Hacker Newsnew | past | comments | ask | show | jobs | submit | roro159's commentslogin

What matters for the financial hedge is the existence of futures, which means the companies can buy something they know they will need at a known price months before they actually need it. The specifics of this operation differs depending on the actual financial instrument used, but the idea is the same, even on the opposite side (selling at a known price in the future).


It is already a sunk cost if they just bought futures, so shouldn’t keep them from flying. They can take delivery to fly, or sell for someone else to take delivery at the low price.

The hedge must be more complicated to explain why they would stay grounded.


Hmm. I don't think the hedge is that complicated, so maybe it's not particularly relevant after all. I was just thinking of it in terms of complementary goods -- normally we'd expect suppliers to increase output when the cost of an input drops, but in this case they already ate that cost so the effect would be damped. But maybe not?

I suppose there's also a question of how long OPEC floods the market. But IDK, and you make a good point.


The futures contracts don't always guarantee delivery. "Cash-settled" instruments just pay out cash based on the market rate (with the expectation that the long party can purchase the oil at that price)


Hashing the password in the client isn't very effective because the hash of the password now is equivalent to a password. If you have the hash you can just send it to the server and authenticate. Implementing this looks like a lot of trouble with little to no benefits, since you also have to take the regular precautions server-side anyway.


Sorry, perhaps I wasn't clear enough.

I wasn't arguing FOR hashing the password before sending it. My point was this: even if we think it's reasonable to require that a password be hashed before being sent over HTTPS, the corollary is that all web apps must use JS, and can't be server-side-code-only. And this corollary doesn't seem like a reasonable thing to require.

Your point that 'Hashing the password in the client isn't very effective because the hash of the password now is equivalent to a password.' is true if there's no salt, and if the password is never re-used across sites.

If the password is salted before being hashed and sent by the client, then having read-access to the plain text of the exchange only gives the attacker the ability to log in to that one site. Even if the same username/password combo is in use on other sites, the attacker can't use the password on those sites, because she can't hash the unknown password with an arbitrary salt.

Anyway, I'm definitely not an expert on this topic, so take what I wrote above with a pinch of salt (ha!).

My only reason to comment was that I was thinking through 'never send passwords' from first principles, and it struck me that, if everyone were to accept this to be true, they would also never willingly/knowingly log in to any site that works without JS.


Link to the GitHub issue in the tweet: https://github.com/JeffreyWay/laravel-mix/issues/2153

Link to the Webpack issue: https://github.com/webpack/webpack-cli/issues/962

Apparently it's caused by a bug with OS-specific code to check the last time a message asking for donations to the project was printed, so it doesn't ask too much. And this checking only happens on mondays for some reason... There's literally a "if (now.getDay() === MONDAY)".



HN discussion of the StackOverflow incident: https://news.ycombinator.com/item?id=12131909


You just made a mistaek. :)


I think it's worth to add a few previous discussions about distributed locks.

Redlock is a distributed lock using Redis: https://redis.io/topics/distlock

Martin Kleppmann criticized Redlock and mentioned the fencing solution: http://martin.kleppmann.com/2016/02/08/how-to-do-distributed...

Antirez disagrees with the analysis and the HN post has a good discussion: https://news.ycombinator.com/item?id=11065933


Blockchain != PoW. There are plenty of blockchains without the problems you described (like IBM's Hyperledger).


Also blockchain != distributed.


What you're missing is that Tether is not truly bankrupt yet. Yes, sane accounting would say their liabilities exceed their assets, but only because 26% of their assets are a high risk loan to Bitfinex. They still have assets > USDT supply. What makes the liabilities exceed the assets is the credit risk associated with the loan.

You can't undisputedly say Bitfinex won't be able to pay the loan. Maybe the frozen assets are real and will be unfrozen soon. Nobody knows. They aren't bankrupt yet, but in a very risky position of becoming so.

Another possibility is that you misread the article title, which seems kind of misleading. It says that only 74% of Tether is backed by cash or cash-equivalents. The loan to Bitfinex is neither, so it should be the remaining 26% (26% of $2.8B is $745M).

That being said, I agree with you on the Wiley Coyote point. Tether should be completely disreputable, not only because of it's risky situation, but because the whole move was completely shady. Silently changing the wording of the website, after assuring everyone that they had it 100% backed... I don't see how anyone can trust it anymore.


The pre orders sold out in 2 days: https://www.droid-life.com/2019/04/16/samsung-quickly-sold-o...

The numbers aren't public yet, but it's probably low. I don't think they are dumb enough to expect this device to sell anywhere near the Galaxy S10 or an iPhone.

It may not be a huge sales success, but apparently it's above Samsung expectations.


My guess is the main goal is to recoup R&D prior to a proper consumer launch. And you know what, I'm fine with that. Personally, I'm holding out for gen 2-3 of this form factor when the price comes down to Earth. But smart of them to get it into people's hands where they can get real testing as to what works and what doesn't for consumers.


I'd be fascinated to see a breakdown of consumer demographic/profiles for the customers that purchased via pre-order.

My suspicion is that it's people interested in the engineering of the screen rather than consumers who've identified a personal use case for it.


That might be some, I think for many it's just being able to buy "a piece of the future today".

Whether or not it ends up truly being practical, it's a phone that looks and does things that are radically different from most mainstream phones.

People will think their fancy future folding phone is cool, and other people will probably see it and think it's interesting and want to talk about it or see it work.

Kind of like paying $600 plus a 2-year contract for an iPhone in 2007 with a slow processor, no 3G, no MMS, no copy-and-paste, etc.


It's a status symbol. You'll see plenty of CEOs of multinationals with Folds.


To add another example: one of VS Code's releases has interesting statistics of it's issues (https://code.visualstudio.com/updates/v1_28).

They did some housekeeping for a month and were able to close 3918 issues, but in the meantime 2187 issues were created.

Open source project management at this scale is truly hard indeed.


Wonder if Mozilla can/want to "out source" the bug triad and to current CS students or team of CS students.

Pro: Train new students to work on real work development processes, issues, teams.

Good for students' resumes.

Con: Not sure if completely legal if it is not pay.

Also might create conflicts with current employees of the company.


The webpack team has a simple solution: they have a bot that closes inactive issues. The issuer need not keep the issue alive by posting into the issue.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: