<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: Darkstryder</title><link>https://news.ycombinator.com/user?id=Darkstryder</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 26 Apr 2026 09:59:43 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=Darkstryder" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by Darkstryder in "Apple's intentional crippling of Mobile Safari"]]></title><description><![CDATA[
<p>Damn. I never knew that way to search things. I used to do « Share / Search on this page » which was already obnoxious, which has now become « … » / « Share » / « Search on this page ».<p>Either I’m dumb or there is a discoverability problem with all these features. Probably a bit of both.</p>
]]></description><pubDate>Sun, 22 Mar 2026 16:13:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47479009</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=47479009</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47479009</guid></item><item><title><![CDATA[New comment by Darkstryder in "Apple's intentional crippling of Mobile Safari"]]></title><description><![CDATA[
<p>As a daily Safari on iOS user, I don’t care about any of this, but since iOS 26 basic Safari features such as bookmarks and text search have become so buried deep underneath, they are basically unusable at this point.<p>It infuriates me a lot more than all the liquid glass stuff (on which I’m neutral overall).</p>
]]></description><pubDate>Sun, 22 Mar 2026 15:10:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47478333</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=47478333</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47478333</guid></item><item><title><![CDATA[New comment by Darkstryder in "Terence Tao, at 8 years old (1984) [pdf]"]]></title><description><![CDATA[
<p>As a father of an 8 years old, this is very moving.<p>While Terence is -without a doubt- born with prodigious abilities, I think credit should also be given to his parents Billy and Grace who seem to have managed to simultaneously nurture these special abilities while still letting Terence have a happy (?) childhood. This is not easy to do.</p>
]]></description><pubDate>Tue, 24 Feb 2026 06:40:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47133632</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=47133632</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47133632</guid></item><item><title><![CDATA[Poll: Do you use RSS in 2026?]]></title><description><![CDATA[

<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46607492">https://news.ycombinator.com/item?id=46607492</a></p>
<p>Points: 4</p>
<p># Comments: 3</p>
]]></description><pubDate>Tue, 13 Jan 2026 20:33:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=46607492</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=46607492</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46607492</guid></item><item><title><![CDATA[New comment by Darkstryder in "Reproducibility project fails to validate dozens of biomedical studies"]]></title><description><![CDATA[
<p>A dream of mine was that in order to get a PhD, you would not have to publish original research, but instead you would have to _reproduce existing research_. This would bring the PhD student to the state of the art in a different way, and it would create a natural replication process for current research. Your thesis would be about your replication efforts, what was reproducible and what was not, etc.<p>And then, once you got your PhD, only then you would be expected to publish new, original research.</p>
]]></description><pubDate>Fri, 25 Apr 2025 19:22:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=43797627</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=43797627</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43797627</guid></item><item><title><![CDATA[New comment by Darkstryder in "Why Triplebyte Failed"]]></title><description><![CDATA[
<p>I am not very familiar with Triplebyte but I really appreciated this (seemingly) candid yet lucid writeup about how it was all went down from the inside.<p>These kind of insider perspectives, even if they come with their own biases, are very interesting nevertheless.<p>I wish I would see these types of articles more often.</p>
]]></description><pubDate>Mon, 10 Jun 2024 19:17:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=40637438</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=40637438</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40637438</guid></item><item><title><![CDATA[New comment by Darkstryder in "Backpressure explained – the resisted flow of data through software (2019)"]]></title><description><![CDATA[
<p>To avoid something called the thundering herd problem: <a href="https://en.m.wikipedia.org/wiki/Thundering_herd_problem" rel="nofollow">https://en.m.wikipedia.org/wiki/Thundering_herd_problem</a><p>For instance, a bunch of clients all make a request to a server at the same time, briefly saturating the server. If all the clients have the same timeout without jitter, they will all try again together at the same time once the timeout expires, saturating the server again and again. Jitter helps by « spreading » those clients in time, thus « diluting » the server load. The server can then process these requests without saturating.</p>
]]></description><pubDate>Wed, 27 Mar 2024 12:57:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=39838453</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=39838453</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39838453</guid></item><item><title><![CDATA[New comment by Darkstryder in "Backpressure explained – the resisted flow of data through software (2019)"]]></title><description><![CDATA[
<p>LIFO queues with a timeout, and a retry after an exponential backoff with jitter is/was kind of standard for implementing queues at Google. More info in the Google SRE book: <a href="https://sre.google/sre-book/addressing-cascading-failures/#xref_cascading-failure_load-shed-graceful-degredation" rel="nofollow">https://sre.google/sre-book/addressing-cascading-failures/#x...</a></p>
]]></description><pubDate>Wed, 27 Mar 2024 09:32:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=39837036</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=39837036</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39837036</guid></item><item><title><![CDATA[New comment by Darkstryder in "Build System Schism: The Curse of Meta Build Systems"]]></title><description><![CDATA[
<p>> Say you add a new source file. Wouldn’t it be great if your build system just picked it up?<p>> Alas, it cannot; the list of stuff to build is passed from the meta build system to the build system, usually by fiat.<p>It can, actually. At least for make. Just use a wildcard in uour rules: <a href="https://www.gnu.org/software/make/manual/make.html#Wildcards" rel="nofollow">https://www.gnu.org/software/make/manual/make.html#Wildcards</a><p>I highly recommend going through the make documentation at least once in your career. Per the lindy effect, as it has been around for 40 years, it has a decent chance of sticking around for another 40.</p>
]]></description><pubDate>Tue, 19 Mar 2024 18:16:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=39758681</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=39758681</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39758681</guid></item><item><title><![CDATA[New comment by Darkstryder in "How (not) to apply for a software job"]]></title><description><![CDATA[
<p>To me, a good cover letter is about being actually motivated to apply to a specific job and then simply explaining why.<p>AI doesn’t help because if you can articulate your genuine motivation as a prompt for an AI, you should just use the prompt as the cover letter which will be a lot more effective than using the AI-generated letter, as the AI will muddy your authentic motivation and diminish its impact.</p>
]]></description><pubDate>Tue, 26 Sep 2023 09:21:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=37656589</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=37656589</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37656589</guid></item><item><title><![CDATA[New comment by Darkstryder in "Dancing is stupid"]]></title><description><![CDATA[
<p>> I’ve never heard of a family being divided because its members dance different styles, but I am in one divided by political and religious opinions.<p>Being a dancer (lindy hop) with a large number of dancers in my social circle, dancing is actually a frequent source of tension among many couples around me.<p>Couples splitting up because one is heavily more invested in dancing than the other is a common occurence.<p>And don’t get me started on lindy hop vs west coast swing.</p>
]]></description><pubDate>Sun, 19 Feb 2023 13:41:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=34857468</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=34857468</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34857468</guid></item><item><title><![CDATA[New comment by Darkstryder in "Better than Free (2008)"]]></title><description><![CDATA[
<p>To me, Internet's permanentness should be treated according to Murphy's law: you should plan for everything you wish would go down to stay up indefinitely and everything you wish would stay up to go down at some point.</p>
]]></description><pubDate>Mon, 06 Feb 2023 20:31:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=34683887</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=34683887</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34683887</guid></item><item><title><![CDATA[New comment by Darkstryder in "Ask HN: Is Vim still worth learning?"]]></title><description><![CDATA[
<p>Vim is available on a lot of Windows machines through WSL. I agree this would not be my go-to editor on Windows though.</p>
]]></description><pubDate>Tue, 13 Dec 2022 12:23:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=33967949</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=33967949</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33967949</guid></item><item><title><![CDATA[New comment by Darkstryder in "Ask HN: Is Vim still worth learning?"]]></title><description><![CDATA[
<p>Vim is basically the only editor you can safely assume to be available on any machine you’ll ever interact with. In my opinion, this fact makes it a requirement for virtually any developer to be able to confidently use vim during a production incident to, say, fix a broken config file while being connected to the machine through (multiple hops of) SSH, without any ability to use your editor of choice.<p>Once this basic-but-crucial skill level is mastered, using vim more proficientely as a daily driver is entirely a matter of taste. Personally I prefer using a fully-fledged IDE for anything that goes beyond a simple script.</p>
]]></description><pubDate>Tue, 13 Dec 2022 11:42:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=33967546</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=33967546</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33967546</guid></item><item><title><![CDATA[New comment by Darkstryder in "More than 1B young people are at risk for hearing loss"]]></title><description><![CDATA[
<p>Back in 2014 I was doing music production semi-professionaly for almost a decade. I tried out a brand new pair of headphones, and after an evening of listening to loud music with them, I put them down and heard a continuous blip.<p>I got (probably lifelong) tinnitus and hyperacusis that day and it never went fully away.<p>I basically stopped a passion I had since being a teenager because of this injury.<p>Be careful with your ears, folks.</p>
]]></description><pubDate>Wed, 16 Nov 2022 10:30:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=33621062</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=33621062</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33621062</guid></item><item><title><![CDATA[New comment by Darkstryder in "The image in this post displays its own MD5 hash"]]></title><description><![CDATA[
<p>One last comment though: I didn’t realize you were the author of the post (great work!!). This let me think you know your stuff, and you know something that I don’t and I need to think of all of that more carefully. So it is very probable you are right and I am wrong. Thanks for the discussion!</p>
]]></description><pubDate>Sat, 24 Sep 2022 12:47:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=32962037</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=32962037</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32962037</guid></item><item><title><![CDATA[New comment by Darkstryder in "The image in this post displays its own MD5 hash"]]></title><description><![CDATA[
<p>Again, the idea is not to find a specific hash value, but any $hash for which the property md5($manifest_content, $hash, $random_bytes) = $hash is true. You don’t need to match a specific hash value.<p>And you never answered how this manifest is somehow different than the self-referential png.<p>It seems we do not understand each other (unfortunately HN comments are not the best avenue for deep discussions) so this will be my last post on this thread as we both have better things to do than talking past each other.</p>
]]></description><pubDate>Sat, 24 Sep 2022 11:57:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=32961685</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=32961685</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32961685</guid></item><item><title><![CDATA[New comment by Darkstryder in "The image in this post displays its own MD5 hash"]]></title><description><![CDATA[
<p>This is indeed a preimage attack <i>if</i> the manifest content (besides its own self-referenced hash) is fixed. However this is not the case in practice: to pull off this trick you could just append some random bytes at the end of the manifest, disguised as ASCII art or something like that. The manifest would still be human readable and correct, but this would become a collision attack.<p>Again, to me this is the exact same problem as this self-referential PNG file, which is a very cool trick but which can be (demonstrably) computed with limited compute resources.</p>
]]></description><pubDate>Sat, 24 Sep 2022 11:10:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=32961448</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=32961448</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32961448</guid></item><item><title><![CDATA[New comment by Darkstryder in "The image in this post displays its own MD5 hash"]]></title><description><![CDATA[
<p>You do want to change the MD5 of the manifest. This is what makes it a collision attack instead of a preimage attack.</p>
]]></description><pubDate>Sat, 24 Sep 2022 10:39:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=32961310</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=32961310</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32961310</guid></item><item><title><![CDATA[New comment by Darkstryder in "The image in this post displays its own MD5 hash"]]></title><description><![CDATA[
<p>I don’t understand how this is  a pre-image attack, as the manifest file only references itself (and not the zip file) and you can fiddle with the manifest file to your liking. To me this is the same theoretical problem as this self-referencing PNG file.</p>
]]></description><pubDate>Sat, 24 Sep 2022 09:38:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=32961042</link><dc:creator>Darkstryder</dc:creator><comments>https://news.ycombinator.com/item?id=32961042</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32961042</guid></item></channel></rss>