Hacker Newsnew | past | comments | ask | show | jobs | submit | rnhmjoj's commentslogin

No, because x/y is just an arbitrary operation between x and y. Here you're assuming that 1/x is the inverse of x under *, but it's not.

I mean in a normal math curriculum you would define only the multiplicative inverse and then there is a separate way to define fraction, if you start out with certain rings. It is kind of surprising to me that they did a lazy definition of division.

This is the PoW scheme that Monero currently uses:

> RandomX utilizes a virtual machine that executes programs in a special instruction set that consists of integer math, floating point math and branches. > These programs can be translated into the CPU's native machine code on the fly (example: program.asm). > At the end, the outputs of the executed programs are consolidated into a 256-bit result using a cryptographic hashing function (Blake2b).

I doubt that you anyone managed to create an ASIC that does this more efficiently and cost effective than a basic CPU. So, no, probably no one is mining Monero using an ASIC.


There are no excuses, this protocol is just terrible: it could have been made much much more secure without any kind of virtualisation or sandboxing.

For example, the kernel could be used[1] to store the secrets in memory and only authorize the userspace process that created it to read it; other processes could request access to a secret and only be given if you accept.

[1]: https://docs.kernel.org/security/keys/core.html


Yes, it's 100% a security theatre. Programs aren't even allowd to set their own icon because it's not considered secure, I'm not joking. The reasoning goes something like: what if a malicious program set its name to "firefox" and uses the firefox icon and then prompts you for the gmail password, eh?

At the same time a malware can just get all of your passwords without even asking using d-bus or read all of your files since it's running as your uid.


> Programs aren't even allowd to set their own icon

In GNOME. There is a protocol to set your window icon, and it will be respected by the Wayland compositors which are considering that there is value at having custom icons for each window. GNOME also considers it's confusing to have multiple windows from the same program with different icons, especially since the only places those icons could be displayed on GNOME are in the dock and in the Alt+Tab menu, but you pin apps to the dock, so those custom icons cannot be displayed there when there are multiple windows from the same app.


> At the same time a malware can just get all of your passwords without even asking using d-bus or read all of your files since it's running as your uid.

Thats not exactly true since this requires the application to have permission to talk to the secrets service (if using Flatpak)


Sandboxing on the Linux desktop is far from common and the flatpak security is kind of a joke [1] [2], unless something changed recently. For starters, it's the application that has to ask to be sandboxed, so if I were to make a malicious flatpak I will just ask for full file system access or d-bus.

[1]: https://flatkill.org/ [2]: https://hanako.codeberg.page/


I agree the flatpak defaults are not at all secure, as they often let the developer choose what to sandbox. I think this is fair, but the user has recourse: you can globally block all installed flatpaks from having access to a specific resource, even if the app "requests" it.

All my apps by defaults have no /home and no network access. I do this by writing to .local/share/flatpak/overrides/global (per user) or /var/lib/flatpak/overrides/global for the system. I wish this was publicized more. The defacto app for flatpak permissions, flatseal, doesn't have this capability yet to my knowledge.


> For starters, it's the application that has to ask to be sandboxed

Are you sure about this? My belief was that all flatpak apps run inside a bubblewrap (bwrap) sandbox. I just checked and that's exactly how it runs for me.

> so if I were to make a malicious flatpak I will just ask for full file system access or d-bus.

This is done at install time. The application inside the flatpak can't change it on its own. Reputed repositories like Flathub check the permissions and flag them if they are too broad. And you can also change it using something like FlatSeal. This is almost the same permissions model followed by Android.


Flatkill is very out of date and disingenuous. Flathub is very explicit and obnoxious about such unsafe permissions and can easily be modified by the user. It's also amusing that people here claim Wayland is a security theater too while posting about flatpak being bad because it's vulnerable to x11 issues.

No security boundary can prevent bad permissions just like in android.


> It's also amusing that people here claim Wayland is a security theater too while posting about flatpak being bad because it's vulnerable to x11 issues.

They both create an illusion of safety. We all know that X.org had no security model and it sucks. Wayland put restrictions that would make sense if the rest of the desktop ecosystem was made with security in mind, but it wasn't. I've heard way too many claims like "Wayland makes keyloggers impossible" that are technically true but irrelevant in the real world, because a desktop environment is not just Wayland.

Flatpack is also misleading and its sanboxing is just not great, regardless of the problem with X11.

> No security boundary can prevent bad permissions just like in android.

Good bringing this up: in Android the applications ask the user for permissions, in flatpak permissions are granted based on what the developed asked. That's just bad.


>applications ask the user for permissions

Such portals exist for some permissions like screensharing and other are planned.



> It is striking that we don't see that

It probably just means they are asking the providers to hand over the data, no need to perform active attacks.


This would be very optimistic, essentially the project meeting its main goal, I'm not sure why you're calling it dark comedy. A 20 minutes pulse alone would mean the fuel injection, aux heating, plasma control systems and the divertor are working as designed. Net positive energy also means we got the physics of a burning plasma right.

The most recent timeline I know (from 2024) in fact puts the start of the DT operation at 2035, so I doubt ITER would achieve such a huge result within less than an year.


I think it's the "consecutive" that makes it funny. This thing that entire continents have been working on together for decades was operational for 20 consecutive minutes?!?

It's dark comedy because the progress of fusion just feels so agonizingly slow, that even a very optimistic prediction for 10 years from now sounds like such small and functionally useless progress.

And there's no shade toward any of the entities involved, it's a hard problem, but it's still funny.


If you can run ITER for 20 minutes you've essentially proved the Tokamak concept is viable for commercial use.


No you don't. Commercial use means it makes economical sense. When you have to spend more on maintainance (and recycling/dumping contaminated wall material amd somehow get the fuel) then you never can hope to make any profit.

A running ITER with positive energy output for 20 minutes just proofs that the concept can actually work. From there to commercial use would still be a long way, if it ever can compete at all, except in niches, like deep space.

(I rather would bet on the Stelleratar design)


I'm not saying ITER would be a commercial machine, I'm saying the Tokamak design would be viable.

Stellarators are interesting, but have been studied much less in comparison.


Nah, it's huge, you just have to remember the best result so far: the JET DTE-3 record that produced the energy to boil 60 tea kettles in a whopping 5 seconds pulse.


I know, the fact that "consecutive" is actually significant in this context is part of the joke. Just try to read it from the perspective of someone that isn't steeped in the details (and expectations) of the slog of fusion. Relative to any kind of aspirational "flying cars" or "wacky ideas" future predictions, it sounds very underwhelming.


There's a more cursed one here: https://rgbcu.be/blog/htmnix. It hijacks the Nix search paths syntax (e.g. import <path> {}) to create html tags.


I had seen a few of those `__findFile` hackery articles lately and did actually consider doing that but I think having a nice way of adding HTML attributes would've been clunky :p

Edit: although looking at this article it seems to be supported.


oh my god, what a horrible but incredible idea


We are still trying to solve the problem that we can't keep the plasma hot long enough to create fusion energy, so working on exotic conversion schemes is one step too far.

Consider also how complex these reactors already are, it makes sense to use the simplest method that we know works well.


Makes sense, but from a layman perspective it seems like introducing additional complexity and lots of inefficient, high-loss transmission steps.

We start with detached electrons moving at high speeds (plasma). We want detached electrons moving at moderate speeds (electrical current). And yet, the intermediate steps involve everything from heat, steam, large-scale mechanical forces and magnetic induction, just to get back to the electrons?

It feels more like the "pull in a 500MB framework instead of writing the function yourself" kind of simplicity.


> It feels more like the "pull in a 500MB framework instead of writing the function yourself" kind of simplicity.

Essentially yes, but it's a function that has been continuously optimised by engineers for 200 years.


In physics it is common to work explicitily with the components in a base (see tensors in relativity or representation theory), but it's also very important to understand how your quantities transform between different basis. It's a trade-off.


Yes, the L^p spaces are not vector spaces of functions, but essentially equivalent classes of functions that give the same result in an Lebesgue integral. For these reason, common operations on functions, like evaluating at a point or taking a derivative are undefined.

If you care about these you need something more restrictive, for example to study differential equations you can work in Sobolev spaces, where the continuity requirement allows you to identify an equivalent class with a well-defined function.


Thanks for the clarification


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: