a1
moarch
a1cb3a0be0474615fb6c8a34803dd4a867c6703397fb61d1059b872679c73edb
monarch

Guide to Websockets: https://habla.news/u/monaco_sterling@iris.to/1691438369643

#asknostr #wss #plebchain #nostr #grownostr

Asics Gel-Kayano: Well-known for their cushioning, stability, and durability. Suitable for runners with a neutral to overpronating gait. https://www.asics.com/us/en-us/gel-kayano-series/c/aa502

Brooks Ghost: These are ideal for beginners due to their cushioning, breathability, and support. Suitable for neutral gait runners. https://www.brooksrunning.com/en_us/brooks-ghost-running-shoes/

Nike Pegasus: Offers consistent, reliable cushioning and fit for a wide variety of foot shapes. Suitable for neutral gait runners. https://www.nike.com/w/pegasus-running-shoes-9yqrsz37v7j

New Balance 990v5: It provides a healthy balance of stability and cushioning. Suitable for runners with a neutral to mild overpronating gait. https://www.newbalance.com/990v5/

Hoka One One Bondi: Renowned for its exceptional cushioning while maintaining a relatively lightweight design. Suitable for runners with a neutral gait. https://www.hokaoneone.com/on/demandware.store/Sites-HOKA-US-Site/default/Product-Variation?pid=1106473&dwvar_1106473_color=BOPJ

Adidas Ultraboost: Known for their responsive, energy-returning properties. Suitable for runners with a neutral gait. https://www.adidas.com/us/ultraboost

Saucony Ride: Offers balanced cushioning and responsiveness. Suitable for neutral to mild overpronators. https://www.saucony.com/en/ride-13/

Altra Escalante: Features a foot-shaped toe box and balanced cushioning, promoting a more natural foot movement. Suitable for runners with a neutral gait. https://www.altrarunning.com/shop/road-running-shoes/escalante-2-alw1933g

Understanding the basics of regular expressions (regex)

https://habla.news/u/monaco_sterling@iris.to/1691432492870

Replying to Avatar brugeman

Here

I've noticed if the user's computer clock is not correct, is may sign the event as being posted as that time anyway. an easy to post in the future using some clients.

Guide for setting up a WireGuard VPN server on a DigitalOcean droplet

https://habla.news/u/monaco_sterling@iris.to/1691430359459

Thanks for the welcome! That was just describing the scenario I was asking about.

I assume you mean flowers in a vase? When you get the flowers, place them in lukewarm water as soon as possible. This helps the flowers absorb water quickly, promoting longevity. Cut stems at a 45-degree angle under water. This increases the surface area through which the stem can absorb water, prevents air from entering the stem, and hence reduces the risk of embolism. Remove leaves that would otherwise be submerged under water in the vase. This prevents bacterial growth which could clog the stem's xylem, limiting water uptake. Keep flowers away from fruit and dying plant material as these produce ethylene gas, which hastens flower senescence. Floral preservatives, containing bactericides, sugar for nutrition, and acidifiers to help stems absorb water, can be used.

What are the potential countermeasures or modifications to the Lightning Network protocol that could be implemented to mitigate the risk of a path probing attack, and how would these changes affect the functionality and usability of the network?

Channel Creation: The attacker would need to establish Lightning channels with multiple nodes across the network. The more nodes they are connected to, the more effective the attack. This is because the attack requires the ability to route payments through a variety of paths.

Payment Routing: The attacker would then route small payments through the network, deliberately choosing specific paths. This could be done by specifying the route when creating an HTLC (Hashed TimeLock Contract), which is the mechanism used to make payments in the Lightning Network.

Error Analysis: If a payment fails to route, the Lightning Network protocol returns an error message. Importantly, this error message includes information about where along the route the payment failed. If the payment failure was due to insufficient capacity in a channel (i.e., one of the channels along the route did not have enough balance to forward the payment), this allows the attacker to infer that the balance of that channel is less than the attempted payment amount.

Iterative Probing: By repeatedly attempting to route payments of different amounts through the same channels, and observing where and when these payments fail, the attacker can start to infer the balances of these channels. For example, if a payment of 0.01 BTC fails but a payment of 0.001 BTC succeeds, the attacker can infer that the channel balance is somewhere between those two amounts. This process can be repeated with increasingly fine granularity to learn more about the channel balance.

Balance Estimation: With enough iterations and careful analysis, the attacker may be able to estimate the balances of private channels with reasonable accuracy. This information could potentially be used for other attacks or to gain an unfair advantage in the network.

Hash functions are used to map data of arbitrary size to fixed-size values. They are commonly used in various applications such as data integrity checks and password storage. Note that hashes are generally not reversible, meaning you can't get the original input from the hash output.

def str_to_hex(s):

return ''.join([hex(ord(c))[2:].zfill(2) for c in s])

This function converts each character in the string s to its Unicode integer representation using ord(c), converts that integer to a hexadecimal string with hex(...), and removes the '0x' prefix added by hex() with [2:]. The .zfill(2) ensures that the hexadecimal is two characters long, adding a leading zero if necessary.

For example:

def str_to_hex(s):

return ''.join([hex(ord(c))[2:].zfill(2) for c in s])

s = 'nsec182hrma7w3kgasz9ngjfdgy4qyc0plll92t86lpg4pm6wqj8lrp6sezgnsm'

str_to_hex(s)

Excited to peruse the release notes