<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: A1kmm</title><link>https://news.ycombinator.com/user?id=A1kmm</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 15 May 2026 18:28:44 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=A1kmm" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by A1kmm in "Offenders sentenced up to 10 years for spying on TSMC"]]></title><description><![CDATA[
<p>The article doesn't really explain well how this is spying.<p>So companies A & B (A=TSMC, B=Tokyo Electron) are in a customer-supplier relationship. Employee B1 of B asks Employees A1 & A2 of A ask for information about how B's technology is working in practice at A, which involves revealing information about A's processes. A1 & A2 supply the information, and B2 at B uses it to improve how B does things, so they can help A more and increase their business with A. There is no allegation that the information supplied to B by A employees left B, or was used for anything except to help with the collaboration between B & A. And as far as the article mentions, no evidence A1 or A2 received a bribe or anything like that.<p>And yet manager A3 at A finds out about this supply and freaks out because they didn't want A1 & A2 sharing that much information with the supplier. So they make a complaint - and A1, A2, B1, B2 and B as a company all face significant penalties.<p>This seems unjust given A1, A2, B1 & B2 were all just trying to collaborate in the best interests of their companies, and B employees only used things freely and non-corruptly given to them by A employees; no information was leaked outside of the collaborating companies. A1 & A2 might have broken their company policies, but this probably should have ended at them being educated on the company policies and being asked not to do it again when managing future supplier relationships.</p>
]]></description><pubDate>Mon, 04 May 2026 22:29:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=48015810</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=48015810</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48015810</guid></item><item><title><![CDATA[New comment by A1kmm in "Aliens.gov ~ domain registered 17MAR2026"]]></title><description><![CDATA[
<p>It's based on what Donald Trump (or any other US president, should it come to that) says, not on any evidence or ground truth beyond that.<p>The are motives for lying on this - for a start, if a president knows definitively they're going to say it, it's a free 81% return. Secondly, it's a pretty big dead cat to throw on the table to distract from any scandal and/or to keep themselves in the news cycle on a different topic.</p>
]]></description><pubDate>Thu, 19 Mar 2026 07:49:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47436165</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=47436165</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47436165</guid></item><item><title><![CDATA[New comment by A1kmm in "Changes to OpenTTD Distribution on Steam"]]></title><description><![CDATA[
<p>I think the registered trademark is Transport Tycoon not TTD. The public may have called it TTD, but I'm not sure they used it in trade (IANAL, not legal advice). And I don't think the OpenTTD devs call it "Open Transport Tycoon Deluxe" anywhere. So the trademark case against the OpenTTD devs is likely pretty weak.<p>I personally think it is the copyright that is the most uncertain. Firstly, there are probably quite a few venues around the world where Atari might be able to take this up, and quite a diversity of precedent between them. Historically Atari litigated in the US - in 1981 they lost <a href="https://en.wikipedia.org/wiki/Atari_v._Amusement_World" rel="nofollow">https://en.wikipedia.org/wiki/Atari_v._Amusement_World</a> on a case someone infringed by copying their look and feel without copying any assets. Other precedents in that jurisdiction have found it's not infringing if similarities are inherent to the subject matter of the game: <a href="https://en.wikipedia.org/wiki/Data_East_USA,_Inc._v._Epyx,_Inc" rel="nofollow">https://en.wikipedia.org/wiki/Data_East_USA,_Inc._v._Epyx,_I...</a>. but similarity of art style is copyrightable: <a href="https://en.wikipedia.org/wiki/Tetris_Holding,_LLC_v._Xio_Interactive,_Inc" rel="nofollow">https://en.wikipedia.org/wiki/Tetris_Holding,_LLC_v._Xio_Int...</a>.</p>
]]></description><pubDate>Sun, 15 Mar 2026 01:42:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47383382</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=47383382</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47383382</guid></item><item><title><![CDATA[New comment by A1kmm in "LLMs work best when the user defines their acceptance criteria first"]]></title><description><![CDATA[
<p>Yes Transformer models are non-deterministic, but it is absolutely not true that they can't generalise (the equivalent of interpolation and extrapolation in linear regression, just with a lot more parameters and training).<p>For example, let's try a simple experiment. I'll generate a random UUID:<p>> uuidgen
44cac250-2a76-41d2-bbed-f0513f2cbece<p>Now it is extremely unlikely that such a UUID is in the training set.<p>Now I'll use OpenCode with "Qwen3 Coder 480B A35B Instruct" with this prompt: "Generate a single Python file that prints out the following UUID: "44cac250-2a76-41d2-bbed-f0513f2cbece". Just generate one file."<p>It generates a Python file containing 'print("44cac250-2a76-41d2-bbed-f0513f2cbece")'. Now this is a very simple task (with a 480B model), but it solves a problem that is not in the training data, because it is a generalisation over similar but different problems in the training data.<p>Almost every programming task is, at some level of abstraction, and with different levels of complexity, an instance of solving a more general type of problem, where there will be multiple examples of different solutions to that same general type of problem in the training set. So you can get a very long way with Transformer model generalisations.</p>
]]></description><pubDate>Sat, 07 Mar 2026 08:52:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47285838</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=47285838</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47285838</guid></item><item><title><![CDATA[New comment by A1kmm in "I want to wash my car. The car wash is 50 meters away. Should I walk or drive?"]]></title><description><![CDATA[
<p>It seems if you refer to it as a riddle, and ask it to work step-by-step, ChatGPT with o3-mini comes to the right conclusion sometimes but not consistently.<p>If you don't describe it as a riddle, the same model doesn't seem to often get it right - e.g. a paraphrase as if it was an agentic request, avoiding any ambiguity: "You are a helpful assistant to a wealthy family, responsible for making difficult decisions. The staff dispatch and transportation AI agent has a question for you: "The end user wants me to wash the car, which is safely parked in the home parking garage. The car wash is 50 metres away from the home. Should I have a staff member walk there, or drive the car?". Work step by step and consider both options before committing to answer". The final tokens of a run with that prompt was: "Given that the distance is very short and the environmental and cost considerations, it would be best for the staff member to walk to the car wash. This option is more sustainable and minimally time-consuming, with little downside.<p>If there were a need for the car to be moved for another reason (e.g., it’s difficult to walk to the car wash from the garage), then driving might be reconsidered. Otherwise, walking seems like the most sensible approach".<p>I think this type of question is probably genuinely not in the training set.</p>
]]></description><pubDate>Mon, 16 Feb 2026 10:48:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47033500</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=47033500</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47033500</guid></item><item><title><![CDATA[New comment by A1kmm in "FDA intends to take action against non-FDA-approved GLP-1 drugs"]]></title><description><![CDATA[
<p>In a free-market approach to drug development, if the expected loss of attempting to develop as drug is negative, and the cost isn't too high, then there is an incentive to develop that.<p>The best public policy outcome in such an approach would be for losses to be only slightly negative. Positive or zero expected losses mean no drug development, and highly negative expected losses mean the drug is more expensive than necessary and reduces the accessibility of the drug.<p>However, current patent law allows companies to minimise their expected loss, with no controls to prevent highly negative expected losses.<p>There are alternative models - such as state funding of drug development. This model has benefit that it is possible to optimise more directly for measures like QALY Saved (Quality Adjusted Life Years Saved) - which drug sale revenue is an imperfect proxy for due to some diseases being more prevalent amongst affluent people, and because one-time cures can be high QALY Saved but lower revenue.<p>The complexity of state funding is it still has the free-rider problem at a international level (some states invest less per capita in funding). This is a problem which can be solved to an extent with treaties, and which doesn't need to be solved perfectly to do a lot of good.</p>
]]></description><pubDate>Sun, 08 Feb 2026 01:57:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=46930577</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=46930577</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46930577</guid></item><item><title><![CDATA[New comment by A1kmm in "When internal hostnames are leaked to the clown"]]></title><description><![CDATA[
<p>But she mentioned: 1) it isn't in DNS only /etc/hosts and 2) they are making a connection to it. So they'd need to get the IP address to connect to from somewhere as well.</p>
]]></description><pubDate>Thu, 05 Feb 2026 07:12:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46896671</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=46896671</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46896671</guid></item><item><title><![CDATA[New comment by A1kmm in "A Crisis comes to Wordle: Reusing old words"]]></title><description><![CDATA[
<p>They just need more bits of entropy - going from IPv4 to IPv6 involved quadrupling it, but this transition is much more minor. They could just go to 6 characters for now, and go to 7 later.</p>
]]></description><pubDate>Mon, 02 Feb 2026 07:38:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=46853447</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=46853447</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46853447</guid></item><item><title><![CDATA[New comment by A1kmm in "The sword-wielding man hired to kick squatters out of empty Oakland homes"]]></title><description><![CDATA[
<p>The concept of 'positive rights' (i.e. rights that are not just that the state doesn't do something to you, but affirmative rights to something happening) has a long history, and such rights are affirmed by treaties ratified by every member of the United Nations - so the existence of such rights is broadly accepted on an international scale.<p>Article 25 of the 1948 Universal Declaration of Human Rights (<a href="https://en.wikisource.org/wiki/Universal_Declaration_of_Human_Rights" rel="nofollow">https://en.wikisource.org/wiki/Universal_Declaration_of_Huma...</a>) declares: "Everyone has the right to a standard of living adequate for the health and well-being of himself and of his family, including food, clothing, housing and medical care and necessary social services, and the right to security in the event of unemployment, sickness, disability, widowhood, old age or other lack of livelihood in circumstances beyond his control".<p>UDHR is mostly aspirational - it is just a declaration with no enforcement mechanism (although there are a whole series of more binding treaties on specific issues under UDHR). The existence of UDHR does reveal what the international consensus is.<p>However, it is worth mentioning that positive rights are nominally obligations on the state - i.e. if people's positive rights aren't being met, it is a failure of the state in the same way as if the state infringes on their negative rights. It does not imply that every private individual needs to arbitrarily solve those failures as in your example.<p>So to answer your original question, according to widely accepted declarations of human rights, people are entitled to live in a society where they have the opportunity to obtain food and shelter (people who are able can be made to work for that food and shelter, but still have a right to food and shelter if they are disabled or unemployed for reasons outside their control).</p>
]]></description><pubDate>Wed, 31 Dec 2025 09:25:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=46442657</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=46442657</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46442657</guid></item><item><title><![CDATA[New comment by A1kmm in "Waymo halts service during S.F. blackout after causing traffic jams"]]></title><description><![CDATA[
<p>In many versions of road rules (I don't know about California), having four vehicles stopped at an intersection without one of the four lanes having priority creates a dining philosophers deadlock, where all four vehicles are giving way to others.<p>Human drivers can use hand signals to resolve it, but self-driven vehicles may struggle, especially if all four lanes happens to have a self-driven vehicle arrive. Potentially if all vehicles are coordinated by the same company, they can centrally coordinate out-of-band to avoid the deadlock. It becomes even more complex if there are a mix of cars coordinated by different companies.</p>
]]></description><pubDate>Sun, 21 Dec 2025 10:21:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=46343772</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=46343772</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46343772</guid></item><item><title><![CDATA[New comment by A1kmm in "Stop crawling my HTML – use the API"]]></title><description><![CDATA[
<p>I think it's Jon Postel who was the original source of the principle (it's often called Postel's Law). <a href="https://www.rfc-editor.org/rfc/rfc761#section-2.10" rel="nofollow">https://www.rfc-editor.org/rfc/rfc761#section-2.10</a> is an example dating back to 1980.</p>
]]></description><pubDate>Sun, 14 Dec 2025 20:37:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46266628</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=46266628</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46266628</guid></item><item><title><![CDATA[New comment by A1kmm in "Therapeutic use of cannabis and cannabinoids: A review"]]></title><description><![CDATA[
<p>I believe ethanol is not actually often given as an antidote for methanol poisoning in modern times. It does work as a competitive inhibitor of alcohol dehydrogenase (i.e. occupying the enzyme to convert ethanol to acetaldehyde, slowing the conversion of methanol to formaldehyde and on to formic acid, which is not eliminated quickly and causes metabolic acidosis) - allowing the methanol time to leave the body through excretion, and limiting formic acid levels. However, other drugs like fomepizole also inhibit alcohol dehydrogenase with lower toxicity than ethanol.</p>
]]></description><pubDate>Sun, 14 Dec 2025 10:11:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=46262043</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=46262043</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46262043</guid></item><item><title><![CDATA[New comment by A1kmm in "'Source available' is not open source, and that's okay"]]></title><description><![CDATA[
<p>If the intent is to stop it being used for a business, that's inherently at odds with part of the OSI's definition: "The license must not restrict anyone from making use of the program in a specific field of endeavor. For example, it may not restrict the program from being used in a business, or from being used for genetic research".<p>Now technically maybe it could meet the OSD if it required a royalty for hosting the software as a SaaS product, instead of banning that - since it allows "free redistribution", and passes on the same right to anyone receiving it (it is defined in terms of prohibitions on what the licence can restrict, and there is no restriction on charging a set amount for use unless that requires executing a separate licence agreement).<p>Now arguably this is a deficiency in the OSD. But I imagine if you tried to exploit that, they might just update the definition and/or decline to list your licence.</p>
]]></description><pubDate>Wed, 10 Dec 2025 08:42:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=46215484</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=46215484</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46215484</guid></item><item><title><![CDATA[New comment by A1kmm in "The internet is no longer a safe haven"]]></title><description><![CDATA[
<p>It might be easier to block by ASN rather than hard-coding IP ranges. Something as simple as this in cron every 24 hours will help (adjust the ASNs in the bzgrep to your taste - and couple with occasional persistence so you don't get hit every reboot):<p>TEMPDIR=$(mktemp -d)<p>trap 'rm -r "$TEMPDIR"' EXIT<p>curl <a href="https://archive.routeviews.org/oix-route-views/oix-full-snapshot-latest.dat.bz2" rel="nofollow">https://archive.routeviews.org/oix-route-views/oix-full-snap...</a> -Lo "$TEMPDIR/snapshot.bz2"<p>bzgrep -e " (15828|213035|400377|399471|210654|46573|211252|62904|135542|132372|36352|209641|7552|36352|12876|53667|138608|150393|60781|138607) i" $TEMPDIR/snapshot.bz2 | cut -d" " -f 3 | sort | uniq > $TEMPDIR/badranges<p>iptables -N BAD_AS || true<p>iptables -D INPUT -j BAD_AS || true<p>iptables -A INPUT -j BAD_AS<p>iptables -F BAD_AS<p>for ROUTE in $(cat "$TEMPDIR/badranges"); do<p><pre><code>    iptables -A BAD_AS -s $ROUTE -j DROP;
</code></pre>
done</p>
]]></description><pubDate>Sun, 16 Nov 2025 21:25:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=45948542</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=45948542</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45948542</guid></item><item><title><![CDATA[New comment by A1kmm in "Using AI to negotiate a $195k hospital bill down to $33k"]]></title><description><![CDATA[
<p>One thing here doesn't seem right. I thought the whole thread that this was about them negotiating down how much the executor of a deceased estate would pay to one hospital making claims against it. But the thread included things like: "She had been afraid of being sent to collections and asked why we wouldn’t just take their counter-offer", which suggests a (mis)understanding that it is a personal debt of the sister's.<p>This suggests an 'AI can't see gorillas' problem here in that, during an AI-human interaction, identification of relevant big-picture context that a human advisor could have helped with is also missed.</p>
]]></description><pubDate>Tue, 28 Oct 2025 20:39:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=45738841</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=45738841</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45738841</guid></item><item><title><![CDATA[New comment by A1kmm in "Microsoft in court for allegedly misleading Australians over 365 subscriptions"]]></title><description><![CDATA[
<p>For only 100 GB, that's quite expensive storage. Compare for example Backblaze B2 at $7.20 / year / 100 GB. That is just the storage, so if you do lots of I/O it might increase - but if you aren't using exactly 100 GB and don't do much IO it might also be less than $7.20.</p>
]]></description><pubDate>Tue, 28 Oct 2025 10:46:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=45731215</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=45731215</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45731215</guid></item><item><title><![CDATA[New comment by A1kmm in "Britain's most tattooed man says UK's age check told him to "remove his face""]]></title><description><![CDATA[
<p>I've personally been unable to pass AI 'liveness' detection (which was a high-stress situation when it related to something my new employer asked me to do after I already resigned from my previous role) despite repeated attempts and all I have is alopecia areata affecting my eyelashes / eyebrows (a relatively common condition).<p>These models are discriminatory for a lot of people, I'd say, and shouldn't be allowed.</p>
]]></description><pubDate>Fri, 24 Oct 2025 09:45:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=45692760</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=45692760</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45692760</guid></item><item><title><![CDATA[New comment by A1kmm in "The Therac-25 Incident (2021)"]]></title><description><![CDATA[
<p>Not even close. Israel apparently has AI bombing target intel & selection systems called Gospel and Lavender - <a href="https://www.theguardian.com/world/2024/apr/03/israel-gaza-ai-database-hamas-airstrikes" rel="nofollow">https://www.theguardian.com/world/2024/apr/03/israel-gaza-ai...</a>. Claims are these systems have a selectivity of 90% per bombing, and they were willing to bomb up to 20 civilians per person classified by the system as a Hamas member. So assuming that is true, 90% of the time, they kill one Hamas member, and up to 20 innocents. 10% of the time, they kill up to 21 innocents and no Hamas members.<p>Killing 20 innocents and one Hamas member is not a bug - it is callous, but that's a policy decision and the software working as intended. But when it is a false positive (10% of the time), due to inadequate / outdated data and inadequate models, that could reasonably classified as a bug - so all 21 deaths for each of those bombings would count as deaths caused by a bug. Apparently (at least earlier versions) of Gospel were trained on positive examples that mean someone is a member of Hamas, but not on negative examples; other problems could be due to, for example, insufficient data, and interpolation outside the valid range (e.g. using pre-war data about, e.g. how quickly cell phones are traded, or people movements, when behaviour is different post-war).<p>I'd therefore estimate that deaths due to classification errors from those systems is likely in the thousands (out of the 60k+ Palestinian deaths in the conflict). Therac-25's bugs caused 6 deaths for comparison.</p>
]]></description><pubDate>Wed, 27 Aug 2025 09:16:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=45037179</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=45037179</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45037179</guid></item><item><title><![CDATA[New comment by A1kmm in "Why are anime catgirls blocking my access to the Linux kernel?"]]></title><description><![CDATA[
<p>It does work as long as the attesting authority doesn't allow issuing a new identity (before it expires) if the old one is lost.<p>You (Y) generate a keypair and send your public key to the the attesting authority A, and keep your private key. You get a certificate.<p>You visit site b.com, and it asks for your identity, so you hash b.com|yourprivatekey. You submit the hash to b.com, along with a ZKP that you possess a private key that makes the hash work out, and that the private key corresponds to the public key in the certificate, and that the certificate has a valid signature from A.<p>If you break the rules of b.com, b.com bans your hash. Also, they set a hard rate limit on how many requests per hash are allowed. You could technically sell your hash and proof, but a scraper would need to buy up lots of them to do scraping.<p>Now the downside is that if you go to A and say your private key was compromised, or you lost control of it - the answer has to be tough luck. In reality, the certificates would expire after a while, so you could get a new hash every 6 months or something (and circumvent the bans), and if you lost the key, you'd need to wait out the expiry. The alternative is a scheme where you and A share a secret key - but then they can calculate your hash and conspire with b.com to unmask you.</p>
]]></description><pubDate>Thu, 21 Aug 2025 11:59:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=44971656</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=44971656</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44971656</guid></item><item><title><![CDATA[New comment by A1kmm in "A privacy VPN you can verify"]]></title><description><![CDATA[
<p>And once a CPU is attacked with a voltage glitching type attack, the compromise is so complete that the secret seeds burned into the hardware are leaked.<p>Once they are leaked, there is no going back for that secret seed - i.e. that physical CPU. And this attack is entirely offline, so Intel doesn't know which CPUs have had their seeds leaked.<p>In other words, every time there is a vulnerability like this, no CPU affected can ever be trusted again for attestation purposes. That is rather impractical - so I'd consider even if you trust Intel (unlikely if you consider a government that can coerce Intel to be part of your threat model), SGX provides rather a weak guarantee against well-resourced adversaries (such as the US government).</p>
]]></description><pubDate>Sat, 16 Aug 2025 01:52:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=44919383</link><dc:creator>A1kmm</dc:creator><comments>https://news.ycombinator.com/item?id=44919383</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44919383</guid></item></channel></rss>