Hacker Newsnew | past | comments | ask | show | jobs | submit | tleilaxu's commentslogin

Indeed. Humans still created the shape, they just used a tool of their choosing to do so…


I adore that film. It is nuts, but has a dreamy metaphysical quality to it that I love.


Fentanyl in MDMA, an easily synthesised empathogen stimulant - i.e. the complete opposite of an opioid high?

Are dealers just sprinkling it like fairy dust over everything?

What on earth is going on over there?


It's like MSG, sprinkle a bit on to induce addiction.


nope. Accidental or FUD.


Quietly, I hope…


Surprising precisely no one, I suspect.


Finally someone else will do the window twitching snitching for me.


Around 86% of Firefox’s income is from Google, yes.


Do you take the number from here? https://assets.mozilla.net/annualreport/2022/mozilla-fdn-202...

86% of revenue of Mozilla corp are royalties, which encompasses any search engine that shares revenue with Firefox, not just Google. But the remaining 14% is not only revenue generated by Firefox, but also by e.g. Pocket. So from their financial statement, it's pretty hard to say what percentage of Firefox's revenue is derived from Google.


Isn’t Google the only one?


soo....yeah..


The UK seems to be doing its best to top France in that respect. As is tradition.


Just wait until they can start executing AI-related tasks with quantum computing in 20 years time. The hype will no doubt be insufferable.


The hype might end by that time. Maybe it will be "self-replicating self-organizing microrobots" by then...


I suspect the existing implementation and it’s downsides are a feature not a bug.


The aforementioned example shows nefarious exploitation of the vulnerability, but the same vulnerability is likely also "exploited" day to day by authorized users as a shortcut or workaround against system failures, missing features or bad user experience.

For example, in a perfectly-secure system, how hard would it be to delegate access to someone (we assume the reason for delegation is legitimate)? If it's harder than writing down the access code and/or texting them then it's a downgrade. Is there a contingency process to keep working if your (obviously outsourced) SSO provider is down, or your machine is applying updates, or your browser is pestering you to leave feedback and trying to convince you to switch to their search engine before it'll let you access the system's access control page? Etc.


The bullet would act as shrapnel and pling off into something expensive.


What about an air gun pellet? Surely they are small enough (.177)

On the other hand they might be too small to penetrate the thick rubber.


Now you’re thinking like a real rsearcher:

“NASA Develops New Caliber Bullet And Design For Penetrating Shuttle Tires For $50M”

“NASA Awards $50M Contract For Remington To Develop New Rifle For Shuttle Tire Woes”

“NASA Awards $10M Contract For Gun Range”


But why, they already found a perfectly good method


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: