Hacker Newsnew | past | comments | ask | show | jobs | submit | az_reth's commentslogin

Getting into D&D and found this article to be quite interesting. Dead wrong, but interesting.


> Dead wrong, but interesting.

Hah, hard agree!

> Sure, a 40-0 roll being a 50 isn’t immediately obvious, but this is the only internally consistent method I can see here.

The author is trading the ability to intuitively read numbers for consistency, which isn't needed. I'd much rather remember the one special case - `00-0` being 100 - rather than the un-intuitive need to treat every `X0-0` as `(X+1)0`.

And in any case... consistency is whatever you choose and stick with.


Or just stop showering /s


Halfway through the article I completely forgot that it was about JavaScript, and I could only think about Tim Tams


I use Siri exclusively to call my SO, because the way the British accent pronounces their contact name is just too funny.


Also there are desktop-less yet graphical ways to use Linux, such as tiling window managers


Not my cup of tea personally. I like my high-profile clickity-clacks too much.

That being said, it's a work of art.


Except you're still protected whenever a website gets breached and all their passwords are dumped. Sure it's still a single point of failure but at least it's with a company dedicated to password security.


how?

standard TOTP MFA (which is what most password managers would offer in terms of MFA) uses a shared secret, which you would just dump from the same database you get the dumped passwords from.

unless you use asymmetric crypto e.g. in webauthn this doesn't benefit you at all.


Except that the seed for the TOTP is unique to each website, because the website generates it, as opposed to an user-supplied password that might get reused across website. The impact is limited to the already compromised website, which is pretty darn good.


This was published 10 years before I was born. I found myself spending most of my time on the ads instead of the content.


It's very fun! Would love to dig around in the source code.


It seems those are indeed the two options. This link gives details on how to perform either or the other.

https://fennel-lang.org/setup#embedding-fennel


Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: