<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: Eli_P</title><link>https://news.ycombinator.com/user?id=Eli_P</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 03 May 2026 21:33:41 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=Eli_P" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by Eli_P in "There is little chance CRISPR will ever be widely used to directly treat disease"]]></title><description><![CDATA[
<p>> editing it on a computer, and then "printing" it back out to a DNA molecule<p>That's kind of what Novavax claims, search for the interview with David Rubinstein on WEF. NVAX wants to print short fragments of virus's proteins, so the resulting vaccines supposed to be safer than those made by working with live viruses.</p>
]]></description><pubDate>Sun, 15 Nov 2020 10:30:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=25099971</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=25099971</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25099971</guid></item><item><title><![CDATA[New comment by Eli_P in "Google sued: Idle Android eats mobile data to send telemetry and preload ads"]]></title><description><![CDATA[
<p>I use open source app Nebulo[1] which is a localhost pseudo-VPN which reroutes all DNS to any DoH/DoT you want. It also has a request log, I was (not very) surprised when it came my default file manager connects to facespace when I don't have any account there.<p>The bad news is, GPS still turns on on its own and camera seem to click sometimes </tinfoil><p>[1] <a href="https://play.google.com/store/apps/details?id=com.frostnerd.smokescreen" rel="nofollow">https://play.google.com/store/apps/details?id=com.frostnerd....</a></p>
]]></description><pubDate>Sat, 14 Nov 2020 13:57:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=25092306</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=25092306</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25092306</guid></item><item><title><![CDATA[New comment by Eli_P in "Taking screenshots isn't allowed by the app after upgrading to Android 11"]]></title><description><![CDATA[
<p>Accessibility utils like screen readers do OCR and read aloud the content for blind people.</p>
]]></description><pubDate>Sun, 08 Nov 2020 18:31:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=25027705</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=25027705</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25027705</guid></item><item><title><![CDATA[New comment by Eli_P in "RIAA Obtains Subpoenas Targeting 40 YouTube-Ripping Platforms and Pirate Sites"]]></title><description><![CDATA[
<p>All correct. It's just important to remember who's the attacker:<p><pre><code>  Alice -- ISP1 -- 1000 hops -- ISP2 -- Bob
</code></pre>
Alice and Bob's identities are protected from each other, but not from the govt because ISPs collect metadata.</p>
]]></description><pubDate>Fri, 30 Oct 2020 17:54:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=24944984</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=24944984</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24944984</guid></item><item><title><![CDATA[New comment by Eli_P in "RIAA Obtains Subpoenas Targeting 40 YouTube-Ripping Platforms and Pirate Sites"]]></title><description><![CDATA[
<p>Yes, <i>overlay network</i>'s configuration will be somewhat different, but physically it will be the same. It's like you're rearranging apple bits in a pie to save them; the pie will be sliced and eaten anyways.</p>
]]></description><pubDate>Thu, 29 Oct 2020 22:59:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=24937120</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=24937120</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24937120</guid></item><item><title><![CDATA[New comment by Eli_P in "RIAA Obtains Subpoenas Targeting 40 YouTube-Ripping Platforms and Pirate Sites"]]></title><description><![CDATA[
<p>I doubt the number of nodes is important when you can split a large group of them into a few subgroups and analyze them or alter how they interact with each other, then repeat subdivision; because again, them overlay networks are like smaller sandboxes inside the big one.</p>
]]></description><pubDate>Thu, 29 Oct 2020 21:15:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=24936002</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=24936002</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24936002</guid></item><item><title><![CDATA[New comment by Eli_P in "RIAA Obtains Subpoenas Targeting 40 YouTube-Ripping Platforms and Pirate Sites"]]></title><description><![CDATA[
<p>> I wonder why there are so few people<p>Maybe because people understand that it's security model is flawed: the peers in the mesh treat all the other peers as not trusted, that's okay; but the network design doesn't seem to take into account potential hostility of the physical medium itself.<p>Say, your ISP can tarpit packets or shape traffic, or shut down the power or cell tower in your block temporarily, and then measure how the mesh congestion changed. At the same time the mesh relies on building hop chains with TTL of 10 minutes iirc, which I think makes a peer a sitting duck. It is (was) all documented/leaked.</p>
]]></description><pubDate>Thu, 29 Oct 2020 18:32:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=24933762</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=24933762</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24933762</guid></item><item><title><![CDATA[New comment by Eli_P in "Spy agency ducks questions about 'back doors' in tech products"]]></title><description><![CDATA[
<p>Huh, your imaginary city reminisces one in The Murderer by Ray Bradbury.</p>
]]></description><pubDate>Thu, 29 Oct 2020 07:35:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=24928124</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=24928124</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24928124</guid></item><item><title><![CDATA[New comment by Eli_P in "YouTube-dl has received a DMCA takedown from RIAA"]]></title><description><![CDATA[
<p>> Abolish copyright<p>If they did, it'd be still complicated. A real example, a modder makes some content for an old abandoned game. He needs some voice over, so he contacts the original voice actors, but they deny to do that job on the grounds of being a member of org like this[1] which strictly prohibits to take side jobs.<p>And to make it even more complicated, consider tools like for making deep fakes; if somebody makes a neural network that emulates the original voice, should it be sub-licensed or copyrighted? Can a voice be copyrighted?<p>[1] <a href="https://en.wikipedia.org/wiki/SAG-AFTRA" rel="nofollow">https://en.wikipedia.org/wiki/SAG-AFTRA</a></p>
]]></description><pubDate>Sat, 24 Oct 2020 13:09:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=24878976</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=24878976</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24878976</guid></item><item><title><![CDATA[New comment by Eli_P in "The High Privacy Cost of a “Free” Website"]]></title><description><![CDATA[
<p>> I don't fully grasp what privacy is<p>> people like me find it hard to quantify what that thing is<p>Privacy is [REDACTED]. Intelligence is not privacy.<p>Recently I cleaned some olde books I don't need anymore and there were a bunch of them on info security, so I skimmed them good bye, and they all stated the same vague definitions like no one knows what privacy is, there's no agreement, etc.<p>Actually there're definitions of privacy and intel, they are just sad and unethical, hush shush.</p>
]]></description><pubDate>Wed, 30 Sep 2020 13:58:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=24638743</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=24638743</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24638743</guid></item><item><title><![CDATA[New comment by Eli_P in "Mozilla project exposes YouTube's recommendation 'bubbles'"]]></title><description><![CDATA[
<p>It seems like the context is built with a simple bag of words model. One day I searched "how to make a mousetrap", the following day I got a recommended video about statistics, where the author explains something on a mouse population, and says "mouse" many many times.</p>
]]></description><pubDate>Fri, 17 Jul 2020 02:37:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=23866395</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=23866395</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23866395</guid></item><item><title><![CDATA[New comment by Eli_P in "France to introduce controversial age verification system for adult websites"]]></title><description><![CDATA[
<p>> that increased exposure to any porn has effects on attitude<p>What does your research say about the fixation of that attitude? Is it like, forever and ever? How those effects compare to watching martial arts, war footage from the news, movies etc?<p>Isn't it just a Pavlovian response training thing? Before the age of 25 people are more susceptible to learn or relearn, and some are just born (and exacerbated by insane upbringing instead of proper diagnosis and meds) with predilections.<p>> but the effects are more pronounced with violent porn<p>Sure, and if they had a fist fight behind a school, a kiss, a cigarette, a caffeinated drink and listened to violent music in a short time they'd probably had a heart attack.<p>Your conclusion reminds of witch-hunt-approving arguments like, violent games make kids violent. Which is moot, Take for example Children's Crusades[1] in 13 century, which was induced by religion and politics. Or, I know some parents who watched a documentary about how a talented musician was raised with beatings, so they took that literally, you know what I mean? Sick ideas find a fertile ground.<p>Btw did you watch that Black Mirror episode "Arkangel", seems related. Or The Alienist by Caleb Carr, the book and series, about underage male prostitution in 19 century, the plot is based on real life, sort of.<p>[1] <a href="https://en.wikipedia.org/wiki/Children%27s_Crusade" rel="nofollow">https://en.wikipedia.org/wiki/Children%27s_Crusade</a></p>
]]></description><pubDate>Fri, 10 Jul 2020 14:54:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=23792069</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=23792069</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23792069</guid></item><item><title><![CDATA[New comment by Eli_P in "Ask HN: Any Covid travel-restriction interactive map to see from country A to B?"]]></title><description><![CDATA[
<p>This might help <a href="https://travel.stackexchange.com/questions/tagged/covid-19" rel="nofollow">https://travel.stackexchange.com/questions/tagged/covid-19</a></p>
]]></description><pubDate>Fri, 10 Jul 2020 12:32:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=23790825</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=23790825</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23790825</guid></item><item><title><![CDATA[New comment by Eli_P in "Microsoft duplicates data from Firefox without asking"]]></title><description><![CDATA[
<p>It's not that easy. Take into consideration spreading of sensors like light/water/gas/sewerage meters, which report measurements to a central SCADA. I touched that around a decade ago, I had to build link with the meters with AT commands through GSM with <i>modbus</i> protocol on top of that.<p>These days it's a grown-ass market with competition and much more advanced toys involved. You turn on water, they know timings and how much you used. You use more electricity, they call you to suggest a different plan. You used drugs and flushed, they find metabolites in sewerage sensors (I heard that on news, dunno maybe bs).<p>So I think it's basically about bills; cameras in toilets are different market.</p>
]]></description><pubDate>Thu, 25 Jun 2020 05:13:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=23637138</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=23637138</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23637138</guid></item><item><title><![CDATA[New comment by Eli_P in "I Just Hit $100k/year On GitHub Sponsors"]]></title><description><![CDATA[
<p>High entropy edition: with RSA padding, signed by famous cryptographers.</p>
]]></description><pubDate>Wed, 24 Jun 2020 05:19:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=23624371</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=23624371</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23624371</guid></item><item><title><![CDATA[New comment by Eli_P in "I Just Hit $100k/year On GitHub Sponsors"]]></title><description><![CDATA[
<p>> the protections of an LLC<p>Won't protect one guy or a small team in case of legal disputes, it's called piercing the corporate veil. I wonder if the EU has something similar.</p>
]]></description><pubDate>Wed, 24 Jun 2020 04:41:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=23624169</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=23624169</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23624169</guid></item><item><title><![CDATA[New comment by Eli_P in "DuckDuckGo, Google, and Android choice screens"]]></title><description><![CDATA[
<p>What's interesting, does that strategy end like: less effective ads -> need more of them -> raise ad price + show more of them?<p>Another thing is regarding k-anonymity which I suppose privacy-first guys would use. If I gather user info with a high entropy, I don't have an incentive to sell it to anybody and create a competitor, and it'd probably illegal to do that. But if I anonymize the data set into a k-anon data it's now less restrictive to sell from legal point, also I'll probably sell that data to third parties just to make ends meet.</p>
]]></description><pubDate>Mon, 08 Jun 2020 17:28:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=23458608</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=23458608</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23458608</guid></item><item><title><![CDATA[New comment by Eli_P in "Twitter says an attacker used its API to match usernames to phone numbers"]]></title><description><![CDATA[
<p>For entities whose behavior fit their model, it's called negative selection[1], a mandatory attribute of emerging dictatorship.<p>[1] <a href="https://en.wikipedia.org/wiki/Negative_selection_(politics)" rel="nofollow">https://en.wikipedia.org/wiki/Negative_selection_(politics)</a></p>
]]></description><pubDate>Thu, 06 Feb 2020 00:30:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=22252357</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=22252357</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22252357</guid></item><item><title><![CDATA[New comment by Eli_P in "Google tracks individual users per Chrome installation ID"]]></title><description><![CDATA[
<p>If I use a bunch of older Chromes from portableapps, are those affected by feature testing, provided I've disabled google update but I'm not behind a firewall?<p>In other words, is feature polling just hard-coded or it is bound to a specific installation?</p>
]]></description><pubDate>Wed, 05 Feb 2020 03:00:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=22243619</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=22243619</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22243619</guid></item><item><title><![CDATA[New comment by Eli_P in "Expert programmers have fine-tuned cortical representations of source code"]]></title><description><![CDATA[
<p>You might be a visual kind of person, those make a good mathematician.<p>After a decade of experience I happily dump all the boring stuff to type checkers and linters.<p>One day in the morning I was being in a state of half dreaming - half awake, and among other closed-eyes visuals I observed a series of white screens (sort of 80x25), filled with the same digit, like all zeroes or all threes.<p>I don't know if those were the layers of my brain's NN responsible for recognizing texts. But I generally suck at visual navigation: I don't rely on code-minimaps, scroll-bars, I don't remember if that particular function is above or below. I use tools like quick-jump, fuzzy search, I just need to run a thread of interest through my mind and recall instantly what to search.</p>
]]></description><pubDate>Tue, 04 Feb 2020 18:31:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=22239155</link><dc:creator>Eli_P</dc:creator><comments>https://news.ycombinator.com/item?id=22239155</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22239155</guid></item></channel></rss>