Hacker Newsnew | past | comments | ask | show | jobs | submit | microflash's favoriteslogin

Looking at file church.scm from the provided zip file [1], I see the following functions used to construct lists:

    (define kons
      (lambda (x) (lambda (y) ((pair false) ((pair false) ((pair x) y))))))
    
    (define kar   (lambda (x) (first (second (second x)))))
    (define kdr   (lambda (x) (second (second (second x)))))
    
    (define nil   ((pair true) ((pair true) false)))
    (define null  first)
    
    (define atom  (lambda (x) (first (second x))))
That's 2 extra booleans per list element. While the one for recognizing atoms is probably necessary, the other one for recognizing nil is not:

    (define kons
      (lambda (x) (lambda (y) ((pair false) ((pair x) y)))))
    
    (define kar   (lambda (x) (first (second x))))
    (define kdr   (lambda (x) (second (second x))))
    
    (define nil ((pair true) false))
    (define null (lambda (x) (((second x) (lambda (a) (lambda (d) (lambda (z) false)))) true)))
    
    (define atom  (lambda (x) (first x)))
The use of null+car+cdr can usually be avoided by using a matching construct instead like

    (((second list) (lambda (a) (lambda (d) (lambda (z) deal_with_car_a_and_cdr_d ) deal_with_nil)
[1] https://t3x.org/lfn/church.zip

If the universe’s causal mechanisms were infinitely fast, the entire history of the universe would play out instantly in zero time, and we’d skip straight to the heat death of the universe.

The fact that time even exists is implied by / a result of causal actions having some finite propagation time.


if you buy something it shouldn't be tied to their backend either.

I use to type the ip from a security cam and get a web page with a video stream on it. I thought it was hilarious when it turned into a 404.


Yep I specifically keep Google Maps around to find restaurants even though I far prefer the audible navigation from Apple Maps nowadays once I actually want to drive there.

Go Mac. The GUI is stable and boring: the Finder hasn’t changed much in years. It’s Unix underneath so you can use command-line stuff or dusty programs like Emacs.

You can now pick up a MacBook Air at Walmart for $700. Considering the inflation we’ve had, that’s actually reasonable. It will do the Unixy stuff well. My Mac is of this same class and I’m happy with it.


I love this game so much that I donated, in hopes it would encourage more levels (and to reward the fun experience)

Thanks for all the links! It's definitely bumping my excitement towards subset fonts!

Why this non-sense in pricing?

- 8GB RAM, 256GB SSD is $1200

- 16GB RAM, 256GB SSD is $1500

This is much worse than Apple, and I thought MSFT was more sensible than that!


All: if you're going to post in this thread, please make sure you're up on the site guidelines at https://news.ycombinator.com/newsguidelines.html and that your comment is strictly within them.

That especially means two things here: being kind, and not using the thread to do battle. If you're not able to stick to that, that's fine, but in that case please don't post.

What does be kind mean in a context like this? Many things, but here's one in my view: it means finding a place in your heart for the humanity of the other—whoever the other happens to be for you.

That isn't easy but it's the spirit we want here. If you can't find it in yourself, that's understandable, but on this topic, please only post if you can.


They solve three things:

1. You prove you have control of a key without telling the service the content of the key (like SSH keys, and any other PK setup) so: you cannot lose your password. The private part probably never leaves your device (probably - if you use Apple or Google's implementation there's magic/low security sync, you might also manually backup the private keys to a file)

2. A new keypair is generated per service. Don't reuse your password is baked in the spec, and by using individual keypairs the service can't profile you by the public key (privacy).

3. And possibly the most important. WebAuthn (of which Passkey is a popular marketing term) includes the asking identity during the registration/signup and login/proof stages, it doesn't rely on the user inspecting the url/webpage look/auth domain. Ie. You cannot be phished by examp1e.com when connecting to example.com (much like SSH's TOFU, but sorely missing from most web interactions).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: