What was the purpose of the third Yamato class ship?

I heard there were 3 ships in the Yamato class but I can’t find any information about it. Some sources say it was a transport vessel to transfer spare airplane parts and ammo and some say it was a full aircraft carrier with a capacity of 85 planes and thousands of crew?

Can you please tell me the true purpose of this vessel?

All topic

Shared flat and Germany family reunification visa for a third-country national?

As per section 3.1.1 of this document, the living space requirement for the German family reunification visa of a third-country national is 12 sqm per person:

“Without prejudice to state provisions, sufficient living space is usually deemed to be available if 12 sqm of living space are available to each family member aged above six and 10 sqm of living space for each family member aged below six. Adequate availability of the facilities (kitchen, bathrooms, lavatories) must be ensured. A shortfall of about ten percent is acceptable” — (2.4.2. General Administrative Regulation to the Residence
Act).”

However, it does not state whether shared flats are allowed or not. I wonder if my wife can meet the family reunification visa requirements if I live in a shared apartment in which my private room meets the 24 square meters criteria? If positive, I wonder what the rental contract requirements of such a situation should be? Should the contract state that two persons are going to live there?

To clarify, we’re not going to be living in a shared flat. I just want to save on expenses until she joins me. But she needs to enclose a proof of suitable accommodation upon her visa application.

All topic

How to avoid repeating myself while writing in the third person

I’m writing a fantasy story in third person and I’m not that confident if I’m doing it right.

I noticed I’m using the word “he” so often (the character’s guy by the way) and I’m afraid that I’m “telling” more than “showing.”

Here is a sample from my first chapter:

Cold drops of water falling from the ceiling prevented Ian from
falling asleep. Each time his eyes were to droop, a single drop of
water would fall on his nape, the shivers pulling him back to reality.
And each time this happened, his eyes would always meet with the oil
lamp on top of a wooden table a good two meters away, its red-orange
and yellow flame casting funny looking shadows all around the dark and
damp cellar he was in.

He would’ve done something about it—but with his hands bound to a
chair and his mouth gagged with a cloth, he couldn’t do anything much.

It might have been hours already since he was brought here; he
couldn’t tell exactly. But judging on how soaked his tunic was, it
could have been more. The room had no windows; he could’ve used
sunlight to tell the time.

Speaking of time, he had a pocket watch with him. Where could it be?
Did he dropped it? Or was it taken?

No windows. No sunlight. No watch. Great. At least the faint,
festive-like merriment from the outside passed through the thick
walls, making him feel he had some company.

How did I end up in this place again? He squinted at the flame of the oil lamp, as if it would spout some answers. He wanted to scream
for his captors to come down and answer his question—and demand for
his release; the cloth was doing its job properly.

So, no other choice but to rely on good old memory—even if it was
currently a dud.

He closed his eyes and rummaged his memories for any possible clues.

Nothing—still. What came about was a faint yet sharp throbbing pain
from the back of his head.

Maybe Ian should stop; he’d been doing the same thing since earlier
but always got the same result . . .

The pain made him wince. A concussion? Aside from the memory loss,
there was confusion. He also felt he was out for a swim in the ocean .
. .

Hope it’s mild. He was urgent to remember everything—and fast. He closed his eyes and focused on sleeping instead, ignoring the water
falling water on his nape, the sensation of his shirt sticking to his
skin. Maybe if he slept—maybe if he rested his mind—everything would
come back.

But his plans of some shut-eye and relaxation got scrapped when the
door flew open.

“Damn it,” he cursed through gritted teeth after nearly falling off
the chair.

Am I abusing the “he” in this? Is it too filter-y?

All topic

Could the Nokia 1100 be hacked to sniff SMS messages intended for third parties?

TL; DR; version: Is it possible that hackers were somehow able to “reprogram” a specific Nokia 1100 phone to make it receive SMS messages sent to another person’s phone number?


A couple of years ago, a friend of mine asked me if I happen to have an old Nokia 1100 around. I inquired him about this very specific request and he told me that there’s a “black market” forming where people buy these phones for hundreds of euros because “hackers found a way to hack ATMs through them”.

Since this sounded just as ridiculous back then as it does now, I told him it’s probably some kind of scam, but he insisted he knew people who sold them on e-bay for a lot more. I Googled it back then and found out that, supposedly, someone actually did sell a Nokia 1100 for as much as $32,413 (this probably started the whole thing).

PC World wrote extensively about this. In short:

  • The fraud is possible because somehow the phone can be reprogrammed to use someone else’s phone number, allowing them to receive some kind of code confirmation via SMS to confirm a bank transaction.
  • The reprogramming is possible due to a software flaw.
  • The flaw is only present in phones that were made in a factory in Bochum, Germany.
  • In addition, the flaw only appears to be present in a specific firmware version (variously reported as RH-15, RH-16, RH-17 or RH-18).

Based on my limited knowledge of mobile phones, I don’t see how such a thing would be possible for many reasons (how was it even possible to modify the software of such a closed platform where not even firmware upgrades were simple? can you really “reprogram” a phone to use a different number when such information is actually stored on the SIM card? wouldn’t some kind of special device for these purposes be cheaper than $32000?), but PC World soon afterwards reported that investigators managed to replicate this somehow.

I failed to find any further information confirming or denying these claims or giving some “more technical” explanation and it seems people simply stopped talking about it soon after (despite it creating quite a buzz back then – hell, there were even sites dedicated to making markets for these specific phones), so I’m now curious whether this whole story makes sense in retrospect, the whole idea of “reprogramming” a phone to receive an SMS and then using this to somehow steal enough money to make it worth $32,000?

All topic

Explanation for cutting a Möbius strip at one-third its width

Can anyone offer a concise, convincing explanation for why cutting
a Möbius strip along a line, not midway but rather one-third of the width of
the strip, and eventually joining back to itself, produces two linked, twisted
loops, one long, one short:


MobiusThird
(Image from this web site.)


I am not seeking a proof, but rather an explanation that could convince
essentially anyone paying sufficient attention.
Especially the lack of symmetry in the result can be surprising.

Consider it a teaching challenge. 🙂

All topic

Third Grade Question — This makes no sense to me?

Third grade grandchild had this for homework. I don’t even know the intent here?

enter image description here

All topic

Fingerprinting third generation hidden services

It is known that it is possible for an observer between a Tor client and the guard relay to detect whether or not the client is attempting to connect to a hidden service (although it is not currently known to be possible to accurately identify which service is being accessed). I would like to know if that is also possible with the third generation of hidden services. I have not seen any research on that subject.

All topic

Correlation among two variables shared by a third set of variables

I am interested in a measure that quantifies the correlation between two variables X,Y that is also shared by a third set of variables Z.

That is, a measure that is in some way the converse of the partial correlation of X,Y when controlling for Z.

A practical way (yet without a proper theoretical justification why this should work) that I have for calculating this is calculating the correlation of the regression coefficients of X to each variable of Z to the regression coefficients of Y to each variable of Z.

Is there another way of calculating this or a statistical measure that quantifies this type of correlation?

All topic

Securely embedding a widget submitting forms to our servers on third party websites?

I would like to build a javascript widget that third party developers inject on their page by adding:


The script injects the email collection form widget into a div tag on the developer website. When a user submits the form, it makes a POST request to an endpoint hosted on our server. We use recaptcha to validate all requests.

There are some security implicatons:

  • Bad actor can spam the endpoint with bad email addresses.
  • Since the widget is embedded on the developer page, they can use the widget for nefarious purposes and have our name on it.

How can I address the security issues that comes with an embeddable widget? All requests go through HTTPS. Recaptcha is used to help against spam/abuse. Maybe I can use a site key/referrer header to validate that the request is coming from a trusted website?

Another option is to use an iframe hosted on my website to show the widget.

All topic

Question: What seperates third world from first world?

Question: What seperates third world from first world?

Question: What seperates third world from first world?

All topic