxas)
211 points by thefreeman on Oct 19, 2014 | 41 comments
10.SimCity That I Used to Know (medium.com/re-form)
181 points by KhalilK on Oct 19, 2014 | 53 comments
11.Disney rendered its new animated film on a 55,000-core supercomputer (engadget.com)
177 points by 0max on Oct 19, 2014 | 91 comments
12.The Gombe Chimpanzee War (wikipedia.org)
134 points by gwern on Oct 19, 2014 | 30 comments
13.Dutch team is pioneering development of crops fed by sea water (theguardian.com)
125 points by aaron695 on Oct 19, 2014 | 30 comments
14.Ask HN: Are there any innovative startups in the porn/adult industry?
126 points by rblion on Oct 19, 2014 | 127 comments
15.Ask HN: My VPS got hacked and now I'm facing a massive bill. What can I do?
110 points by Koekoeksklok on Oct 19, 2014 | 77 comments
16.Human Interface Guidelines (elementaryos.org)
111 points by macco on Oct 19, 2014 | 23 comments
17.Hackers strike defense companies through real-time ad bidding (computerworld.com)
111 points by r0h1n on Oct 19, 2014 | 41 comments
18.How marijuana legalization in Colorado and Washington is making the world better (washingtonpost.com)
111 points by krigath on Oct 19, 2014 | 84 comments

Wow! There is so much going on here. I can't believe you're not logging!

* First it starts out as a simple maze puzzle game.

* Then it there're weird layouts where people are clicking stuff, and pathways are opening up randomly.

* Then you realise it's not random at all, people have to click things for pathways to open.

* Then you realise someone has to stay behind and sacrifice themselves for other people to go through.

* Then there're levels where multiple people have to coordinate and click at the same time to open n layers gates.

* Then there're levels where not only do you have to stay behind, you have to go out of your way to do so. So you'll be letting people through for a while, you realise, as it's more efficient for the group as a whole. At some point you have to decide you've taken your turn and you move towards the main gate and wait, and then new people come and then they have to realise to go to press the key.

* So next level you see someone sacrificing themselves and you decide instead to go take their place and wiggle your mouse to tell them to go. "I got this", you indicate.

* Now some people have got it into their head this is all about cooperation and selflessness. So you can be waiting in one of these buttons in the middle of nowhere, letting people through for a minute, and a new guy will start making their way towards you to let you go, and you draw "thanks" on your way out, they wiggle their mouse to say "welcome" and off you go, leaving them behind.

* On some levels, not only did people have to coordinate at the same time, but things had to be done in sequence. On one, there wasn't enough people to hit all buttons at once, so we coordinated where you would unwrap the "outer" layer of wall protecting the exit, and a couple people would move inside, then you'd unwrap another inner layer, and so on, until they could get out. Finally, you'd decide your turn was over and go wait the same way. It took quite a while before this was figured out collectively -- but once newcomers saw how it was done it went in one smooth operation until I got out and onto another maze.

And that's to say nothing of the selfish people who just passed through maze after maze. In one maze people were waiting, and I and another were at the buttons, but there was one other. One of them had to realise they needed to sacrifice themselves. We were both wiggling our mouses to indicate so, but they didn't see it.

There's also the way people will follow you in the maze if you look confident, and the way people will draw on the right exit to help people out. I'd try to leave a trail if I'd had the right exit cracked in the maze.

In a way I think the inability to write and communicate is fantastic: you can't just tell someone "do this". They have to figure out that they need to collaborate, they have to have some kind of intuitive social empathy that puts the needs of the many against the needs of the few.

Genuinely, mate, this is the most fascinating "game" I've played in a long time. And I can't believe you're not logging it all! I'm sure game theorists and psychologists would love to get their hands on this kind of data. I thought it was a real experiment done for research.

Glad I got to play this while 700 people were on it, I think that really made for some great interactions. It felt like being part of some kind of military team.

20.The Coming Code Bootcamp Destruction (zedshaw.com)
89 points by hkmurakami on Oct 19, 2014 | 23 comments

This is a fun slide deck, but if you'll forgive me for sucking some of the mystique out of it: it's just a reframing of DJB's hobby horses:

* The group that standardized AES rejected cache timing as a viable attack vector: http://cr.yp.to/antiforgery/cachetiming-20050414.pdf --- more generally, that constant-time algorithms and constructions (a feature of virtually all of Bernstein's work for the last 15+ years) aren't taken seriously in industry. Also helpful to know: there's a defensible argument that Bernstein more or less started AES cache timing research.

* Side-channel attacks weren't taken seriously by TLS, and Bernstein is affiliated with one of the research groups that found a TLS side-channel attack: http://www.isg.rhul.ac.uk/tls/Lucky13.html

* Application-layer randomness is a bad idea, and, like Nacl does, everyone should just use a single, carefully audit kernel RNG: http://blog.cr.yp.to/20140205-entropy.html

* Protocols and constructions should be designed to minimize dependence on randomness, the way DJB's EdDSA does: http://ed25519.cr.yp.to/ed25519-20110926.pdf

* Crypto performance is both not taken seriously as a research goal and an excuse for the deployment of terrible cryptography. This isn't so much a hobby horse of DJB's as it is his entire research career: http://cr.yp.to/cv/research-net-20070115.pdf

* DNSSEC, with its core design goals of "sign-only", "sign offline", and "sign from the root down" is a terrible idea. A sane design would look more like DNSCurve: http://dnscurve.org/ (helps also to know that DJB has a longstanding feud with both the design team for BIND, the flagship DNSSEC implementation, and with Namedroppers, the IETF DNS standardization list).

Unsurprisingly, considering the source, these are all really great important ideas. Bernstein is one of my heroes, and I'm certainly not trying to take him down a peg here. I just thought it might be interesting for people to know that this deck is less a revelation about cryptography than it is a survey of DJB's research over the last 15 years.

I'm surprised he didn't take more time on RC4, which he was closely involved with breaking. The story about how something as dazzlingly broken as RC4 could have gotten so entrenched in the industry is much more interesting than the story about how AES was standardized despite its performance relying so much on table lookups.

22.“Why Does S Look Like F?”: A Guide to Reading Very Old Books (2013) (theappendix.net)
88 points by bane on Oct 19, 2014 | 21 comments
23.What Organized Crime Pays (vice.com)
84 points by mathattack on Oct 19, 2014 | 35 comments
24.The Hidden Power of BCD Instructions (scene.org)
80 points by nkurz on Oct 19, 2014 | 22 comments
25.The third great wave (economist.com)
76 points by mpdaugherty on Oct 19, 2014 | 53 comments

From the source:

.....

> Why don't you do that [i.e. vote against systemd] yourselves?

>

> We are excluded from voting on the issue: only few of us

> have the time and patience to interact with Debian on a

> voluntary basis.

.....

In that case, you don't have the time and patience to operate and maintain a worthwhile and ongoing Debian fork.

In that case, there is no substance to the "question" you're raising, because you wouldn't actually do what you're calling for.

In that case, you're just a handful of guys (or maybe even just one guy) who spent $10 on a domain name... to get more attention for your Slashdot/Reddit/HN post than it otherwise would have had if posted straight to Slashdot/Reddit/HN directly.

27.Google Earth Engine (earthengine.google.org)
77 points by o0-0o on Oct 19, 2014 | 18 comments
28.Skeleton.io – Curated skeleton app and boilerplate code directory (skeleton.io)
69 points by ingelheim on Oct 19, 2014 | 19 comments
29.20 Years of Impulse Tracker, Part 3 (roartindon.blogspot.com)
63 points by bane on Oct 19, 2014 | 4 comments
30.Egg Freezing: A Sign Your Workplace Is a Dystopian HellHole (huntgatherlove.com)
67 points by rubikscube on Oct 19, 2014 | 81 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: