Hacker Newsnew | past | comments | ask | show | jobs | submit | megous's commentslogin

Yeah, you still have to check for the limits, not just declare them. Then have fun smashing anything.

Matters the most to whom? I certainly will not care about expensive models that do about the same thing cheap non-american models do.

It's like the USA Librem 5 vs PinePhone. About the same HW for $1600 vs $150.

Sure will not pay 10x for "US" thing just because it's a US thing.


US will kill more people through secondary effects of their aggression against Iran, than Iran's nuke ever would directly. True barbarians, except I understand English, so they sound to me less like bar bar bar, and more like a*holes. My gf tries to convince me US americans just don't care and are more like a bear in a porcelain shop. But dunno, I look at Cuba, Iran, Israel and lot of other places americans are very aggressive in/against and it's more like a*holes at this point to me. Whole porcelain shop is suffering. This just isn't the "we are big and stumbled a bit and broke stuff", anymore.

Whether something is tedious depends on the person and situation. If you're already an expert, you may find a lot of work that goes into your 4th USB device (especially if it's based on yet another chip and bespoke SDK) quite tedious, since lot of it is based on standard requirements/designs that you can't change.

You may also find re-ing stuff not tedious, due to what may be motivating you.

In any case, any work will have some things you just know how to do, or what to do, but previously (before LLM agents) no easy way to plow through them without pressing a lot of keyboard keys over long period of time.


You actually get what you ask for. And you can ask for anything, vaguely or not.

You'll end with spaghetti if you'll play a bad manager and only ever allocate time for new features and never for cleanups.

You can go through code, add REFACTOR comments based on your tastes and thoughts, and get your result and iterate to your heart's wishes. You just don't need to do the direct code typing.


3k+ is well into the headache / feel really bad range

we rarely get over 1k here


How many zeroday vulns had the article author discovered using AI assisted methods?

Some EP commitee writes a report about some UK (not-EU) person stating "VPNs are a loophole that needs closing".

  > A loophole that needs closing
  [Some argue] that this is a loophole in the legislation that needs closing and call for age verification to be required for VPNs as well.
[Some argue] being a link to some UK website

https://www.europarl.europa.eu/thinktank/en/document/EPRS_AT...


I don't think you could do it. Not with the original BJT variant anyway. :)

Hmm, why not? For the astable configuration, you could use a 100F capacitor with R1 = 10 Meg and R2 = 7.5 Meg, for a 55 year period. Base current for the Threshold NPN will come from the Trigger PNP (and hopefully temperature drift matches OK). Other than maybe the 100F capacitor might have some variation in capacitance and leakage current over the course of 55 years ;-)

https://www.digikey.com/en/products/detail/tecate-group/PBLH...


Once you get above a couple meg, the oils on your fingers start affecting the resistance. Better hope no-one touches with your 55 year counter

at 1% initial precision of just eg. LM555 itself, you're looking at +-0.5 year just from the chip's contribution. If you ever find 100F 1% precision capacitor and 0% precision resistors, you may maybe hit +- 1 year if the other conditions are perfectly predictable, which they are not.

For your chosen capacitor, manufacturer doesn't even bother providing the tolerances. :) Good luck with that.


So you can send a binary SMS to a phone that will pass it to SIM and SIM will interpret it via bytecode, to execute whatever, incl. making the phone to send an outgoing SMS, with requested data, silently, wtf? :D And this is a normal documented thing.

I gather that paranoid people did not exist/have power back then, when this was designed.


Most people outside the field don't know much about all the internals of phones, SIMs, etc., unfortunately...

Reminds me two articles about SIM cards autonomously sending SMS messages (found here on HN long time ago, probably)

https://medium.com/telecom-expert/what-is-at-t-doing-at-1111... https://medium.com/telecom-expert/more-proactive-sims-f8da2e...


SIM cards are Oracle Java Card.

There are companies offering services and SIM (java card) applets for card management and other functions. Also, there are opensource applets.

https://github.com/crocs-muni/javacard-curated-list#mobile-t...


I understand why a network would like to be able to do this. I suppose that is why it was written into the standard, and I suppose since it's an obscure feature, networks didn't implement firewalls blocking such messages coming from other networks.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: