Hacker News new | past | comments | ask | show | jobs | submit | chews's comments login

Now this is serious hardware hacking. Kudos for the fantastic writeup and thank you for sharing the work, it really is impressive.


you don't synthesize them you securitize them


it's to maintain the legality of the arms-length ability to do jailbreaky like thinks when a 3 letter agency asks.


That's a great question, I'd bet it's fair to say that 80% of their applicants would not qualify, and yet it opens the door for some really deserving humans. (Not being able to afford it is why I didn't go to MIT, I also wasn't accepted at Cal, yet UCLA (and all of the UC system for that matter) was under 4,000 a year and that's what my folks and I could afford so that's where I studied.)


this is gross, it's the only way to use high quality headphones with the iPhones shipped before the the newest USB-C ones.


Other lightning compatible DACs exist. Apple’s dongle aren’t the only hardware for using wired headphones.

If you want you can just get a lightning to usb-c adapter and then an entire world of DACs and amps are available.


When they switch to the next standard for their ports, ill finally be able to achieve my dream of getting a x -> usb c -> lightning -> aux chain set up for my car audio.


does lightning -> usb C -> 3.5mm not work? it requires an extra adapter but is better than nothing.


No, it isn't gross. Third party manufacturers both make lightning audio adapters and lightning to USB-C adapters.


thank you for such a great writeup, this is an excellent breakdown!


After what they did with domains, it's hard to recommend them for anything to do with cloud.


They also just totally fucked anybody making use of the Google Photos API to access their own data: https://news.ycombinator.com/item?id=41604241

They're a trash company, and anything you get from them, even when you pay for the storage, is at best accidentally delivered to you and they could roll over in their sleep at any moment and snuff it all out.


don't forget the time everyone's Google Drive photos got corrupted


Even grosser is that they explicitly limited the iOS version of Google Photos to refuse to work with scoped access. So on iOS the app will refuse to work without being granted whole library access, a permission that Google no longer allows to any third party photo app on Android. Blatantly anticompetitive.


Sorry for the loss of innocent life.


HTLC would do the same in a distributed and trustless fashion and yet it's important to know League of Entropy is a bunch of distributed crypto organizations like Chainsafe or the Ethereum Foundation.


I assume you mean a verifiable compute function rather than hash time-lock contract, as the latter can't be used for encryption. But that's not really a timelock either: it only sets a lower bound on the amount of compute required. But "compute" here is abstract, and when the conversion from "required hashes" to "time elapsed" can vary by 6-10 orders of magnitude, it stops having any appreciable meaning.


EPFL, DEDIS, university of Chile, University College London and cloudflare aren’t crypto organisations


Glad someone mentioned the Penner functions, that was a godsend in my early flash days.


Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: