Hacker Newsnew | past | comments | ask | show | jobs | submit | nemz44's commentslogin

Fun fact - I used Domain Heist to find domainheist.com (before it had its name) by specifying "domain" as the search criteria.


Admittedly, I can understand how this would be misleading. I'll fix this soon


Thanks for showing interest. The service doesn't use AWS to auto-generate SSL for custom domains, it uses a dedicated instance of Open Resty with LetsEncrypt.


Thank you for your response


Cheers- Frontend is Next.js React


Thanks for your comment, I'll be look into these posts today.


There are some measures in place to prevent bots and click-fraud. DOS is less of a concern, as everything is serverless and based on CF/S3. I'm actively experimenting with pricing and it could well change in the future. You've given me plenty to think about!


I'd like to offer a free version that is useful for non-pro users. I feel that a limit on link creation is a way to differentiate. That said, I'm still experimenting with pricing so this could well change.


Thanks! We collect OS/browser information from the user agent, country, referrer and query parameters.


I created a link shortening service that works in exactly this way, it's called pxl.to. Based on Amazon CloudFront's global edge network of 310+ Points of Presence in 47 countries. What this means for the user:

- Instant links with low latency no matter where your visitors are in the world

- Robust and reliable links that will never go down, ever

- Protection against network and application layer attacks

- Unlimited tracked clicks (no cap on clicks/month)

The service allows the creation of links using a hierarchical naming structure, as mentioned in these comments like example.com/folder/test. It also auto-generates an SSL cert for every custom domain added, for HTTPS-secure links.

I'd love any feedback! The service is largely free and can be found at https://www.pxl.to


Hikaru and Chessbrah are playing at GM level. It'd be difficult to cheat at this level. Every player tends to recognise every other player, and it takes time to climb to this elo. A far more representative example would be to observe games from a NM or IM. These guys often bump into cheaters. 1 in 6/7 isn't unrealistic.


> playing at GM level

Not always. Hikaru does speedruns[1] using an alt acct with entry-level ELO to race to ELO 3000. I've watched a fair bit of this, and seen him encounter the odd cheater or suspect game, but much nearer 1% than 10% of the time.

1: e.g.: https://www.youtube.com/watch?v=iOd222WIEk8


I don't disagree with what you said, but for context: when these players do speedruns they typically start from 600 ELO and work their way back up to GM, so they face players at every level as part of that 100-game streak.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: