Hacker News new | past | comments | ask | show | jobs | submit | proaralyst's comments login

This is cool! The simulator was useful for understanding what was going on, I hadn't realised until I watched a few that the roons can push marbles out in between squares.


Thanks! Glad to hear the simulator was worthwhile, took me ages to hack it into shape. I did actually experiment with adding markings on the edges of the path roons, so that when you put them together, the "phantom channel" becomes visible. Ended up looking pretty cluttered though so I scrapped it.


I don't see planning mentioned much in the article or comments. The Town and Country Planning act is a large cause of high development costs in the UK. Roads, rail, public works, nuclear power stations, onshore renewables and above all housing have all suffered significantly because getting things approved is so difficult.

Most other affluent nations have some form of zoning instead, which make planning much much easier. Most other affluent nations have more central control over planning too, which makes consensus over megaprojects easier to reach.


This feels similar to heat pumps being >100% efficient though? Perhaps a less misleading headline would be 'Very low-power LEDs also convert heat to light'


Ukraine's drones are already partly automated because of the jamming environment: they can visually lock the drone onto a target from up to 10km away.[0][1] They're also using drones that trail a fibre optic over several kilometres to avoid jamming.[2]

[0] https://www.economist.com/science-and-technology/2025/03/12/... [1] https://www.csis.org/analysis/ukraines-future-vision-and-cur... [2] https://www.forbes.com/sites/davidhambling/2024/11/07/ukrain...


> already partly automated because of the jamming environment: they can visually lock the drone onto a target from up to 10km away

This capability is basically a reinvention of the walleye television bomb, which locked onto targets using edge detection on a signal from an internal television camera. 1960s technology.


Dang what does a drone carriable several kilometer fiber spool look like?


The lower canister in the last of the three links, https://www.forbes.com/sites/davidhambling/2024/11/07/ukrain...

Difficult to judge scale, maybe the size of a drinks can or food can? Fiber is pretty thin.


Half a can of soda. The main electronics controller visible in the photo is likely 20x20 or 30x30mm, the standard for FPV style drones.



I was pretty shocked to find out that wire-guided missiles were(/are?) a thing. This seems easier than that.


Wire guided is still the primary means of guiding torpedos from submarines, because it gives you an unjammable, un-interceptible, consistent communication interface, and in torpedoes the wire spools out for tens of kilometers.

If you want something really cool, look up old fashioned TV guidance. We built weapons that guided based a TV signal, and edge detection in that signal. In 1958.


Pretty sure they were in the thousand feet range, not multiple kilometers…


(Welp… 3 km range… though to me wire that long seems like it’d be easier than optical cable back in the 70s)


basically like a cheapo SACLOS missle, i.e. the TOW missile, which have been using that (fiber) approach for decades now.


Well, the chargers won't be pulling 1MW continuously, so you can smooth this out by installing batteries with the chargers. The grid demand becomes a more constant trickle into the batteries co-located with the charger


No need for batteries when supercapacitors will do.


Which supercapacitors are sold and have car-scale energy?


So you might have to wait an hour for your 5 minute charging time? Doesn't sound like a killer feature.


the idea would be to slowly charge the capacitor to its capacity in the breaks between the charger being used. That way when you arrive at the charger, the capacitor would be fairly full and able to quickly transfer that energy to your car. The charger would then replenish that capacitor more slowly (meaning that the charger wouldn't be able to be used for a bit).


This was a compelling idea, so I looked it up. Unfortunately it doesn't appear to be true: https://www.tesco.com/groceries/en-GB/products/253034146


I don’t know that they’d need to be, though. British-style baked beans come in tomato sauce. I just checked my tins, and they’re 36% tomato according to the ingredients list. Unfortunately they’re not that cheap anymore. We pay over CDN$2+tax per tin these days if you buy the multipack. A far cry from the CDN$1.50 all-in those Tesco beans would be.


It's worse than you think — those are the more expensive brand in that supermarket.

The cheap baked beans from the same supermarket are just under 1/3 that price per tin: https://www.tesco.com/groceries/en-GB/products/299669062


Interesting, it's something I heard from a co-worker who grew up in the UK. So perhaps its some sort of urban legend there. Thanks for the check!


I've used my Kinesis Advantage 2 for years and am inseparable. I'd like to swap to the Kinesis 360 but my current keyboard is just fine and it feels like a small upgrade


What's your problem with UEFI? If your OEM wanted to install malicious firmware they can do that in BIOS no?


Systemd timer units are usually two: one for the service you want to run, one for the timer file.

I think you're confusing systemd timer units with Cronie[0], a crond implementation that I think predates systemd? It's possible there's some systemd thing I don't know about though!

I think most distros at least have an installable crond

[0]: https://github.com/cronie-crond/cronie/


If you're already using systemd, you can use its built-in credentials manager[0] which uses a combination of an on-disk key and the TPM2 to encrypt secrets at rest.

Probably annoying if you have more than one machine though

[0]: https://man.archlinux.org/man/systemd-creds.1


Hey, this is real cool. Is encryption at rest the only benefit over, for example, injecting the secrets as environment variables into a running systemd service?

I ask because my research suggests that there's a class of security vulnerabilities where attackers can read arbitrary files - but since /etc/system/systemd can be limited to be only readable by root, and the services it runs started by other less privileged users, I wonder how bad it would be to store a plaintext secret right in the .service file would be in practice. Especially since it seems this credentials management thing seems to just create a directory for the process with the decrypted passwords readable anyway (although maybe that's still not readable by an attacker? Still trying to figure this all out myself).


Gonna answer my own question here: No, actually systemd-creds is much better than just putting the plaintext secret into the .service (although that's still probably better than leaving it in a .env file if you have good user permissions set up).

Among other things, TPM and TPM2 are physical chips, which means even someone who steals your actual hard drive couldn't actually decrypt your stuff unless they also somehow got access to the rest of the computer containing that TPM chip. Huge improvement, although I'm not sure if your run of the mill cloud VM has (or even could have) such a chip permanently and uniquely bound to them.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: