<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: 2bitencryption</title><link>https://news.ycombinator.com/user?id=2bitencryption</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 30 Apr 2026 23:55:14 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=2bitencryption" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by 2bitencryption in "I wrote to Flock's privacy contact to opt out of their domestic spying program"]]></title><description><![CDATA[
<p>Not exactly. One can be charged with stalking, even though the offender only went to places in public that the victim also went to. If combined with a pattern of behavior that, in aggregate, infringes upon the rights of the target, it can become a crime.</p>
]]></description><pubDate>Wed, 15 Apr 2026 00:58:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47773396</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=47773396</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47773396</guid></item><item><title><![CDATA[New comment by 2bitencryption in "Resizing windows on macOS Tahoe – the saga continues"]]></title><description><![CDATA[
<p>The interesting part, for anyone who actually reads the article - the change was fixed in an RC and then reverted in the final release.<p>Which implies there was some regression, some issue, some incorrect behavior or negative impact. One has to wonder… what could it have been? What could the issue with having a more accurate clickbox for the corner of the window possibly be?</p>
]]></description><pubDate>Fri, 13 Feb 2026 01:15:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=46997700</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=46997700</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46997700</guid></item><item><title><![CDATA[New comment by 2bitencryption in "Project Genie: Experimenting with infinite, interactive worlds"]]></title><description><![CDATA[
<p>Given that the video is fully interactive and lets you move around (in a “world” if you will) I don’t think it’s a stretch to call it a world model. It must have at least some notion of physics, cause and effect, etc etc in order to achieve what it does.</p>
]]></description><pubDate>Thu, 29 Jan 2026 19:56:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=46815682</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=46815682</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46815682</guid></item><item><title><![CDATA[New comment by 2bitencryption in "TikTok is officially US-owned for American users, here's what's changing"]]></title><description><![CDATA[
<p>I’m not sure about “dumb them down”, I suspect it’s more like “subtly influence popular opinion”.<p>My husbands TickTock feed is full of things like “10 things Americans do that Chinese think are weird”, “10 reasons Chinese cities are in the 22nd century” etc etc.<p>I personally don’t think that’s propaganda - most of it is factually true and would be pushed to the front of any fair algorithm because it is engaging. But I can kinda see the concern, even though I disagree with the outcome.</p>
]]></description><pubDate>Sun, 25 Jan 2026 06:26:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=46751339</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=46751339</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46751339</guid></item><item><title><![CDATA[New comment by 2bitencryption in "TikTok is officially US-owned for American users, here's what's changing"]]></title><description><![CDATA[
<p>Would they? There are already data residency laws, and the US didn’t have to be on any foreign adversary list for those to work, right?</p>
]]></description><pubDate>Sun, 25 Jan 2026 06:22:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=46751316</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=46751316</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46751316</guid></item><item><title><![CDATA[New comment by 2bitencryption in "Confer – End to end encrypted AI chat"]]></title><description><![CDATA[
<p>if (big if) you trust the execution environment, which is apparently auditable, and if (big if) you trust the TEE merkle hash used to sign the response is computer based on the TEE as claimed (and not a malicious actor spoofing a TEE that lives within an evil environment) and also if you trust the inference engine (vllm / sglanf, what have you) then I guess you can be confident the system is private.<p>Lots of ifs there, though. I do trust Moxie in terms of execution though. Doesn’t seem like the type of person to take half measures.</p>
]]></description><pubDate>Tue, 13 Jan 2026 20:00:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=46606981</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=46606981</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46606981</guid></item><item><title><![CDATA[New comment by 2bitencryption in "Ripgrep 15.0"]]></title><description><![CDATA[
<p>the ripgrep codebase is ultimate “pour a drink, settle into your coziest chair, and read some high quality software” codebase. Just click around through it and marvel.</p>
]]></description><pubDate>Sat, 18 Oct 2025 14:58:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=45627907</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=45627907</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45627907</guid></item><item><title><![CDATA[New comment by 2bitencryption in "Comcast squeezing 2Gbps internet speeds through decades-old coaxial cables"]]></title><description><![CDATA[
<p>Interesting, how many seconds of 2Gbps transfer do I get before I reach my monthly cap and they start throttling me?<p>Jokes aside, I'm curious how this is even possible over decades-old cable. I get there's a new DOCSIS standard, but I'm less interested in the protocol and more interested in the simple physics of it. How can a simple coaxial cable cram so much bandwidth?</p>
]]></description><pubDate>Sat, 14 Oct 2023 22:52:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=37884997</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=37884997</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37884997</guid></item><item><title><![CDATA[New comment by 2bitencryption in "The Banality of Genius: Notes on Peter Jackson's Get Back (2022)"]]></title><description><![CDATA[
<p>The story you're thinking of is about Brian Wilson, the creative force behind the Beach Boys and one of the only real artists of the time who could arguably be considered a peer of The Beatles.<p>Personally I've never seen a really strong source for that story, only anecdotes. I think it's an oversimplification to say "Strawberry Fields" made Brian Wilson insane. Instead, he was in a mental decline already. The pressure of "Brian Wilson is a genius" was getting to him:<p><a href="https://en.wikipedia.org/wiki/Brian_Wilson_is_a_genius" rel="nofollow noreferrer">https://en.wikipedia.org/wiki/Brian_Wilson_is_a_genius</a><p>There's a similar story with stronger sources, though. If you want to know about Brian's state of mind around that time, listen to his song Heroes and Villains. Basically, Brian worked on this song like it was his magnum opus, trying to reach the level of Sgt. Pepper. Quoting from Wikipedia (sue me):<p>> For Wilson, the single's failure came to serve as a pivotal point in his psychological decline, and he adopted the song title as a term for his auditory hallucinations.<p>>  In the September/October 1967 issue of Crawdaddy!, journalist and magazine founder Paul Williams wrote that the song "originally had a chorus of dogs barking, cropped when Brian heard Sergeant Pepper, and was in many ways - the bicycle rider - a far different song."[39]<p>> Wilson held onto the final mix of the song for about a month. On the evening of July 11, 1967, he was told by his astrologer (a woman named Genevelyn) that the time was right for the record to be heard by the public. Without informing Capitol, Wilson called his bandmates and, accompanied by producer Terry Melcher, traveled by limo to personally deliver a vinyl cut of the record to KHJ Radio.[72] According to Melcher, as Wilson excitedly offered the record for radio play, the DJ refused, citing program directing protocols.[77][78] Melcher recalled: "Brian almost fainted! It was all over. He'd been holding onto the record [and] had astrologers figuring out the correct moment. It really killed him. Finally they played it, but only after a few calls to the program director or someone, who screamed, 'Put it on, you idiot!' But the damage to Brian had already been done."[79]<p>And this is all the tip of the iceberg. To have an even better understanding, you'd need to listen to the Smile! sessions, and the eventual 2004 "completed" recording of Smile!.<p>Personally, I think Brian was a genius (well, <i>is</i>; he's still alive, though not looking too good these days, sadly). But unlike The Beatles, who were four friends with an unbelievably tight bond (even after their breakup), Brian had no one else in the Beach Boys who could match him. And I think it was a weight on his shoulders, and that combined with the drug use (and likely a stroke at some point, which is obvious if you ever hear him speak post ~1968) brought his downfall.</p>
]]></description><pubDate>Sat, 14 Oct 2023 18:43:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=37883084</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=37883084</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37883084</guid></item><item><title><![CDATA[New comment by 2bitencryption in "Starlink Direct to Cell"]]></title><description><![CDATA[
<p>Is there any company even remotely close to competing with Starlink in the "global satellite ISP" space?<p>I remember reading somewhere that literally <i>most</i> of the satellites orbiting earth are Starlink satellites. As in, more than half of all satellites are Starlink.<p>Obviously that statistic does not mean they have a successful business, that there's enough of a market, etc etc.<p>But one can imagine the types of services you can supply in just a few years to customers when you have by far the largest satellite constellation in the sky, with global coverage, and the ability to launch dozens of new satellites at low cost.</p>
]]></description><pubDate>Wed, 11 Oct 2023 18:35:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=37848458</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=37848458</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37848458</guid></item><item><title><![CDATA[New comment by 2bitencryption in "Stable LM 3B: Bringing Sustainable, High-Performance LMs to Smart Devices"]]></title><description><![CDATA[
<p>/r/LocalLLaMA/ is such an interesting mix of academia/researchers (it was called out in a recent paper, regarding context length, IIRC) and odd anarcho-futurist weirdos. And I kind of love it for that.</p>
]]></description><pubDate>Mon, 02 Oct 2023 17:29:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=37741515</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=37741515</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37741515</guid></item><item><title><![CDATA[New comment by 2bitencryption in "Show HN: E-Ink Day Schedule"]]></title><description><![CDATA[
<p>If you're even slightly interested in getting into jailbreaking/hacking of devices, the Kindle is a great place to start.<p>There's a lot of low-hanging fruit there. Particularly because the device has a USB port and, by design, exposes a user partition that you can read/write to (so you can upload files and documents and ebooks to the device).<p>There's definitely been an effort by Amazon to lock them down, but just taking your reverse-engineering tool of choice and decompiling their firmware binary will give you tons of readable code to dig through. They use a mix of java, native c, and javascript.<p>Fun fact, at startup the Kindle looks for certain files in the user partition, with certain naming patterns. You can, for example, disable the screensaver by dropping a file with a special name there. They patched this once, but after doing a grep for the user-partition mount location (to see all the places in their code where they read from user partition files) I was pretty quickly able to find another way to do this. It's fun stuff.</p>
]]></description><pubDate>Mon, 25 Sep 2023 17:22:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=37647425</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=37647425</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37647425</guid></item><item><title><![CDATA[New comment by 2bitencryption in "Obsidian 1.4.10 Desktop (Public)"]]></title><description><![CDATA[
<p>I use Obsidian daily and love it.<p>However, I'm not very disciplined with it. I don't have a "process". It's just my scratchpad with daily notes that end up being disorganized and gibberish.<p>Does anyone have a good process they follow with Obsidian? A good template, a good, disciplined strategy to stay organized? I'd love to hear it, please share :)</p>
]]></description><pubDate>Tue, 12 Sep 2023 16:44:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=37483984</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=37483984</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37483984</guid></item><item><title><![CDATA[New comment by 2bitencryption in "The new science of meditation"]]></title><description><![CDATA[
<p>A few years ago I tried the very first Headspace meditation courses, back when Headspace was pretty new.<p>It was great! I loved it. I really felt like the narrator was knowledgeable and had something to teach me. His explanations for the process actually made sense, and weren't woo-woo mumbo jumbo. Perhaps it is all placebo effect, but even if so, the effect worked for me perfectly.<p>The problem is, as the industry exploded, it became harder and harder to find meditation guides that have that quality.<p>Even on Headspace, which I used to love, there's only so much they could provide, before the demand necessitated putting out meditation guides that are more and more ridiculous ("meditation for doing the dishes", "meditation for walking the dog", etc).<p>And I haven't found any guides that help me to the degree that the original Headspace ones did. Would love it if anyone has any recommendations.<p>(of course, you might say "you don't need a guide once you know how to do it", but personally I find it really hard without some recorded guide helping me along)</p>
]]></description><pubDate>Tue, 22 Aug 2023 16:28:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=37225048</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=37225048</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37225048</guid></item><item><title><![CDATA[New comment by 2bitencryption in "Show HN: LLMs can generate valid JSON 100% of the time"]]></title><description><![CDATA[
<p>> maybe running a schema validator against the output and re-requesting on your behalf<p>this is the part that blows my mind. You don't have to do this! You don't have to sample the entire output, and then validate after the fact.<p>You're not <i>required</i> to greedily pick the token with the highest score. You get the scores of all tokens, on every forward pass! So why even waste time picking invalid tokens if you're just going to validate and retry later on??<p>(note: when I say "you" here, I mean whoever is hosting the model. It <i>is</i> true that OpenAI does not expose all token scores, it only gives you back the highest-scoring one. So a client-side library is not able to perform this grammar-based sampling.<p>BUT, OpenAI themselves host host the model, and they see all token outputs, with all scores. And in the same API request,  they allow you to pass the "function definition" as a JSON schema. So why not simply apply that function definition as a mask on the token outputs? They could do this without exposing all token scores to you, which they seem very opposed to for some reason.)</p>
]]></description><pubDate>Mon, 14 Aug 2023 19:58:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=37126041</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=37126041</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37126041</guid></item><item><title><![CDATA[New comment by 2bitencryption in "Show HN: LLMs can generate valid JSON 100% of the time"]]></title><description><![CDATA[
<p>TypeChat: let's try really hard to try to convince the model to make the highest-scoring tokens follow the grammar we want.<p>Guidance (and this project?): Let's not even bother with trying to convince the model; instead, we'll only sample from the set of tokens that are guaranteed to be correct for the grammar we want to emit.</p>
]]></description><pubDate>Mon, 14 Aug 2023 19:54:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=37126002</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=37126002</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37126002</guid></item><item><title><![CDATA[New comment by 2bitencryption in "Show HN: LLMs can generate valid JSON 100% of the time"]]></title><description><![CDATA[
<p>it still blows my mind that OpenAI exposes an API with Functions calling, and yet <i>does not guarantee the model will call your function correctly</i>, in fact, it does not even guarantee the output will be valid JSON.<p>When this is, really, a solved problem. I've been using github.com/microsoft/guidance for weeks, and it genuinely, truly guarantees correct output, because <i>it simply does not sample from tokens that would be invalid.</i><p>It just seems so obvious, I still have no clue why OpenAI does not do this. Like, why fuss around with validating JSON after the fact, when you can simply guarantee it is correct in the first place, by only sampling tokens <i>if they conform to the grammar you are trying to emit?</i></p>
]]></description><pubDate>Mon, 14 Aug 2023 19:52:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=37125967</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=37125967</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37125967</guid></item><item><title><![CDATA[New comment by 2bitencryption in "LK-99 is an online sensation but replication efforts fall short"]]></title><description><![CDATA[
<p>What's even more interesting than the mysteries properties of LK-99 is the kind of response it's brought out. You even see it right here in HN.<p>Have you ever seen a Youtube video about someone reviewing a Tesla or comparing it to another car? The comments are always full of hostile and vitriolic remarks by people who are <i>personally offended</i> if the video suggests the cup holders on a Model 3 are less than perfection. For some reason, Tesla is surrounded by a cult of personality where it's not just a car, it's a <i>lifestyle</i>.<p>And bizarrely, something similar is happening with this funny floating rocks. Here we are, on HN, and people in this very thread are calling Nature (<i>Nature!</i>) an "online sensational clickbait magazine" because they want to believe the hype that the rock has properties that they only learned about from Wikipedia a few days prior (and only understood 5% of it, at that)<p>Is there reason to be excited? Hell yeah. Are all the different replication attempts super fascinating? Hell yeah. Could it be the real deal? It could!<p>But this has become some weird spectator sport, where you're either a believer or a skeptic, and if you're on a different side than I am then <i>screw you</i>, even if you are Nature.</p>
]]></description><pubDate>Fri, 04 Aug 2023 17:07:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=37002772</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=37002772</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37002772</guid></item><item><title><![CDATA[New comment by 2bitencryption in "Vicuna v1.5 series, featuring 4K and 16K context, based on Llama 2"]]></title><description><![CDATA[
<p>But from the paper, it sounds like this happens only during training. Some trick about constantly re-injecting the system prompt during chat conversations.<p>But during inference, there's no trick. The system message remains once at the top.</p>
]]></description><pubDate>Thu, 03 Aug 2023 17:28:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=36988938</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=36988938</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36988938</guid></item><item><title><![CDATA[New comment by 2bitencryption in "Vicuna v1.5 series, featuring 4K and 16K context, based on Llama 2"]]></title><description><![CDATA[
<p>How well does it adhere to the system prompt?<p>The base Llama-Chat models use something called "ghost attention" (they describe it in their paper). No clue how it works, but the result is, the model sticks to the system prompt <i>extremely</i> well. If you tell it that it's Marvin the Paranoid Android in the system prompt, it will stick 100% to that.<p>In llama-derived models like Vicuna, if you tell it to act as Marvin the Paranoid Android, eventually the regular "assistant" voice starts to bleed through, after only a few chat turns.<p>Doesn't sound like a big deal, but in cases where you have strict rules you want the model to follow, then the base llama-2-chat models are far better than any derived ones that do not implement ghost attention.</p>
]]></description><pubDate>Thu, 03 Aug 2023 16:31:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=36988090</link><dc:creator>2bitencryption</dc:creator><comments>https://news.ycombinator.com/item?id=36988090</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36988090</guid></item></channel></rss>