Hacker Newsnew | past | comments | ask | show | jobs | submit | desireco42's commentslogin

Claude or something different... there is life beyond Claude I assure you and it is quite good and colourful.

I think you have issue with your security cert.

This is huge. I built SidianSidekicks and it is based on git because we don't want to lose your notes and thoughts, but convenience of Obsidan Sync are something that makes everything easy. I get this is in beta, and we will stick to git, but love what they are doing and looking forward to it.

Essentially Sync while you can emulate it on desktop, for mobile it is not good experience without Sync. And we want to have and record our thoughts with us all the time.


If Steve Jobs when he introduced iphone, added this keyboard and said this is how we should write, everybody would do it.

Just sayin'...


Oh that made me remember the you're holding it wrong debacle with antenna reception.

You mean in the way that it was massively overblown in the media but ultimately wasn’t a big deal?

Very good point. Steve would be proud of Keybee Keyboard!

No, they wouldn’t have.

So we had quite a deluge of Forth options recently :), not that I am complaining. As someone who doesn't use Forth much, which one is used the most?

This one for example looks like well rounded and user friendly option.

Would anyone care to comment about this?


This is made by the company the inventor of the language created. Then he left it because Forth, inc. needed the language to be standardized, which wasn't his idea of Forth and, his point of view is that he solved the software problems and what was left was solving the hardware problems, so he moved to working on stack-based processors.

Swift Forth is literally a professional Forth and is well regarded. The other often recommend Forth is the FOSS GForth. They are good for starting because they are popular and standard, so you'll find help easily.

Other "smaller" Forth are often non-standard dialects and are more-or-less mature experiments.


I had the same feeling, so I began to read https://www.forth.com/starting-forth/1-forth-stacks-dictiona... with gforth installed with apt. And made few exercises to manipulate the stack with some words and get a grasp on it. Now I saw how it works, I came back to my imperative languages and won't come back to it. IMO my skills in forth are not really enough to see the distinction between any implementation of forth, so the first one I stumbled upon was ok.

Gforth is free and well rounded so I'd recommend that if you want to experiment with Forth. It is not very fast though, SwiftForth with optimised subroutine threading will be a lot faster. I haven't tried SwiftForth though as you have to pay for it and it is x86 only.

I suspect there isn't a single "most popular" FORTH, instead there are a million niche-specific implementations.

After all half the fun of using the language is writing your own interpreter, and it's very easy to do on constrained hardware/systems.


gForth [0] is great for getting started

if you are working with specific hardware (e.g. microcontrollers) it depends on which forth dialects are available but for the raspberry pico and pico 2 I recently found zeptoforth [1]

or you know you can always bootstrap your own :)

[0] https://gforth.org [1] https://github.com/tabemann/zeptoforth


I think the problem is the process. Each country should have a reporting authority and it should be the one to deal with security issues.

So you never report to actual organization but to the security organization, like you did. And they would be more equiped to deal with this, maybe also validate how serious this issue is. Assign a reward as well.

So you are researcher, you report your thing and can't be sued or bullied by organization that is offending in the first place.


If the government wasn't so famous for also locking people up that reported security issues I might agree, but boy they are actually worse.

Right now the climate in the world is whistleblowers get their careers and livihoods ended. This has been going on for quite a while.

The only practical advice is ignore it exists, refuse to ever admit to having found a problem and move on. Leave zero paper trail or evidence. It sucks but its career ending to find these things and report them.


That’s almost what we already have with the CVE system, just without the legal protections. You report the vulnerability to the NSA, let them have their fun with it, then a fix is coordinated to be released much further down the line. Personally I don’t think it’s the best idea in the world, and entrenching it further seems like a net negative.

This is not how CVEs work at all. You can be pretty vague when registering it. In fact they’re usually annoyingly so and some companies are known for copy and pasting random text into the fields that completely lead you astray when trying to patch diff.

Additionally, MITRE doesn’t coordinate a release date with you. They can be slow to respond sometimes but in the end you just tell them to set the CVE to public at some date and they’ll do it. You’re also free to publish information on the vulnerability before MITRE assigned a CVE.


Yeah, something like that, nothing too much, just to exclude individual to deal with evil corps

Does it have to be a government? Why not a third party non-profit? The white hat gets shielded, and the non-profit has credible lawyers which makes suing them harder than individuals.

The idea is to make it easier to fix the vulnerability than to sue to shut people up.

For credit assignment, the person could direct people to the non profit’s website which would confirm discovery by CVE without exposing too many details that would allow the company to come after the individual.

This business of going to the company directly and hoping they don’t sue you is bananas in my opinion.


This would only work if governments and companies cared about fixing issues.

Also, it would prevent researchers from gaining public credit and reputation for their work. This seems to be a big motivator for many.


Thank you for sharing this, this is very interesting problem to tackle.

I find this interesting mostly to understand how you are handling encryption and security. I think this is one approach but others expressed concern over long term viability.

Using Tauri is also very interesting. How did you find using it for this simpler case?

Anyhow, very cool project. Don't aband it :)


Hi thanks!! You can find more details about the security in the SECURITY.md https://github.com/fjrevoredo/mini-diarium/blob/master/SECUR...

Regarding Tauri, I liked it a lot. This is my first time using it for any serious project.


I started using Amazfit years ago, love it and it delivers.

I had Basis first and this is the most loved watch from me, then Pebble.


Personally. If I were to use $100+ on a hackable smartwatch, I would much rather go for a Sensor Watch Pro than a Pebble :)

Kind of like Ruby... with pipes. Elixir has them, but this reminds me more like Ruby.


Thank you, came to comments to find out what it is. Now I can go back to site and see what it is about.

Thanks again.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: