I hereby claim:
- I am h3y6e on github.
- I am h3y6e (https://keybase.io/h3y6e) on keybase.
- I have a public key ASCI3gw6slPSiXogADEIKUe5MX_fhetQhouQ4e_LRvb2wAo
To claim this, I am signing this object:
| Verifying that I control the following Nostr public key: npub179rec9sw2a5ngkr2wsjpjhwp2ksygjxn6uw5py9daj2ezhw3aw5swv3s6q | 
| eval(%w( | |
| puts("#!/ | |
| usr/bi | |
| n/env | |
| "+32.ch r+"ju lia"+1 0.chr*2 | |
| +"using "+32. chr+"Lux or,"+32 | |
| .chr+ "Colo rs"+10 .chr | |
| *2+"f unction | |
| "+32.c hr+"dr aw_jul ia_lo go(fna me)"+1 0.chr+ | |
| "Drawi ng(200 0,"+32 .chr+ "2000, "+32.c hr+"fn | 
I hereby claim:
To claim this, I am signing this object:
paperist/alpine-texlive-ja をpull$ docker pull paperist/alpine-texlive-jasetting.jsonに以下を追記    "latex-workshop.latex.tools": [
        {
          "name": "ptex2pdf",
 "command": "docker",| # Common Modulus Attack | |
| function commonModulusAttack(N::BigInt, e1::Int, e2::Int, c1::BigInt, c2::BigInt)::BigInt | |
| s1, s2 = exEucild(e1, e2) | |
| v = s1 > 0 ? c1^s1 : 1/c1^(-s1) | |
| w = s2 > 0 ? c2^s2 : 1/c2^(-s2) | |
| return v * w | |
| end | |
| # Extended Eucildean algorithm | |
| function exEucild(e1::Int, e2::Int) | 
例としてこのツイートを使います https://twitter.com/5ebec/status/1047427791606538240
Chrome等のデベロッパーツールからSourcesにアクセス.
r'https://pbs\.twimg\.com/ext_tw_video_thumb/[\d]+/pu/img/[\w\-]+\.(jpg|png)'
のURLにある画像がサムネイル.
TODO:↑これを自動で取得したい