Hacker Newsnew | past | comments | ask | show | jobs | submit | eliot_sykes's commentslogin

Elsewhere on HN in case you missed it - random MAC addresses are coming to iOS8: https://news.ycombinator.com/item?id=7864813


Just was going to comment that is someone wants to track you they'd probably track your mobile device which is much harder to customize. Looks like somebody at Apple had the same thought.


The Guardian's new Android and iOS apps are natively wrapped webviews: https://twitter.com/patrickhamann/status/472017297771884544


Is there one typography book you'd recommend in particular to start with?


I've been reading this one lately, it's not so much practical typography, but rather the history and backstories of types. I find it quite a fun read, and it can inspire your interests and appreciation for types, if you don't already know much about typography.

http://www.amazon.com/Just-My-Type-About-Fonts/dp/1592407463


Butterick's Practical Typography[1] is free online and a really good read.

To go beyond just one book there are good posts and book recommendations on Typekit Practice[2].

[1]:http://practicaltypography.com/

[2]:http://practice.typekit.com/


I’m not sure if there’s a better book out there for UI design in general, but The Elements of Typographic Style[1] was the typography bible.

[1] http://www.amazon.com/Elements-Typographic-Style-Robert-Brin...


Wow thanks for taking the time to share all of this.

I'm a fan of 16px + for body copy. I think the browsers have it right most of the time with the default font size of 1em == 16px. You've got me thinking of experimenting with 18px now though.

Where does the 65 chars per line come from? I've heard 2 to 3 English alphabets length but I don't know the original source of that guideline.


Yeah, I really encourage you to try bigger font-size -- don't be afraid!

The 65 char per line is to strike a balance between how often the reader has to skip to new lines, and how far that trip is. Why 65 exactly? It's more than 60, but less than 70, and its a nice round number I guess. Here's an article that discusses it a bit more:

http://baymard.com/blog/line-length-readability


Most of my experiences with StackOverflow are positive, but just once in a while I'm left baffled by what feels like an excessive use of force by the power wielders there. Are there some misaligned incentives? Or perhaps I'm not good at understanding the community guidelines.

This is a question I asked yesterday that was down voted at impressive speed. Thankfully a couple of the commenters helped me out with information that benefits the community. Their comments would have made acceptable answers but they were unfortunately closed.

http://stackoverflow.com/questions/23998391/how-to-identify-...

Or perhaps I did just ask a bad question, it wouldn't be the first time.


Do you have one you prefer?


Bootstrap. Solely because it has a thriving community of theme, add-on and plugin developers.


Here's a good episode of The Incomprable podcast where they discuss their favourite board games, helped me discover new games to play: http://5by5.tv/incomparable/184


If you're on shared hosting, is it down to the hosting company to enable Forward Secrecy? Are there any shared hosts doing this yet?


Elastic Loading Balancing for AWS customers & Heroku allow for perfect forward secrecy and Akamai customers can expect ECDHE in Q3 of this year.


Is there anything you need to do to enable it on Heroku, other than setup SSL/TLS?


ssl:endpoint add-on


Good to see the word is spreading about HSTS. EFF started pushing it earlier this month [1], with a perhaps fair claim that it's not widely known about by web developers.

As the article shows it's pretty straightforward to setup; if you can add a response header to your app then you'll be able to figure out how to harden your app with HSTS.

For my fellow web developers who like to learn by video, I've tried to make an easily digested screencast and a page of sketch notes to help get the word out about HSTS and explain what it protects against [2].

[1] https://www.eff.org/deeplinks/2014/02/websites-hsts

[2] http://www.webdevbreak.com/episodes/hsts


Interesting read discovered after investigating how to defend a site from being framed with a new URL shortener mentioned elsewhere on HN today.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: