例としてこのツイートを使います https://twitter.com/5ebec/status/1047427791606538240
Chrome等のデベロッパーツールからSourcesにアクセス.
r'https://pbs\.twimg\.com/ext_tw_video_thumb/[\d]+/pu/img/[\w\-]+\.(jpg|png)'
のURLにある画像がサムネイル.
TODO:↑これを自動で取得したい
例としてこのツイートを使います https://twitter.com/5ebec/status/1047427791606538240
Chrome等のデベロッパーツールからSourcesにアクセス.
r'https://pbs\.twimg\.com/ext_tw_video_thumb/[\d]+/pu/img/[\w\-]+\.(jpg|png)'
のURLにある画像がサムネイル.
TODO:↑これを自動で取得したい
# Common Modulus Attack | |
function commonModulusAttack(N::BigInt, e1::Int, e2::Int, c1::BigInt, c2::BigInt)::BigInt | |
s1, s2 = exEucild(e1, e2) | |
v = s1 > 0 ? c1^s1 : 1/c1^(-s1) | |
w = s2 > 0 ? c2^s2 : 1/c2^(-s2) | |
return v * w | |
end | |
# Extended Eucildean algorithm | |
function exEucild(e1::Int, e2::Int) |
paperist/alpine-texlive-ja
をpull$ docker pull paperist/alpine-texlive-ja
setting.json
に以下を追記 "latex-workshop.latex.tools": [
{
"name": "ptex2pdf",
"command": "docker",
I hereby claim:
To claim this, I am signing this object:
eval(%w( | |
puts("#!/ | |
usr/bi | |
n/env | |
"+32.ch r+"ju lia"+1 0.chr*2 | |
+"using "+32. chr+"Lux or,"+32 | |
.chr+ "Colo rs"+10 .chr | |
*2+"f unction | |
"+32.c hr+"dr aw_jul ia_lo go(fna me)"+1 0.chr+ | |
"Drawi ng(200 0,"+32 .chr+ "2000, "+32.c hr+"fn |
Verifying that I control the following Nostr public key: npub179rec9sw2a5ngkr2wsjpjhwp2ksygjxn6uw5py9daj2ezhw3aw5swv3s6q |