Hacker Newsnew | past | comments | ask | show | jobs | submit | randaouser's commentslogin

One of the worse offenders is North which is previously thalmic labs; Not a single product has reached the market with any revenue to show but remains a poster child for a successful organization.


Bitcoin is not anonymous and is subject to flow analysis. Zcash and monero have solved this in different ways with really intriguing primitives.

ZCash uses zksnarks which are a pseudo homomorphic encryption strategy to hide payments whereas monero is using linkable ring signatures.

Generally speaking, the blockchain community has really advanced the crypto field


To reach a ketogenic state, the term fast from a clinical sense required 24-36 hour period without any caloric intake; strictly water. I have done 3 day water fasts, the hunger waves need to be controlled the first 2 days, but the feeling is gone after that point.

There are many things to consider, including refeeding syndrome, it is highly advised to seek MD advice prior to undertaking such a diet.

Lastly, there is a ton of research highlighting fasting and its effects on stem cell regenerative properties.


One thing that surprised me when water fasting was that while the hunger went away on the second day (starting in ketosis helps), I found myself still craving the reward and ritual of meals. Lunchtime arrived, and I missed the excuse to take a break from life/obligations and indulge in the enjoyable process of eating, independently from satiating hunger. I think when I do it again, I'll find some non-consuming activities to fill that void.


For those who are price sensitive like me but want all our macros; my personal app also scrapes the flyer for local grocery stores for ingredient prices and runs a knapsack algo to reach my cost threshold and tells me what things I can make


One step further that Ive prototyped is Encrypted and Distributed Search. The VPN relays willing to take the traffic can also double as Web crawlers. The vpn clients encrypt their search terms and vpn relays encrypt their search indexes, and perform ElGamal Homomorphic private set intersection with MINHASH in Elliptic Curve Field. This leads to better then key word, worse then current age context search from google but with Strong Elliptic Curve privacy guarantees.


To make this type of search higher precision&recall you would have to focus especially on the indexing part (e.g. improve NLU of concepts in the pages), right? The training of such ML models could be federated across the nodes in a private way.


Indexing is important for sure. The problem is to preserve privacy and not falling back to heavy weight general purpose Multi-party computation we have to give up a bit on the precision and recall of modern search engines. Minhash, more specifically Locality Sensitive Hashing (LSH) is a good first approximation (Better then Term Freqency, worse them ML based search). Right now much of the web is unqueryable, my first goal was to allow the deep web and TOR services to be searched even at just a rudimentary level.


I overcame TDMA problems associated with mesh broadcast networks by moving channel allocation logic into the application layer. For me it was more important for reliable delivery then bandwidth. We use geo spatial TDMA to further allocate the channel, two proximity peers would have vastly different time slots. Unfortunately this leaks location data (though most 2GHz channels will). Besides wifi + bluetooth channels, we have leveraged acoustic channels (more so for unidirectional communication from a watch tower to all peers within an ultrasonic range)


This sounds like the quadrigacx exit scam


Probably for its homomorphic encryption properties. Used in the correct setting with the appropriate Generator ( ElGamal on Elliptic Curve Fields) it is very secure but limited in use beyond Set Intersection as the results cannot be decrypted.


the rust nightly build has the ECC curve functionality. Most of the crypto related prototyping on rust requires the nightly atm. Heres hoping integration onto wide release for the sake of the crypto dev community


they mandate access through a web portal... this in itself is centralization. One can simply tamper with the website. You need to distribute a client software or use an open source dapp explorer type product to prevent data manipulation en-route to the blockchain


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: