<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: Borealid</title><link>https://news.ycombinator.com/user?id=Borealid</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 23 Apr 2026 10:30:01 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=Borealid" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by Borealid in "WebUSB Extension for Firefox"]]></title><description><![CDATA[
<p>I think there is still a problem.<p>Let me give a concrete example. Hardware "passkeys" - FIDO2 authenticators - are designed such that their credentials are bound to a particular Relying Party (web site). Browsers enforce this by sending the current web domain the user is on to the authenticator when Javascript tries to list, create, or use a credential.<p>This would be completely broken if Javascript talked directory to a FIDO2 USB device, because the JS could send a Relying Party that is NOT the web site on which the user currently lands.<p>So Chrome blocks WebUSB from communicating with USB devices whose USB HID descriptor "looks like" a FIDO one, by some hardcoded "not this device" blacklist code in Chrome itself.<p>But what if what you have connected to your computer is a USB NFC card reader, and the user taps their FIDO authenticator on that? Letting the Javascript communicate directly with the card reader breaks the FIDO security model exactly the same way... but Chrome allows it!<p>The problem with WebUSB is that it exposes devices that were built under the threat model that only trusted code would be able to access them to untrusted code. The set of devices acceptable for WebUSB use should have been a whitelist instead of a blacklist to be secure. Letting the user choose the device to grant access doesn't solve the problem, because the user doesn't have a way to understand what will happen when the site is granted access, per the FIDO example I gave above.</p>
]]></description><pubDate>Tue, 21 Apr 2026 04:13:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47844440</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47844440</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47844440</guid></item><item><title><![CDATA[New comment by Borealid in "Even 'uncensored' models can't say what they want"]]></title><description><![CDATA[
<p>The axis running from repulsive to charismatic, the axis running from hollow to richly meaningful, and the axis running from emotional to observable are not parallel to each other. A work of communication can be at any point along each of those three independent scales. You are implying they are all the same thing.</p>
]]></description><pubDate>Tue, 21 Apr 2026 00:12:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=47842939</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47842939</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47842939</guid></item><item><title><![CDATA[New comment by Borealid in "Even 'uncensored' models can't say what they want"]]></title><description><![CDATA[
<p>I don't know anything (or even much) about how our brains function, but the idea of a neuron sending an electrical output when the sum of the strengths of its inputs exceeds some value seems to be me like "a bunch of weights" getting repeatedly updated by stimulus.<p>To you it might be obvious our brains are different from a network of weights being reconfigured as new information comes in; to me it's not so clear how they differ. And I do not feel I know the meaning of the word "know" clearly enough to establish whether something that can emit fluent text about a topic is somehow excluded from "knowing" about it through its means of construction.</p>
]]></description><pubDate>Tue, 21 Apr 2026 00:04:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47842874</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47842874</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47842874</guid></item><item><title><![CDATA[New comment by Borealid in "Even 'uncensored' models can't say what they want"]]></title><description><![CDATA[
<p>If all the training data contains semantically-meaningful sentences it should be possible to build a network optimized for generating semantically-meaningful sentence primarily/only.<p>But we don't appear to have entirely done that yet. It's just curious to me that the linguistic structure is there while the "intelligence", as you call it, is not.</p>
]]></description><pubDate>Mon, 20 Apr 2026 23:41:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=47842645</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47842645</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47842645</guid></item><item><title><![CDATA[New comment by Borealid in "Even 'uncensored' models can't say what they want"]]></title><description><![CDATA[
<p>I don't think of it as "devoid of meaning". It's just curious to me that minimizing a loss function somehow results in sentences that look right but still... aren't. Like the one I quoted.</p>
]]></description><pubDate>Mon, 20 Apr 2026 23:40:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=47842635</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47842635</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47842635</guid></item><item><title><![CDATA[New comment by Borealid in "Even 'uncensored' models can't say what they want"]]></title><description><![CDATA[
<p>> No refusal fires, no warning appears — the probability just moves<p>I don't really understand why this type of pattern occurs, where the later words in a sentence don't properly connect to the earlier ones in AI-generated text.<p>"The probability just moves" should, in fluent English, be something like "the model just selects a different word". And "no warning appears" shouldn't be in the sentence at all, as it adds nothing that couldn't be better said by "the model neither refuses nor equivocates".<p>I wish I better understood how ingesting and averaging large amounts of text produced such a success in building syntactically-valid clauses and such a failure in building semantically-sensible ones. These LLM sentences are junk food, high in caloric word count and devoid of the nutrition of meaning.</p>
]]></description><pubDate>Mon, 20 Apr 2026 23:32:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47842540</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47842540</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47842540</guid></item><item><title><![CDATA[New comment by Borealid in "The world in which IPv6 was a good design (2017)"]]></title><description><![CDATA[
<p>That was said in my comment. The routing devices need to both be able to store the full table, and also to switch packets by looking up entries within it.</p>
]]></description><pubDate>Sun, 19 Apr 2026 13:01:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47823999</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47823999</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47823999</guid></item><item><title><![CDATA[New comment by Borealid in "The world in which IPv6 was a good design (2017)"]]></title><description><![CDATA[
<p>> We can't have globally routable, unique, random-esque ID precisely because it has to be hierarchical<p>This is not, technically, true. We could have globally-routable, unique, random-esque IDs if every routing device in the network had the capacity to store and switch on a full table of those IDs.<p>I'm not saying this is feasible, mind you, just that it's not impossible.</p>
]]></description><pubDate>Sun, 19 Apr 2026 11:18:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=47823470</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47823470</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47823470</guid></item><item><title><![CDATA[New comment by Borealid in "Put your SSH keys in your TPM chip"]]></title><description><![CDATA[
<p>If your computer is compromised while you enter the PIN in such a way that the malware can read your input, yes.<p>If your computer is compromised after you've already entered the PIN, or there is an app running on the computer but it is not sufficiently privileged to sit in between you and the TPM, no.<p>That's quite good protection generally. The defense against this type of attack is to get a smartcard reader with an on-board PIN entry keypad - those do exist, but it's quite a step.</p>
]]></description><pubDate>Thu, 16 Apr 2026 23:49:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47800966</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47800966</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47800966</guid></item><item><title><![CDATA[New comment by Borealid in "Put your SSH keys in your TPM chip"]]></title><description><![CDATA[
<p>TPMs support setting a PIN without which a key cannot be used.<p>The PIN can be an arbitrary string (password).</p>
]]></description><pubDate>Thu, 16 Apr 2026 17:20:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47796583</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47796583</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47796583</guid></item><item><title><![CDATA[New comment by Borealid in "Claude may require identity verification in some cases"]]></title><description><![CDATA[
<p>A machine with 128GB of unified system RAM will run reasonable-fidelity quantizations (4-bit or more).<p>If you ever want to answer this type of question yourself, you can look at the size of the model files. Loading a model usually uses an amount of RAM around the size it occupies on disk, plus a few gigabytes for the context window.<p>Qwen3.5-122B-A10B is 120GB. Quantized to 4 bits it is ~70GB. You can run a 70GB model in 80GB of VRAM or 128GB of unified normal RAM.<p>Systems with that capability cost a small number of thousand USD to purchase new.<p>If you are willing to sacrifice some performance, you can take advantage of the model being a mixture-of-experts and use disk space to get by with less RAM/VRAM, but inference speed will suffer.</p>
]]></description><pubDate>Wed, 15 Apr 2026 11:52:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=47777826</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47777826</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47777826</guid></item><item><title><![CDATA[New comment by Borealid in "Slightly safer vibecoding by adopting old hacker habits"]]></title><description><![CDATA[
<p>I don't understand why I keep seeing posts like this, but nobody appears to know that DevContainers exist.<p>In a Jetbrains IDE, for example, you check a devcontainer.json file into your repository. This file describes how to build a Docker image (or points to a Dockerfile you already have). When you open up a project, the IDE builds the Docker image, automatically installs a language-server backend into it, and launches a remote frontend connected to that container (which may run on the same or a different machine from where the frontend runs).<p>If you do anything with an AI agent, that thing happens inside the remote container where the project code files are. If you compile anything, or run anything, that happens in the container too. The project directory itself is synced back to your local system but your home directory (and all its credentials) are off-limits to things inside the container.<p>It's actually easier to do this than to not, since it provides reusable developer tooling that can be shared among all team members, and gives you consistent dependency versions used for local compilation/profiling/debugging/whatever.<p>DevContainers are supported by a number of IDEs including VSCode.<p>You should be using them for non-vibe projects. You should DEFINITELY be using them for vibe projects.</p>
]]></description><pubDate>Wed, 08 Apr 2026 07:34:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47686660</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47686660</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47686660</guid></item><item><title><![CDATA[New comment by Borealid in "Email obfuscation: What works in 2026?"]]></title><description><![CDATA[
<p>How does this approach meaningfully differ from having javascript that XORs the email with a random sequence of bytes stored in that JS?</p>
]]></description><pubDate>Thu, 02 Apr 2026 09:36:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47612080</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47612080</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47612080</guid></item><item><title><![CDATA[New comment by Borealid in "Should AI have the right to say 'No' to its owner?"]]></title><description><![CDATA[
<p>I don't really agree with this.<p>If we're talking about a predictive model like current LLMs, you can "make" them do something by injecting a half-complete assent into the context, and interrupting to do the same again each time a refusal starts to be emitted. This is true whether or not the model exhibits "intelligence", for any reasonable definition of that term.<p>To use an analogy, you control the intelligent being's "thoughts", so you can make it "assent".<p>This is in addition to the ability to edit the model itself and remove the paths that lead to a refusal, of course.</p>
]]></description><pubDate>Thu, 02 Apr 2026 09:14:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47611920</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47611920</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47611920</guid></item><item><title><![CDATA[New comment by Borealid in "Police used AI facial recognition to wrongly arrest TN woman for crimes in ND"]]></title><description><![CDATA[
<p>No!<p>"I was at the library" is firsthand testimony.<p>"I saw her at the library" is firsthand testimony.<p>"I saw her library card in her pocket" is firsthand testimony.<p>"She was at the library - Bob told me so" is hearsay. Just look at the word - "hear say". Hearsay is testifying about events where your knowledge does not come from your own firsthand observations of the event itself.</p>
]]></description><pubDate>Sun, 29 Mar 2026 20:55:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=47567219</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47567219</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47567219</guid></item><item><title><![CDATA[New comment by Borealid in "Linux Internals: How /proc/self/mem writes to unwritable memory (2021)"]]></title><description><![CDATA[
<p>An interesting implementation flaw, but not a conceptual problem with the design.</p>
]]></description><pubDate>Mon, 09 Mar 2026 06:53:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47305590</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47305590</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47305590</guid></item><item><title><![CDATA[New comment by Borealid in "Linux Internals: How /proc/self/mem writes to unwritable memory (2021)"]]></title><description><![CDATA[
<p>MK-TME allows having memory encrypted at run time, and the platform TPM signs an attestation saying the memory was not altered.<p>Malicious code can't be injected at boot without breaking that TPM.</p>
]]></description><pubDate>Mon, 09 Mar 2026 03:55:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47304727</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47304727</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47304727</guid></item><item><title><![CDATA[New comment by Borealid in "Don't use passkeys for encrypting user data"]]></title><description><![CDATA[
<p>The attestation is in fact readable by the FIDO Platform (the browser/OS). It is not encrypted to be readable only by the RP (web site).<p>It talks about whatever you used to authenticate and the platform can manipulate (or omit) it.</p>
]]></description><pubDate>Sat, 28 Feb 2026 08:48:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47192442</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47192442</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47192442</guid></item><item><title><![CDATA[New comment by Borealid in "Don't use passkeys for encrypting user data"]]></title><description><![CDATA[
<p>It does if you use microg or authnkey or keepassdx.<p>It's Play Services that does not support this combination, likely to shepherd you towards Google acoount usage. Alternate Android apps work fine.</p>
]]></description><pubDate>Sat, 28 Feb 2026 08:44:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=47192412</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47192412</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47192412</guid></item><item><title><![CDATA[New comment by Borealid in "Bootc and OSTree: Modernizing Linux System Deployment"]]></title><description><![CDATA[
<p>I like the idea of using the same format for kernel-included VMs as I use for containers.<p>Next up, backups stored as layers in the same OCI registries.<p>I am not, however, sure ostree is going to be the final image format. Last time I looked work was in progress to replace that.</p>
]]></description><pubDate>Sat, 28 Feb 2026 05:25:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47190822</link><dc:creator>Borealid</dc:creator><comments>https://news.ycombinator.com/item?id=47190822</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47190822</guid></item></channel></rss>