Hacker News new | past | comments | ask | show | jobs | submit | Systemic's comments login

The comment you're replying to mentioned the shortest implementation, as in the size of the program written to solve the problem.

I believe you're talking about the the optimal shortest path to the solution, which while true, relevant and interesting, isn't contrary to the point.


I'm with you that haveibeenpwned should require email confirmation before listing the breaches an email address was in. As it is, it has become an easy to use dictionary of places to find personal data for any given email address. Yes it doesn't list the breaches that Troy has deemed "sensitive", but if you're trying to commit identity theft or fraud using personal data, it doesn't really matter if these search results don't include websites that deal with porn/adultery/children.

Doubtless there are black market tools that provide such a service but expose far more data, but haveibeenpwned lowers the barrier to entry significantly by being far more available to the public.


You have to click "Explore on my own" to get the filters up.


I liked that in their graph on the 3rd from last page their drone had the tallest bar which at first sight looks like it would indicate it is the best, when actually it just has the highest portability, with terrible agility and control.


The survey isn't just "biased" in that 0 isn't an option, it represents a fundamentally different question. The results of this survey can be phrased as: "Out of 76 cars which had their drive units replaced, how many drive units did they have replaced?"

From this poll you can't even say you have a sample size of 76 cars as you only have a sample of 76 cars whose drive units have broken.

A different survey on the same website includes zero [1], and is more appropriate to answering the question of "How likely is it that a Model S will have its drive unit replaced?"

[1] http://www.teslamotorsclub.com/showthread.php/32608-Drive-Un...


The whole point of encryption is that you can give it to a malicious third party and they won't be able to see what's inside. Why would this be an issue for you?


Because things that are difficult to decrypt eventually become less difficult to decrypt as computing power catches up with encryption complexity ... and a static datafile provides no protection against fast-as-you-can brute-force decryption attempts.


Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: