I've been playing around with the @StanfordOVAL Virtual Assistant called Genie...

The other night I explained elliptic curve encryption to my wife and in-laws. It's amazing to see how much you learn by trying to explain something you think you understand. ==

Rules to live by. Check out tlu.tarilabs.com/cryptography/ and @tari_labs for some great content on elliptic curve cryptography.

The latest vid from @bitluni's channel is a piece of art. You don't know it yet, but you _want_ to know more about phased arrays. Go watch the vid. youtube.com/watch?v=z4uxC7ISd-

Checking out the coding style requirements for contributing to the (amazing) SVG.js from @_wout_. This made me giggle: > avoid semicolons, we're not writing PHP here. (gijsvandam.nl/note/2022/02/25-)

Working through the docs of @statelyai, my eye fell on this pattern. Anybody know the official name? It's a JS callback pattern but you get a callback _and_ you get an onReceive that allows for registering a listener to an event at the parent. Voila: 2-way parent-child comms (gijsvandam.nl/photo/2022/02/22)

I am working on some animations to explain basic Lightning Network concepts. Needless to say, I'm not quite there yet.. (gijsvandam.nl/photo/2022/02/17)

Repeat after me:

"I'm not a Formula1 driver, I don't need a tacky racing chair. I promise to get a proper office chair with lumbar support and adjustable head & arm rests. I will save some money and will also look less ridiculous in front of my PC."

See, it wasn't that hard!

This is a really good (and entirely non-technical, for those who glaze over at equations) summary of a very thorny issue: repudiability in digital communications (it's technically only about DKIM, but the points made apply to other protocols than email).

I think I do agree with the conclusions, but it's something that isn't always so clear (how useful *in reality* are protocols like OTR, for example?)



Is it just me or are golang interfaces really confusing? I get it that it's low ceremony not having to declare the interface a type is using, but when reading code that is not your own (or that's old enough to be forgotten about entirely) it's just a pain in the butt. I'm constantly off on little puzzle tours finding interfaces that may or may not satisfy a signature.

Mind blown, I never realized this coincidence:

You can use the next number in the Fibonacci sequence (1 1 2 3 5 8 13 21 34) to convert from miles to kilometers.

For example, 13 miles is 21 kilometers.


I wrote a post on my debugging setup for LND.


Interested in how other people did this. I couldn't find much about this, so I had to figure most of this stuff out by myself.

@fribbledom You are my 1st follower! To what do I owe that pleasure?
En spreek je echt Nederlands?

"We didn't call it fuzzing back in the 1950s, but it was our standard practice to test programs by inputting decks of punch cards taken from the trash.

We also used decks of random number punch cards. We weren't networked in those days, so we weren't much worried about security, but our random/trash decks often turned up undesirable behavior.

Every programmer I knew used the trash-deck technique."

-- Gerald M. Weinberg

Bitcoin Mastodon

Bitcoin Maston Instance