Hacker Newsnew | past | comments | ask | show | jobs | submit | vtsrh's commentslogin

And removed from the first page down to 978th position.

https://news.ycombinator.com/news?p=33

Don't tell me this was caused by user flags, because it clearly wasn't.

Edit: It is completely gone now.


> Don't tell me this was caused by user flags, because it clearly wasn't.

It was caused entirely by user flags. Why would you say it wasn't?

Moderators didn't penalize the post. We did unkill it so discussion could continue.


I got the impression that the person wasn't insured.

Having glanced over some of the ( 14000+ ) comments, I haven't found any that would suggest otherwise. I really wish someone would clarify this.


I was genuinely interested in the topic and clicked on the link. I was met with an interface that was alien to me, as if someone went out of their way to make it unusable and semi-broken. Browsers have an established UI with a scroll bar, yet people constantly find new ways to break it.

Check this page out: http://resonate.duarte.com/#!page226

Using a scroll bar to fix the decision to not use the scroll bar as the main navigation tool. ( And the page is torn unless the window has the correct width. )


Totally agreed and oh so ironic that a guide to presenting had me leave 15 seconds in due to the way the information was presented.


I find it rather disappointing that it still takes on the order of 10^2 milliseconds to solve the hardest sudokus.

This was tested with my own algorithm and one supposedly fast found online. I will revise my code, but I doubt I will improve the speed.


This is great, but everything so far is overly positive. Can we get some negative criticism as well. Anyone qualified?


I'm not really qualified to speak as to its statistical properties, but I've used this generator a couple times.

The biggest downside I ran into is that it requires 64 bit numbers even for the 32 bit RNG, which means its very simple code becomes more complex on a platform with only 32 bit numbers, or in a scripting language. Also, it's not a CSPRNG, if this matters to you.

This is minor though, and I would use it again. It's flexibility for seeding and easy serialization outweigh this IMO (and it's still simple compared to e.g. mtrand)


I must have done something wrong, but I tried the basic C implementation (https://github.com/imneme/pcg-c-basic) on a quick Diehard-like test and it failed. I'm still trying to understand why. Probably not its fault, just that the code is not as forgiving and ready-to-consume as I had expected.


It passed for me. Where did you get the diehard test? If you compiled it directly from http://www.stat.fsu.edu/pub/diehard/ then it is because that source is broken.


Try using Dieharder. It incorporates most of the Diehard tests, as well as other tests and is much more rigorous.

sudo apt-get install dieharder

http://www.phy.duke.edu/~rgb/General/dieharder.php

If you make a GSL interface for the RNG it will make using dieharder much easier


How do you build dieharder on windows? I guess you just don't...


I actually tried a modified OCaml implementation of a very simple test. The issue is probably due to bad seeding/initialization: if I use the given static seed, it passes, but if I try to provide any other seed, it fails on at least one test.

I'll try to find a more complete/better tested port, or try to do it myself.


Speaker mentions[0] that it is possible to get a different statistically random value every time you run the program, without any input to the program, apparently by using some tricks, but she refuses to elaborate for the camera. Can anyone explain how that works?

Has this something to do with address space randomization?

[0]:https://youtu.be/45Oet5qjlms?t=1h3m3s


> (This last one relies on the operating system placing myRNG at a different address every time the program is run. It's not as strong as the other techniques.)

from: http://www.pcg-random.org/useful-features.html#id2


Linux gives each process a 32 bit random seed, which is probably more useful (as is making a syscall). On an embedded system the address seed may well be useless anyway.


Probably not what she meant, but Linux has a RNG that extracts randomness from CPU execution time jitter: https://lwn.net/Articles/642166/


Tesla Superchargers are not the solution for this, as they are simply not designed for such use. They were built to help with long range destinations.

There are cases where users, (ab)using them as you do, got a request to reduce their usage. I guess you didn't trigger any flags.


Well the solution is simple:

  return (x+0U)<<16 | (y+0U);
Would it be insane to have a inline library for every arithmetic operation, that would handle such cases and offer addition optional functionality?


The intersection of people who are willing to rewrite all their arithmetic to use such a library with people who are not willing to switch to a non-C language is rather small.


Keep the old code, instead just start using it for new one.


Most projects still written in C are those that make extensive use of C libraries. Making the application code immune doesn't actually reduce the vulnerability surface much - much of the vulnerability comes in the libraries the application calls.


Use it for new code. Libraries are written too.


Libraries are usually older than the applications that use them. New libraries can be, and often are, written in new languages.


https://news.ycombinator.com/item?id=9885478

Looks like you hit an infinite loop. Better luck next time.


The good part is that this removes the same vulnerability for everyone.


My point, though, is that if a random Italian consultancy can amass multiple Flash 0-days, the folks at the NSA with the $10+ billion budget probably have an essentially endless supply of them (not to mention exploits for other software) at the ready.


This shows that their universe generation is simple. They cannot generate gas giants with moons, that would in fact be solid.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: