<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: 986aignan</title><link>https://news.ycombinator.com/user?id=986aignan</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 14 May 2026 17:58:06 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=986aignan" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by 986aignan in "Classic 7 is a Windows 10 LTSC mod to look 1:1 to Windows 7"]]></title><description><![CDATA[
<p>Largely, I think, because devs are given too powerful computers. It's easier for companies to "fix" or preemptively had off performance bugs by giving developers high-end computers than to spend extra development time truly fixing them.</p>
]]></description><pubDate>Thu, 14 May 2026 10:20:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=48133387</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=48133387</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48133387</guid></item><item><title><![CDATA[New comment by 986aignan in "Google broke reCAPTCHA for de-googled Android users"]]></title><description><![CDATA[
<p>> They get blocked by Recaptcha, I think.<p>I think SV was asking what onion services, which can't really use recaptcha, do to prevent the DDoS storm.<p>And I would imagine the answer is obscurity, since the dark web isn't nearly as well-mapped as the public web. That and some Anubis or other PoW would probably go far.</p>
]]></description><pubDate>Sat, 09 May 2026 00:32:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=48070494</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=48070494</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48070494</guid></item><item><title><![CDATA[New comment by 986aignan in "Google Cloud fraud defense, the next evolution of reCAPTCHA"]]></title><description><![CDATA[
<p>If it's just a contact form on some random site that isn't particularly valuable to spammers, a bespoke solution like hidden input fields, obfuscation, or some kind of token calculated client-side by JS will probably work just as well.</p>
]]></description><pubDate>Thu, 07 May 2026 11:20:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=48048048</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=48048048</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48048048</guid></item><item><title><![CDATA[New comment by 986aignan in "Acetaminophen vs. ibuprofen"]]></title><description><![CDATA[
<p>Certain esters have been found to be much safer (in mice, at least):<p>> The glutathione hepatic values in mice obtained by intraperitoneal injection of the ester are superimposable on controls and the oral LD50 was found to be greater than 2000 mg kg^-1 and the intraperitoneal LD50 was 1900 mg kg^-1 ...<p>That's for pyroglutamic and glutamic acid esters of paracetamol: <a href="https://pubmed.ncbi.nlm.nih.gov/8799871/" rel="nofollow">https://pubmed.ncbi.nlm.nih.gov/8799871/</a><p>and more general analogs apparently can also be designed to not produce NAPQI:<p>> Thus, in 2020, N-sulpharyl-APAP prodrugs 39–40
(Fig. 11) were developed. [...] They are not hepatotoxic because they do not generate toxic metabolite NAPQI, even in concentrations equal to a toxic dose of APAP (600 mg kg^−1 in mice).<p><a href="https://pubs.rsc.org/zh-tw/content/articlepdf/2024/ra/d4ra00365a" rel="nofollow">https://pubs.rsc.org/zh-tw/content/articlepdf/2024/ra/d4ra00...</a> p. 9702.<p>These would probably require trials, though.</p>
]]></description><pubDate>Wed, 22 Apr 2026 10:52:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47861709</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=47861709</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47861709</guid></item><item><title><![CDATA[New comment by 986aignan in "Brands got worse on purpose"]]></title><description><![CDATA[
<p>There's a broader law: If it needs to insist on what it is, it probably isn't. E.g. "People's Democratic Republic of Foo".</p>
]]></description><pubDate>Tue, 21 Apr 2026 16:22:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47850963</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=47850963</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47850963</guid></item><item><title><![CDATA[New comment by 986aignan in "Further human + AI + proof assistant work on Knuth's "Claude Cycles" problem"]]></title><description><![CDATA[
<p>The code lets you shoot yourself in the foot in a lot more ways than a spec does, though. Few people would make specs that include buffer overflows or SQL injection.</p>
]]></description><pubDate>Sun, 29 Mar 2026 12:29:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47562618</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=47562618</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47562618</guid></item><item><title><![CDATA[New comment by 986aignan in "Please do not A/B test my workflow"]]></title><description><![CDATA[
<p>That sounds like a good way to get extreme short-term optimization.<p>Say a particular finetune prioritizes profits right now and makes recommendations like "cut down on maintenance, you can make up for it later with your increased profits and their interest". It produces more profits, and wins the AB test. Later the chickens come home to roost.<p>You can reduce the problem by using long-term indicators, but then each AB test is very slow.</p>
]]></description><pubDate>Sun, 15 Mar 2026 12:49:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47386914</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=47386914</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47386914</guid></item><item><title><![CDATA[New comment by 986aignan in "Swiss e-voting pilot can't count 2,048 ballots after decryption failure"]]></title><description><![CDATA[
<p>The Rivest methods in the CSR13 paper - ThreeBallot, VAV, and Twin - seem to be relatively simple. Not directly applicable to online voting, though, but perhaps they would be simple enough to prove to the people that regular voting has no voter fraud?</p>
]]></description><pubDate>Thu, 12 Mar 2026 15:15:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47351899</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=47351899</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47351899</guid></item><item><title><![CDATA[New comment by 986aignan in "Predicting OpenAI's ad strategy"]]></title><description><![CDATA[
<p>Not all answers are conducive to such subtle manipulation, though. If the user asks for an algorithm to solve the knapsack problem, it's kind of hard to stealthily go "now let's see how many Coca Colas will fit in the knapsack". If the user asks for a cyberpunk story, "the decker prepared his Microsoft Cyberdeck" would sound off, too.<p>Biasing actual buying advice would be feasible, but it would have to be handled very carefully to not be too obvious.</p>
]]></description><pubDate>Sun, 18 Jan 2026 17:32:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=46669932</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=46669932</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46669932</guid></item><item><title><![CDATA[New comment by 986aignan in "Inside The Internet Archive's Infrastructure"]]></title><description><![CDATA[
<p>I wish there were some kind of file search for the Wayback Machine. Like "list all .S3M files on members.aol.com before 1998". It would've made looking for obscure nostalgia much easier.</p>
]]></description><pubDate>Fri, 16 Jan 2026 01:06:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=46641756</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=46641756</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46641756</guid></item><item><title><![CDATA[New comment by 986aignan in "Scientists work out how acetaminophen/paracetamol works"]]></title><description><![CDATA[
<p>I'm surprised that the article doesn't mention the peroxidase hypothesis[1]. Has it been disproven?<p>[1] <a href="https://tmedweb.tulane.edu/pharmwiki/doku.php/acetaminophen" rel="nofollow">https://tmedweb.tulane.edu/pharmwiki/doku.php/acetaminophen</a></p>
]]></description><pubDate>Mon, 17 Nov 2025 21:57:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=45958823</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=45958823</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45958823</guid></item><item><title><![CDATA[New comment by 986aignan in "We should have the ability to run any code we want on hardware we own"]]></title><description><![CDATA[
<p>The problem is that if what "really counts" is too vaguely defined, then it's hard to pin down and argue the point.<p>Virtual memory probably isn't what you meant, but take something like user privilege separation. It's usually considered a good idea to not run software as root. To interpret the statement generously, privilege separation does restrict immediate freedom: you have to escalate whenever you want to do system-level changes. But I think josephg's statement:<p>> Sandboxing gives users more control. Not less. Even if they use that control to turn off sandboxing, they still have more freedom because they get to decide if sandboxing is enabled or disabled.<p>can be directly transposed to user privilege separation. While it's true that escalating to root is more of a hassle than just running everything as root, in another sense it does provide more control because the user can run arbitrary code without being afraid that it will nuke their OS; and more freedom because you could always just run everything as root anyway.<p>Maybe josephg's sense of freedom and control is what you're saying there is a trade-off between. But the case of privilege separation shows that some trade-offs are such that they provide a lot of security for only a little bit of inconvenience, and that's a trade-off most people are willing to make.<p>Sometimes the trade-off may seem unacceptable because OS or software support isn't there yet. Like Vista's constant UAC annoyances in the case of privilege separation/escalation. But that doesn't mean that the fundamental idea of privilege levels is bad or that it must necessarily trade off too much convenience for control.<p>I think that's also what josephg is suggesting about sandboxing. He says that the clipboard problem could probably be fixed; then you say, "but there are other examples". What remains to be shown is whether the examples are inherent to sandboxing and must degrade a capabilities/sandbox approach to a level where the trade-off is unacceptable to most.</p>
]]></description><pubDate>Mon, 01 Sep 2025 12:14:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=45092107</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=45092107</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45092107</guid></item><item><title><![CDATA[New comment by 986aignan in "Why are anime catgirls blocking my access to the Linux kernel?"]]></title><description><![CDATA[
<p>IIRC, you could use asymmetric cryptography to derive a site-specific pseudonymous token from the service and your government ID without the service knowing what your government ID is or the government provider knowing what service you are using.<p>The service then links the token to your account and uses ordinary detection measures to see if you're spamming, flooding, phishing, whatever. If you do, the token gets blacklisted and you can no longer sign on to that service.<p>This isn't foolproof - you could still bribe random people on the street to be men/mules in the middle and do your flooding through them - but it's much harder than just spinning up ten thousand bots on a residential proxy.</p>
]]></description><pubDate>Thu, 21 Aug 2025 12:03:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=44971695</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=44971695</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44971695</guid></item><item><title><![CDATA[New comment by 986aignan in "Let's properly analyze an AI article for once"]]></title><description><![CDATA[
<p>It is possible to take this too far, though - consider the OpenAI IMO proofs[1], for instance, and compare them to Gemini's.[2]<p>[1] <a href="https://github.com/aw31/openai-imo-2025-proofs" rel="nofollow">https://github.com/aw31/openai-imo-2025-proofs</a><p>[2] <a href="https://arxiv.org/pdf/2507.15855" rel="nofollow">https://arxiv.org/pdf/2507.15855</a> Appendix A</p>
]]></description><pubDate>Sat, 09 Aug 2025 17:41:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=44848474</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=44848474</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44848474</guid></item><item><title><![CDATA[New comment by 986aignan in "We may not like what we become if A.I. solves loneliness"]]></title><description><![CDATA[
<p>At some point, I would imagine the distinction between capital and land becomes blurry, though. Economic rent can be had from either if the barrier to competition is high enough.<p>Domain names are a good example, because as skissane said, you could just make another DNS root. The trouble is convincing people (browsers) to use it. The problem in attempting to overturn Facebook isn't mainly the coding, either, but having a critical mass care. Those barriers don't seem like absolutes the way land is; they're just very high, high enough for those who control them to extract economic rent.</p>
]]></description><pubDate>Sat, 02 Aug 2025 23:48:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=44772757</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=44772757</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44772757</guid></item><item><title><![CDATA[New comment by 986aignan in "The Perils of 'Design Thinking'"]]></title><description><![CDATA[
<p>Even if that is true (and I'm not saying it is), practical limits on handling the combinatorial complexity, or variety if you will, severely limits its use. No realistic fist-fighter has the information required or the processing capabilities to do the "biomechanical optimization problem" to anywhere near optimality.<p>In city planning and building design, the problem is even more severe. The planner doesn't know what people are going to settle where, what their desired needs are (or are going to be), and so on. That doesn't mean that there's no such thing as an awful solution, nor that you can't say anything at all. (A house probably needs windows, and you probably shouldn't stick a polluting industrial zone right next to a bunch of them.) It just means that trying to "micromanage" a city or complex building fails - for the same reason that micromanaging an organization fails.<p>(This is a requisite variety or "seeing like a state" argument.)</p>
]]></description><pubDate>Sun, 29 Jun 2025 12:36:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=44412614</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=44412614</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44412614</guid></item><item><title><![CDATA[New comment by 986aignan in "Show HN: LoopMix128 – Fast C PRNG (.46ns), 2^128 Period, BigCrush/PractRand Pass"]]></title><description><![CDATA[
<p>Monte Carlo simulations would be the obvious example.</p>
]]></description><pubDate>Sat, 10 May 2025 23:11:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=43949768</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=43949768</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43949768</guid></item><item><title><![CDATA[New comment by 986aignan in "I thought I bought a camera, but no DJI sold me a license to use it [video]"]]></title><description><![CDATA[
<p>Couldn't you replace the CCD with an adapter, connect the adapter to the video out of a computer, and then use the camera to "take a picture" of your already edited picture?<p>It seems to me that any "paper trail" scheme of the sort you describe would have to solve the problems of DRM to work: making the elements that report on the real world (in this case, the CCD) tamper-proof, making the encryption key impossible to extract, designing robust watermarks to avoid analog holes, etc.</p>
]]></description><pubDate>Mon, 21 Apr 2025 10:10:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=43750187</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=43750187</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43750187</guid></item><item><title><![CDATA[New comment by 986aignan in "The Icelandic Voting System (2024)"]]></title><description><![CDATA[
<p>The axioms just state what criteria the Swiss system (but not the Icelandic) obeys. You don't need to know them in order to vote in Iceland any more than you need to know that first past the post fails the Condorcet criterion in order to vote in the US.</p>
]]></description><pubDate>Sun, 20 Apr 2025 10:21:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=43742843</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=43742843</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43742843</guid></item><item><title><![CDATA[New comment by 986aignan in "The Icelandic Voting System (2024)"]]></title><description><![CDATA[
<p>You might need some kind of MMP part if you want it to be truly proportional. If the voters can only rank about ten candidates before it gets unwieldy, that would give an effective 9% absolute threshold. A party that gains 8% support everywhere would get no candidates elected.<p>Here's a paper by Markus Schulze proposing such a method: <a href="https://aso.icann.org/wp-content/uploads/2019/02/schulze4.pdf" rel="nofollow">https://aso.icann.org/wp-content/uploads/2019/02/schulze4.pd...</a>
He uses some very large districts, but it should work for smaller districts too.</p>
]]></description><pubDate>Sun, 20 Apr 2025 10:07:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=43742789</link><dc:creator>986aignan</dc:creator><comments>https://news.ycombinator.com/item?id=43742789</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43742789</guid></item></channel></rss>