Hacker Newsnew | past | comments | ask | show | jobs | submit | internetter's commentslogin

crypto?

For a few things, yeah that works. Except the fee is high without lightning, and lightning confuses me

Ended up dropping migadu. Lots of things I liked like the configuration but it was fairly expensive for what you got. After 3 years of paying, I once went over my outbound quota and couldn't send email for the day.

I'm a happy icloud photos user. Other sync is not so good, but icloud photos works fine.

Apple limits other apps from performing actual syncing without being in the foreground. That’s a lockin feature.

How many photos do you have in iCloud?

I have 40k. Works fine.

> Cloud gaming is flatly non-workable for any kind of game where latency matters.

Not if only the rendering is done on the client. Look at rocket league.

Edit: of course, it is still possible to cheat in rocket league, but because all physics state is server authoritative at best a perfectly coded cheat could play like a perfect human, not supernatural.


I'm not familiar with Rocket League but server authoritative netcode is not comparable to cloud gaming. All games should be as server authoritative as possible to prevent cheating from the start. The problem is the client may have more state in memory than what you can see rendered on screen (players behind walls). Running the game on the cloud makes all of that inaccessible to cheats.

many sport communities call doping cheating

and that's reasonable! but it's not a given. It's different from other kinds of cheating and some of its motivations are unusual when it comes to cheating restrictions (e.g., long-term health of players)


Thanks for the link. I read the GP's comment, and was thinking that was an ballsy if not hilarious move on the hacker's part. Your link saved me the trouble of searching. I'm not a gamer, so I don't keep up with these details. Whether you like it or not, the cheat devs are definitely HN level types

> TSMC does now have fabs Arizona, though I'm not sure what their capacity is.

180,000 wafers a year. Globally they do 17 million. They announced first profit yesterday.


Global Foundries is on 12nm. TSMC is at 3.

TSMC gets their machines from ASML who licenses their technology from the Department of Energy. The US will be OK.

If (or when) China invades Taiwan we will be better off than Taiwan but I wouldn't call us "OK" at that point. That will be a major disruption.

It will take decades for the US to get where Taiwan is now in semiconductor manufacturing, if ever. It's not just about building the most advanced chip factory. It's about re-aligning the entire nation's value system and culture to allow such development to happen in the first place.

We complain about the money we spend already. And now we're supposed to subsidize an entire industry to the point where we can build the most complex machines known to civilization at scale in a time-frame that matters to a global conflict that's potentially approaching soon? I don't see it.


> It's about re-aligning the entire nation's value system and culture to allow such development to happen in the first place.

It's taken about 8 years to realign the US from a democracy to a fascist regime, something that was nearly unthinkable. This isn't a hard problem with the right propaganda and manipulation.


Yes but it's easy to go from democracy to fascism. It's harder going the other way. It's like going from a clean house to a messy house is much easier than going from a filthy house to a tidy house.

If it was that simple, Intel, Samsung, etc. wouldn't be behind TSMC. There's a lot more to it than just buying an ASML machine.

This shows me you are not aware of just how much work goes into EUV and beyond besides simply buying the machine.

> The blog writer/marketer needs to look at the index access logs.

How can you say this if microsoft is issuing a fix?


> I don't say I've visited a website when I've found a result of it in Google

I mean, it depends on how large the index window is, because if google returned the entire webpage content without leaving (amp moment), you did visit the website. fine line.


The challenge then is to differentiate between "I wanted to access the secret website/document" and "Google/Copilot gave me the secret website/document, but it was not my intention to access that".

Access is access. Regardless of whether you intended to view the document, you are now aware of its content in either case, and an audit entry must be logged.

Strongly agree. Consider the case of a healthcare application where, during the course of business, staff may perform searches for patients by name. When "Ada Lovelace" appears even briefly in the search results of a "search-as-you-type" for some "Adam _lastname", has their privacy has been compromised? I think so, and the audit log should reflect that.

I'm a fan of FHIR (a healthcare api standard, but far from widely adopted), and they have a secondary set of definitions for Audit log patterns (BALP) that recommends this kind of behaviour. https://profiles.ihe.net/ITI/BALP/StructureDefinition-IHE.Ba...

"[Given a query for patients,] When multiple patient results are returned, one AuditEvent is created for every Patient identified in the resulting search set. Note this is true when the search set bundle includes any number of resources that collectively reference multiple Patients."


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: