<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: Confiks</title><link>https://news.ycombinator.com/user?id=Confiks</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 23 May 2026 01:58:22 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=Confiks" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by Confiks in "Indexing a year of video locally on a 2021 MacBook with Gemma4-31B (50GB swap)"]]></title><description><![CDATA[
<p>I'm not quite sure why all that swapping is necessary. I really does age your SSD quite fast considering the enormous memory bandwidth required. Gemma 4 31B at 4-bit quantization should only be around 19 GiB [1], not 28.4 GiB. I'm not feeding it images regularly, so I'm not sure how much  memory it needs to get those into context, but I can't imagine it is more than 10 GiB.<p>The activity monitor does show all kinds of Electron apps active, on top of a presumably model-loaded Handy and a virtual machine for Claude Code, so I guess that's the real root cause for all the swapping. If your laptop starts trashing I can't imagine you have any use for those apps, which will grind to a halt.<p>[1] <a href="https://huggingface.co/mlx-community/gemma-4-31b-it-4bit" rel="nofollow">https://huggingface.co/mlx-community/gemma-4-31b-it-4bit</a></p>
]]></description><pubDate>Thu, 21 May 2026 20:26:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=48228440</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=48228440</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48228440</guid></item><item><title><![CDATA[New comment by Confiks in "An update on recent Claude Code quality reports"]]></title><description><![CDATA[
<p>So you made this change completely invisible to the user, without the user being able to choose between the two behaviors, and without even documenting it in the (extremely verbose) changelog [1]? I can't find it, the Docs Assistant can't find it (well, it "I found it!" three times being fed your reply with a non-matching item).<p>I frequently debug issues while keeping my carefully curated but long context active for days. Losing potentially very important context while in the middle of a debugging session resulting in less optimal answers, is costing me a lot more money than the cache misses would.<p>In my eyes, Claude Code is mainly a <i>context management tool</i>. I build a foundation of apparent understanding of the problem domain, and then try to work towards a solution in a dialogue. Now you tell me Anthrophic has been silently breaking down that foundation without telling me, wasting potentially hours of my time.<p>It's a clear reminder that these closed-source harnesses cannot be trusted (now or in the future), and I should find proper alternatives for Claude Code as soon as possible.<p>[1] <a href="https://code.claude.com/docs/en/changelog" rel="nofollow">https://code.claude.com/docs/en/changelog</a></p>
]]></description><pubDate>Fri, 24 Apr 2026 01:32:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=47884453</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=47884453</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47884453</guid></item><item><title><![CDATA[New comment by Confiks in "Codex Hacked a Samsung TV"]]></title><description><![CDATA[
<p>I recently bought a second hand eight year old 4K LG TV. Pretty cheap too. All models running webOS 3.x and 4.x are trivially rootable as LG never provided an update against DejaVul [1]. There's a handy website to check which models are rootable [2]. You can write directly to the (old!) Wayland socket; haven't tried a libwayland yet that is compatible.<p>IIRC the last public exploit for all LG TVs for webOS > 5 was in the beginning of 2025 (so pretty recent), but as most sellers on the second hand market have auto-updates turned on, there's no way to know which TVs are vulnerable.<p>It should be doable to strip down much of webOS with root access. It's nice that webOS in general is very well documented and much is implemented around the Luna service bus. LG offers a developer mode for non-rooted TVs, and there's an active homebrew community because of it. It's a pity that you can't modify the boot partitions, as the firmware verifies their integrity. It would be nice to have an exploit for that.<p>[1] <a href="https://github.com/throwaway96/dejavuln-autoroot" rel="nofollow">https://github.com/throwaway96/dejavuln-autoroot</a><p>[2] <a href="https://cani.rootmy.tv" rel="nofollow">https://cani.rootmy.tv</a></p>
]]></description><pubDate>Thu, 16 Apr 2026 23:02:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47800633</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=47800633</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47800633</guid></item><item><title><![CDATA[New comment by Confiks in "Backblaze has stopped backing up your data"]]></title><description><![CDATA[
<p>Not restricted to Apple, but TIL: Double-clicking on a word an keeping the second click pressed, then dragging, allows you to select per word instead of per character.</p>
]]></description><pubDate>Tue, 14 Apr 2026 13:17:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47765273</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=47765273</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47765273</guid></item><item><title><![CDATA[New comment by Confiks in "I ran Gemma 4 as a local model in Codex CLI"]]></title><description><![CDATA[
<p>Get into a venv, and run:<p>> pip3 install git+<a href="https://github.com/ml-explore/mlx-lm.git" rel="nofollow">https://github.com/ml-explore/mlx-lm.git</a><p>> ./venv/bin/mlx_lm.generate --model "$MODEL" --temp 1.0 --top-p 0.95 --top-k 64 --max-tokens 128000 --prompt "Hello world"<p>Where $MODEL is an unsloth model like:<p>- unsloth/gemma-4-E4B-it-UD-MLX-4bit<p>- unsloth/gemma-4-26b-a4b-it-UD-MLX-4bit</p>
]]></description><pubDate>Tue, 14 Apr 2026 04:39:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47761308</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=47761308</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47761308</guid></item><item><title><![CDATA[New comment by Confiks in "I ran Gemma 4 as a local model in Codex CLI"]]></title><description><![CDATA[
<p>It is, as I'm running it; it has been added this week. As I said I'm running the main version from Github and doing nothing special, see: <a href="https://news.ycombinator.com/item?id=47761308">https://news.ycombinator.com/item?id=47761308</a></p>
]]></description><pubDate>Tue, 14 Apr 2026 04:36:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47761292</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=47761292</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47761292</guid></item><item><title><![CDATA[New comment by Confiks in "I ran Gemma 4 as a local model in Codex CLI"]]></title><description><![CDATA[
<p>> The same Gemma 4 MoE model (Q4)<p>As you have so much RAM I would suggest running Q8_0 directly. It's not slower (perhaps except for the initial model load), and might even be faster, while being almost identical in quality to the original model.<p>And just to be sure: you're are running the MLX version, right? The mlx-community quantization seemed to be broken when I tried it last week (it spit out garbage), so I downloaded the unsloth version instead. That too was broken in mlx-lm (it crashed), but has since been fixed on the main branch of <a href="https://github.com/ml-explore/mlx-lm" rel="nofollow">https://github.com/ml-explore/mlx-lm</a>.<p>I unfortunately only have 16 GiB of RAM on a Macbook M1, but I just tried to run the Q8_0 GGUF version on a 2023 AMD Framework 13 with 64 GiB RAM just using the CPU, and that works surprisingly well with tokens/s much faster than I can read the output. The prompt cache is also very useful to quickly insert a large system prompt or file to datamine although there are probably better ways to do that instead of manually through a script.</p>
]]></description><pubDate>Mon, 13 Apr 2026 09:11:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47749577</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=47749577</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47749577</guid></item><item><title><![CDATA[New comment by Confiks in "Solar panels at Lidl? Plug-in versions set to appear in shops"]]></title><description><![CDATA[
<p>Not necessarily, but most inverters (in Europe, at least) aren't designed to function without a grid anyway.<p>Some models of inverter brands like Victron (which isn't very common outside its niche of self-sufficiency because they are rather expensive and sometimes complex) can form a micro-grid. They have the option of a special circuit breaker [1] that decouples the inverter from the grid if the grid is detected to be down, which allows their use during a power outage.<p>[1] <a href="https://www.victronenergy.com/accessories/anti-islanding-box-63a#about-product" rel="nofollow">https://www.victronenergy.com/accessories/anti-islanding-box...</a></p>
]]></description><pubDate>Wed, 01 Apr 2026 14:15:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47601218</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=47601218</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47601218</guid></item><item><title><![CDATA[New comment by Confiks in "Office.eu launches as Europe's sovereign office platform"]]></title><description><![CDATA[
<p>You say "tax money", but this project isn't a government project or using public money at all. As for contributing back to Nextcloud: there is a long list of Nextcloud partners [1] that contractually obligated themselves to contribute back to Nextcloud for every user they onboard. The company in this article has not.<p>[1] <a href="https://nextcloud.com/partners/" rel="nofollow">https://nextcloud.com/partners/</a></p>
]]></description><pubDate>Sun, 15 Mar 2026 19:52:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47391182</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=47391182</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47391182</guid></item><item><title><![CDATA[New comment by Confiks in "Office.eu launches as Europe's sovereign office platform"]]></title><description><![CDATA[
<p>This is just a Nextcloud rebrand with a confusing domain name. It claims "Core is [100%] Open Source" but no source code is provided beyond what's already available in the upstream projects, and it's unlikely that there will be (as this happens a lot). It's a one-man project without a track record or certifications based out of a shared office space [1].<p>And don't get me wrong: there's nothing wrong with starting a business rebranding Nextcloud and keeping your development closed source, as long as you're honest about that, which this initiative is not.<p>If you're looking for a Nextcloud hoster, there's a long list of partners here [2] that have contractually obligated themselves to contribute back to Nextcloud for every user they onboard.<p>[1] <a href="https://blog.tomaszdunia.pl/officeeu-eng/" rel="nofollow">https://blog.tomaszdunia.pl/officeeu-eng/</a><p>[2] <a href="https://nextcloud.com/partners/" rel="nofollow">https://nextcloud.com/partners/</a></p>
]]></description><pubDate>Sun, 15 Mar 2026 19:47:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47391142</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=47391142</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47391142</guid></item><item><title><![CDATA[Dabao Evaluation Board Risks and Challenges]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.crowdsupply.com/baochip/dabao#risks-challenges">https://www.crowdsupply.com/baochip/dabao#risks-challenges</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47223610">https://news.ycombinator.com/item?id=47223610</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 02 Mar 2026 20:29:54 +0000</pubDate><link>https://www.crowdsupply.com/baochip/dabao#risks-challenges</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=47223610</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47223610</guid></item><item><title><![CDATA[New comment by Confiks in "The Age Verification Trap: Verifying age undermines everyone's data protection"]]></title><description><![CDATA[
<p>> That is not true and "true zero knowledge ID check" + "age verification" with blind signatures is what's being implemented by the EU ID project.<p>You are mistaken. In the EUDI wallet project, unlinkable signature schemes are currently being discussed among cryptographers and a month ago Longfellow very basic support for Longfellow has been merged into the reference wallet.<p>You're making it seem that unlinkable signatures are very established and the default, while they are not. They're not yet properly defined, experimental and mostly unimplemented by member states. Linkable ECDSA signature are currently the default in the EUDI wallet project.</p>
]]></description><pubDate>Wed, 25 Feb 2026 00:00:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47145356</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=47145356</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47145356</guid></item><item><title><![CDATA[New comment by Confiks in "The Age Verification Trap: Verifying age undermines everyone's data protection"]]></title><description><![CDATA[
<p>> This whole end-to-end attestation with play integrity is supposed to make setting up token-as-a-service things impractical.<p>Indeed according to some (i.e. the Commission) it's supposed to, but they should know better. And many member state wallet developers do know better.<p>Play Integrity can easily be bypassed unless you want to exclude a very large amount of users – especially disadvantaged people using older phones – because there are many vulnerable phones in use by those users, and you only need one to build such an age attribute faucet.<p>See also this comment: <a href="https://news.ycombinator.com/item?id=45363853">https://news.ycombinator.com/item?id=45363853</a></p>
]]></description><pubDate>Tue, 24 Feb 2026 23:35:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47145099</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=47145099</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47145099</guid></item><item><title><![CDATA[New comment by Confiks in "The Age Verification Trap: Verifying age undermines everyone's data protection"]]></title><description><![CDATA[
<p>> This is the fallback mechanism. You are supposed to use bbs+ signatures that are zero knowledge, are computed on the device and so on.<p>You're mistaken. SD-JWT with linkable ECDSA signature is the <i>main</i> mechanism. An unlinkable signature scheme is being discussed on the fringes of the EUDI-project (whether it be BBS+ or Longfellow) and very bare-bones support for Longfellow has been added to the reference wallet a month ago. However the Implementing Acts have no support for such a mechanism yet, and most member states will only implement ECDSA based mechanisms (SD-JWT and ISO 18013) for the foreseeable future.<p>It's therefore very likely the EUDI wallet and/or a age verification solutions will launch with issuer linkable ("easily trackable") signatures.<p>See also this thread: <a href="https://news.ycombinator.com/item?id=45363275">https://news.ycombinator.com/item?id=45363275</a></p>
]]></description><pubDate>Tue, 24 Feb 2026 23:29:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47145034</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=47145034</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47145034</guid></item><item><title><![CDATA[New comment by Confiks in "I made 20 GDPR deletion requests. 12 were ignored"]]></title><description><![CDATA[
<p>As the DPA indeed doesn't function for these kinds of cases, it's also possible to involve the courts and get a legal remedy (i.e. sue them). In The Netherlands that's possible with a 'complaint procedure' in the case of GDPR rights, which is more forgiving on the process (it starts with a not-too-formal letter to the court instead of a summons) and allows for representing yourself. Maximum costs would be somewhere around € 2500 if you lose, € 0 if you win (disregarding all the work and effort that cannot be recouped).<p>Of course this really isn't something you'd want to do for these kinds of simple cases. But threatening to do so often goes pretty far. The court in the country of the data subject has jurisdiction, so any company operating from another country would need to defend themselves abroad, which can be a strong incentive to cooperate or settle the case.<p>I've gotten results for GPDR article 20 requests (data portability) multiple times after some strongly worded letters (Spotify [1], NLZiet, AliveCor and Albert Heijn), and have gone to court twice. Once won against Eneco (although that was only about court fees they didn't want to pay without an NDA), and once didn't lose but regrettably didn't win on a quite complicated case against ABN AMRO in which the court just didn't understand what machine readable means despite the clear guidelines by the EDPD.<p>[1] <a href="https://news.ycombinator.com/item?id=24764371">https://news.ycombinator.com/item?id=24764371</a></p>
]]></description><pubDate>Tue, 03 Feb 2026 23:53:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46879226</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=46879226</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46879226</guid></item><item><title><![CDATA[New comment by Confiks in "Parliament tells Dutch government to keep DigiD data out of American hands"]]></title><description><![CDATA[
<p>Solvinity (now acquired by Kyndryl) owns and runs a lot of the underlying infrastructure of DigiD, but the application itself and the day-to-day operations are handled by an autonomous body of the government (Logius). DigiD is mainly about translating authentication factors into a social security number (BSN) for authentication to other public institutions.<p>That allows Logius to pretend it's not much of a problem, and Solvinity maintains (in an unusually sharp and on-point interview) that all data is "encrypted" [1], without mentioning who possesses the keys or whether encryption is relevant at all. They go on to say that they consider the scenario of the US shutting down DigiD "very hypothetical", that they will follow Dutch law and that they have a strong supervisory board (as if that would matter).<p>Logius also operates MijnOverheid, which collates very sensitive information about all citizens from most government agencies and also relies on Solvinity infrastructure.<p>The infrastructure that Solvinity maintains goes far beyond servers, as they've concocted themselves an unholy procurement mess with their PICARD / LPC solution (Logius Private Cloud). They were advised multiple times over multiple years by the main advisory body on IT of The Netherlands (AcICT) not to do it in this way and KISS, but then did it anyway.<p>The intent of structuring it in this way was that it would be easier to switch infrastructure providers, but the outcome is the exact opposite: there is now a non-standard "integration layer" that would need to be rebuilt. Which is exactly what AcICT warned about from the beginning.<p>You can find a diagram of the responsibilities on both the Solvinity and Logius side on the last page of [2] (in Dutch).<p>The wild thing is that Logius also owns and maintains "Standaard Platform" [3], which is a very neat and standard Kubernetes environment, but they declined to use this for DigiD and MijnOverheid because they didn't deem it secure enough, and instead of securing their Kubernetes deployment, they went on with PICARD / LPC.<p>Logius is an autonomous body of the Ministry of the Interior (BZK), but they appear to have completely lost control over setting any policy and now mainly walk from crisis to crisis because any opening on their "SAFe train" is years away.<p>[1] <a href="https://www.nrc.nl/nieuws/2025/12/03/baas-van-solvinity-probeert-zorgen-rond-digid-weg-te-nemen-digid-is-en-blijft-nederlands-en-het-blijft-veilig-a4914246" rel="nofollow">https://www.nrc.nl/nieuws/2025/12/03/baas-van-solvinity-prob...</a><p>[2] <a href="https://www.adviescollegeicttoetsing.nl/site/binaries/site-content/collections/documents/2023/04/12/advies-logius-ict-infrastructuur/Advies+Logius+ICT-infrastructuur.pdf" rel="nofollow">https://www.adviescollegeicttoetsing.nl/site/binaries/site-c...</a><p>[3] <a href="https://www.logius.nl/onze-dienstverlening/infrastructuur/standaard-platform" rel="nofollow">https://www.logius.nl/onze-dienstverlening/infrastructuur/st...</a></p>
]]></description><pubDate>Wed, 21 Jan 2026 12:07:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=46704515</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=46704515</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46704515</guid></item><item><title><![CDATA[New comment by Confiks in "EU age verification app not planning desktop support"]]></title><description><![CDATA[
<p>> So given that the current spec is not in use, this seems incorrect.<p>No, that's not what they mean. They just mean that the spec (and for now only the spec, not the implementation) will be amended with an experimental feature, while the implementation will not (yet).<p>I understand (?) that you are interpreting this as: "we'll later document something that we've already implemented", but this is not the case. That isn't how this project operates, and I'm intimately familiar with the codebase so I'm completely certain they haven't implemented this at all. There is no beginning or even a stub for this feature to land, which is problematic, as an unlinkable signature scheme isn't just a drop-in replacement, but requires careful design. Hence privacy by design.<p>> If you have a key with the attribute of course you can 'bypass' it, I don't think that's bug.<p>Anyone of age can make an anonymous age attribute faucet [1] for anyone to use. That it's not technically a bug doesn't make it any less trivial to circumvent. I wouldn't expect the public or even the Commission to make such a distinction. They'll clamor that the solution is broken and that it must be fixed, and at that point I expect the obfuscation and weakening of privacy features to start.<p>So as we already know that the solution will be trivial to circumvent, it shouldn't be released without at least very clearly and publicly announcing it's limitations. Only if such expectations are correctly set, we have a chance not to end up in a cycle where the open source and privacy story will be abandoned in the name of security.<p>[1] Because of the linkable signature scheme in principle misuse can be detected by issuers, but this would be in direct contradiction with their privacy claims (namely that the issuer pinky promises not to record any issued credentials or signatures).</p>
]]></description><pubDate>Wed, 24 Sep 2025 18:02:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=45363853</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=45363853</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45363853</guid></item><item><title><![CDATA[New comment by Confiks in "EU age verification app not planning desktop support"]]></title><description><![CDATA[
<p>> The insane question here is, why would the EU mandate hardware attestation controlled by two private American companies in order to access services?<p>Please (kindly) ask Paolo De Rosa [1], Policy Officer at the European Commission and driver of many of the decisions behind the wallet and the ARF. His position is one of fatalism: that it's "too late"; the duopoly of Goople is entrenched, and it's therefore not a problem if the wallet project entrenches it even further. Regrettably quite a lot of member states agree, although representatives of France and Germany specifically are frequently standing up to the fatalism.<p>[1] <a href="https://github.com/paolo-de-rosa" rel="nofollow">https://github.com/paolo-de-rosa</a></p>
]]></description><pubDate>Wed, 24 Sep 2025 17:39:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=45363553</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=45363553</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45363553</guid></item><item><title><![CDATA[New comment by Confiks in "EU age verification app not planning desktop support"]]></title><description><![CDATA[
<p>> a lot of people are confused about the project<p>This is misleading. They are merely <i>exploring</i> options that may allow for issuer unlinkability, but they are actually implementing a linkable solution based on standard cryptography that allows issuers (member state governments) to collude with any verifier (a website requiring age verification) to de-anonymize users. The solution is linkable because both the issuer and the verifier see the same identifiers (the SD-JWT and its signature).<p>The project is supposed to prove that age verification is viable so that the Commission can use it as a success story, while it completely disregards privacy by design principles in its implementation. That the project intends to perhaps at some point implement privacy enhancing technologies doesn't make it any better. Nothing is more permanent than a temporary solution.<p>It will also be trivial to circumvent [1], potentially leading to a cycle of obfuscation and weakening of privacy features that are present in the current issuer linkable design.<p>[1] <a href="https://news.ycombinator.com/item?id=44458323">https://news.ycombinator.com/item?id=44458323</a></p>
]]></description><pubDate>Wed, 24 Sep 2025 17:16:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=45363275</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=45363275</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45363275</guid></item><item><title><![CDATA[New comment by Confiks in "Class-action suit claims Otter AI records private work conversations"]]></title><description><![CDATA[
<p>And out of nowhere, after posting this comment, Otter.ai now has responded after ghosting me for 3,5 weeks. They are no longer quoting the CCPA, but now are misinterpreting the GDPR and claim that every user is their own little GDPR data controller island and they're merely a "hosting platform". It's all very convenient and creative.<p>Their response:<p><pre><code>    Thank you for reaching out to Otter.ai. Under Articles 12 and 17 of the GDPR, Otter.ai is able to delete personal data that is stored in and controlled by your own account. However, Otter.ai cannot delete personal data that is stored in another user’s account. In those cases, Otter.ai acts as the processor or hosting platform, and the other user is the controller for that content. As such, only that account holder has the authority to remove the content.

    If you wish to have such data deleted, we recommend that you contact the relevant user directly and exercise your rights under the GDPR with them.

    Thank you,
    Otter.ai Privacy Team
</code></pre>
To which I responded:<p><pre><code>    To whom am I speaking? Is this the Privacy Officer? Why have you been ignoring emails for 3,5 weeks since the 23rd of July, while a GDPR request was filed on the 8th of July?

    You know very well that a meeting agent of Otter.ai, the emails by Otter.ai and the website of Otter.ai fall under the direct responsibility of Otter.ai as data controller. Your privacy statement in no way supports a narrative that Otter.ai would act as a so called "hosting platform". It's preposterous to suggest that every one of your users – not being a company but a private person – would be it's own little GDPR data controller island and you're merely an accidental processor of data. Jurisprudence is very clear on this and this notion will be outright rejected.

    The deadline has long passed, I'm initiating a court procedure this week.

    Hoogachtend,</code></pre></p>
]]></description><pubDate>Mon, 18 Aug 2025 22:00:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=44945777</link><dc:creator>Confiks</dc:creator><comments>https://news.ycombinator.com/item?id=44945777</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44945777</guid></item></channel></rss>