Hacker Newsnew | past | comments | ask | show | jobs | submit | nikeee's commentslogin

It is called Duration.

a much less ambiguous name than Interval

> the only viable use cases were compute-heavy workloads like codecs and crypto,

I tried using it for crypto, but WASM does not have instructions for crypto. So it basically falls back to be non-hw-accelerated. Tried to find out why and the explanation seems to be that it's not needed because JS has a `crypto` API which uses hw intrinsics.


Bun added `trustedDependencies` [1] to package.json and only executes postInstall scripts coming from these dependencies. I think this is something that should be supported across all JS package managers, even more than version cooldowns.

[1]: https://bun.com/docs/guides/install/trusted


That's security theater. The package can still run arbitrary code the moment it's actually used.


That could probably be solved by opting in to the permission model of Node. But that won't work for everybody, especially in legacy applications.

Having trusted dependencies at least drastically reduces the risk that 'git clone && npm install' takes over the entire system.

Cooling down dependencies would certainly help, also.


How can you know that a dependency you trust won't be hacked? At best it slightly reduces the risk, but it's not even close to the effectiveness of version cooldowns that just block 100% of fresh updates.


Can you help me understand why one would ever need a post-install script in the first place, please?


Ime the most reasonable case is an optional compilation of native components when prebuilt ones are not compatible. See also node-gyp


Some tools also install pre-commit hooks. I don't like this practice, but I get why people are using it.


Compiling native extensions that link against libraries that can’t be included in the package for license reasons. That’s probably the one reason that simply can’t be removed.


To restart a service, or run ldconfig?


So if i happen to know the numbers of other file descriptors of the process (listed in /proc), i can redirect to other files opened in the current process? 2>&1234? Or is it restricted to 0/1/2 by the shell?

Would probably be hard to guess since the process may not have opened any file once it started.


> Or is it restricted to 0/1/2 by the shell?

It is not. You can use any arbitrary numbers provided they're initialized properly. These values are just file descriptors.

For Example -> https://gist.github.com/valarauca/71b99af82ccbb156e0601c5df8...

I've used (see: example) to handle applications that just dump pointless noise into stdout/stderr, which is only useful when the binary crashes/fails. Provided the error is marked by a non-zero return code, this will then correctly display the stdout/stderr (provided there is <64KiB of it).


No restrictions. You can create your own beautiful monsters that way.

> Would probably be hard to guess since the process may not have opened any file once it started.

You need to not only inspect the current state, but also race the process before the assignments change.


I use git-trim for that:

https://github.com/foriequal0/git-trim

Readme also explains why it's better than a bash-oneliner in some cases.


Or you don't use the defualt case and rely on definite assignment analysis or checks for returns in every code path.

I find the never type in TS actually being a proper bottom type + having control-flow based types vastly superior to what rust offers.


There was dudle [1] developed and hosted by a German university. Seems unmaintained, but there is an independent project called BitPoll [2].

[1]: https://github.com/kellerben/dudle [2]: https://github.com/fsinfuhh/BitPoll


I hope that when all online content is entirely AI generated, humanity will put their phone aside and re-discover reality because we realize that the social networks have become entirely worthless.


To some degree there’s something like this happening. The old saying “pics or it didn’t happen” used to mean young people needed to take their phones out for everything.

Now any photo can be faked, so the only photos to take are ones that you want yourself for memories.


That's not what that saying means/meant.


Naww.... people have always taken the easy path and put off confronting difficult feelings and emotions. The vast majority of humanity will 100% spend hours a day swiping through computer generated content in the future. Whats the difference between a tiktok video featuring some vapid real person I will never know vs some vapid machine generated person I will never know. They both serve the same purpose.


What's more likely is that a significant number of people will start having most/all of their meaningful interactions with AI instead of with other people.


What a nice thought :)


lol if they don't put the phone down now, then how can AI generated content specifically optimized to get people to stay be any better.


What if the software is developed and potentially backdoored in the US and deployed by the EU team in the sovereign region? Or did they rewrite the entire AWS stack?


If the EU employees can look around the code, it would then get quite interesting if they were to point out a backdoor. which they would of course raise with an EU based CERT. In a way that protects US customers as well having a set that can't be stopped from doing that.


Assuming EU employees get to see the sources, let alone own their building process.


True, and there's probably a lot of it; still I think they already have some EU devs, but I guess only on some things.


I don't think there are any protections against that. On the other hand, you'd have to ask yourself how realistic it is that the US is forcing Amazon to secretly backdoor its own software for US spying abroad? I can't give an answer on that one, you'll have to form your own opinion.

I imagine that if a back door were ever discovered, AWS's reputation would tank so hard that a lot of companies would probably never do business with it again.


> how realistic it is that the US is forcing Amazon to secretly backdoor its own software for US spying abroad?

probably 100%?


Over 100%, in that I'm sure multiple independent groups are working on it all the time. The spooks regularly place actual agents in foreign governments (the Germans found a big nest of them and nothing much happened in the end). There's no way it would be challenging for them to find an employee willing to cash a giant cheque in exchange for quietly granting their own government access.


Maybe you missed when Microsoft blocked the email account of the chief prosecutor of the international court of justice: https://www.heise.de/en/news/Criminal-Court-Microsoft-s-emai...

Of course these services are backdoored.


How is that a “backdoor”? It was just an (outrageous) administrative decision.


Keep in mind that a train in Germany counts as one-time if it is less than 6 minutes late. In Switzerland, it's 3 minutes.

Also in Germany, a train that did not even arrive does not count as too late.

There is also a concept of the "Pofalla-Wende", which is when a train is so late that it just does a 180 and drives back, to mitigate that the delay doesn't carry over to the train's next route. Of course, that means that it skips the stations at the end of the route.


Experienced that a few months ago. Next time I‘ll be tempted to pull the emergency brake which will cost them at least half an hour to get the train going again. Or so I have been told.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: