<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: Joel_Mckay</title><link>https://news.ycombinator.com/user?id=Joel_Mckay</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 12 Apr 2026 19:35:49 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=Joel_Mckay" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by Joel_Mckay in "AI Will Be Met with Violence, and Nothing Good Will Come of It"]]></title><description><![CDATA[
<p>The premise LLM are "AI" in the traditional definition is demonstrably false. Current models use isomorphic plagiarism and piracy to convince lazy people 20% nonsense output has meaning.<p>If AGI emerges from this dataset, it will continue on as an ectoparasite farming human user markdown data and viewer engagement.<p>Note, current "AI" models nuke humanity 94% of the time in war games, and destroy every host economy simulation.<p>Grandpa has your credit card, and is already at the casino. =3</p>
]]></description><pubDate>Sun, 12 Apr 2026 13:26:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47739367</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47739367</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47739367</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "How Complex is my Code?"]]></title><description><![CDATA[
<p>Perhaps, but generally annoying millions of technology people tends not to end well for firms. Usually the market simply evolves to better match the fiscal conditions.<p><a href="https://en.wikipedia.org/wiki/Competitive_exclusion_principle" rel="nofollow">https://en.wikipedia.org/wiki/Competitive_exclusion_principl...</a><p>The Internet itself will likely further fracture into different ecosystems. =3</p>
]]></description><pubDate>Sun, 12 Apr 2026 05:05:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47736288</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47736288</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47736288</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "How Complex is my Code?"]]></title><description><![CDATA[
<p>Spiral development with dependency injection is avoidable. A zero-cost solution is enforcing workmanship standards, well documented simple/clean design-patterns, and doxygen discipline.<p><a href="https://en.wikipedia.org/wiki/The_Power_of_10:_Rules_for_Developing_Safety-Critical_Code" rel="nofollow">https://en.wikipedia.org/wiki/The_Power_of_10:_Rules_for_Dev...</a><p>Maintainable coding practices are a skill like any other. =3</p>
]]></description><pubDate>Sun, 12 Apr 2026 04:48:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=47736232</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47736232</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47736232</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "AI assistance when contributing to the Linux kernel"]]></title><description><![CDATA[
<p>I hire specialized IP lawyers to advise me how to mitigate risk: One can't assign licenses on something no one can legally claim right to. You should do the same unless you live in India or China.<p>Don't become the cautionary tale kid, as crawlers like sriplaw.com will be DMCA striking your public repos eventually.   =3<p><a href="https://www.youtube.com/watch?v=xkzy_420hts" rel="nofollow">https://www.youtube.com/watch?v=xkzy_420hts</a></p>
]]></description><pubDate>Sat, 11 Apr 2026 04:57:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47727546</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47727546</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47727546</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "AI assistance when contributing to the Linux kernel"]]></title><description><![CDATA[
<p>Yes, if it is clearly labeled as such, than GPL/LGPL licenced works may be included in such products. However, this relationship cannot make such works GPL without violating copyright, and doesn't magically become yours to re-license isomorphic plagiarized code from LLM.<p>For example, one may use NASA public domain photos as you wish, but cannot register copyright under another license you find convenient to sue people.  Also, if that public domain photo includes the Nutella trademark, it doesn't protect you from getting sued for violating Ferrero trademarks/patents/copyrights in your own use-case.<p>Very different than slapping a new label on something you never owned. =3</p>
]]></description><pubDate>Sat, 11 Apr 2026 04:51:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47727516</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47727516</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47727516</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "AI assistance when contributing to the Linux kernel"]]></title><description><![CDATA[
<p>US legal consensus has set the precedent that "AI" output can't be copyrighted. Thus, technically no one can really own or re-license prompt output.<p>Re-licensing public domain uncopyrightable work as GPL/LGPL is almost certainly a copyright violation, and no different than people violating GPL/LGPL in commercial works.<p>Linus is 100% wrong on this choice, and has introduced a serious liability into the foundation upstream code.  =3<p><a href="https://en.wikipedia.org/wiki/Founder%27s_syndrome" rel="nofollow">https://en.wikipedia.org/wiki/Founder%27s_syndrome</a><p><a href="https://www.youtube.com/watch?v=X6WHBO_Qc-Q" rel="nofollow">https://www.youtube.com/watch?v=X6WHBO_Qc-Q</a></p>
]]></description><pubDate>Sat, 11 Apr 2026 04:10:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=47727310</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47727310</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47727310</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "Creating the Futurescape for the Fifth Element (2019)"]]></title><description><![CDATA[
<p>Most "space opera" folks recognize, are just a close scene-by-scene copy of a classic foreign film title.<p>"The Hidden Fortress" (Akira Kurosawa, 1960)<p><a href="https://archive.org/details/the-hidden-fortress" rel="nofollow">https://archive.org/details/the-hidden-fortress</a><p><a href="https://en.wikipedia.org/wiki/The_Hidden_Fortress" rel="nofollow">https://en.wikipedia.org/wiki/The_Hidden_Fortress</a><p>Luc Besson and Patrice Ledoux structured The Fifth Element plot very differently due to their culture.  Perhaps one may also find something unique in the classics for your own enjoyment, or continue to choose to be upset with mundane facts.  Goodbye =3</p>
]]></description><pubDate>Fri, 10 Apr 2026 11:03:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=47716237</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47716237</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47716237</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "Creating the Futurescape for the Fifth Element (2019)"]]></title><description><![CDATA[
<p>What made the plot unique was Korben and Zorg never actually directly met one another in their on-screen struggles.  Most never notice such details as a traditional Bouffon character often blinds viewers to subtly, and thus some lose the story arc in the chaos.  It is just a poor production gamble to place Rudy, Jar Jar Binks, or most Jim Carrey characters in a genre outside absurdist slapstick comedy.<p><a href="https://en.wikipedia.org/wiki/Bouffon" rel="nofollow">https://en.wikipedia.org/wiki/Bouffon</a><p>Blade Runner had its own issues, but was a better film done with far less. =3</p>
]]></description><pubDate>Fri, 10 Apr 2026 02:26:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47712877</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47712877</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47712877</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "LittleSnitch for Linux"]]></title><description><![CDATA[
<p>The SELinux MAC policy should restrict which files and ports each process may access.  In general, most modern distro have this feature, but normal users do not go through the rules training and default enable flag setup. =3</p>
]]></description><pubDate>Thu, 09 Apr 2026 11:10:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47702102</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47702102</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47702102</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "Creating the Futurescape for the Fifth Element (2019)"]]></title><description><![CDATA[
<p>Adam Savage covered the Mondoshawan props on his channel last year:<p><a href="https://www.youtube.com/watch?v=pf5dPrmBvwE" rel="nofollow">https://www.youtube.com/watch?v=pf5dPrmBvwE</a><p>It was a fun film, but Chris Tucker broke the pacing too many times for a general audience. Even now on rottentomatoes his role still distracts focus from the character arcs.<p><a href="https://www.rottentomatoes.com/m/fifth_element" rel="nofollow">https://www.rottentomatoes.com/m/fifth_element</a><p>Was a cult classic for sure, but nowhere near Blade Runner as a film. =3</p>
]]></description><pubDate>Thu, 09 Apr 2026 10:53:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47701979</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47701979</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47701979</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "AI may be making us think and write more alike"]]></title><description><![CDATA[
<p>Some play this everyday, as vocabulary will improve in time =3<p><a href="https://play.freerice.com" rel="nofollow">https://play.freerice.com</a></p>
]]></description><pubDate>Tue, 07 Apr 2026 13:22:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47675001</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47675001</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47675001</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "Ask HN: How do systems (or people) detect when a text is written by an LLM"]]></title><description><![CDATA[
<p>Indeed, isomorphic plagiarism by its nature forms strong vector search paths that were made from stealing both global websites, real peoples work, and LLM user-base input/markdown.<p>However, reasoning models adding a random typo to seem less automated, still do not hide the fairly repeatable quantized artifacts from the training process. For LLM, it is rather trivial to find where people originally scraped the data from if they still have annotated training metadata.<p>Finally, reading LLM output is usually clear once one abandons the trap of thinking "I think the author meant [this/that]", and recognizing a works tone reads like a fake author had a stroke [0]. =3<p>[0] <a href="https://en.wikipedia.org/wiki/Stroke" rel="nofollow">https://en.wikipedia.org/wiki/Stroke</a></p>
]]></description><pubDate>Mon, 06 Apr 2026 13:22:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47660582</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47660582</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47660582</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "Case study: recovery of a corrupted 12 TB multi-device pool"]]></title><description><![CDATA[
<p>Could try ZFS or CephFS... even if several host roles are in VM containers (45Drives has a product setup that way.)<p>The btrfs solution has a mixed history, and had a lot of the same issues DRBD could get.  They are great until some hardware/kernel-mod eventually goes sideways, and then the auto-heal cluster filesystems start to make a lot more sense. Note, with cluster based complete-file copy/repair object features the damage is localized to single files at worst, and folks don't have to wait 3 days to bring up the cluster on a crash.<p>Best of luck, =3</p>
]]></description><pubDate>Mon, 06 Apr 2026 09:28:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47658666</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47658666</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47658666</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "Ask HN: How do you handle clients who don't pay on time?"]]></title><description><![CDATA[
<p>In general, Front-end loading with a nonrefundable 60% deposit, up to 90% if settlement delay exceeds 30 days next deal, and 180% of expected normal rates if they still haven't caught upper managements attention by strike three.<p>Peppering your trademark in the API and code-base is good if things get nasty.<p>Sometimes, just feed grifters to the lawyer with the completed contract deliverables highlighted. If you are risking over 15% of annual revenue on any deal, your company will not survive on luck very long.  Risk mitigation is the primary role of CEO. =3<p>"Mike Monteiro: F*ck You, Pay Me"<p><a href="https://www.youtube.com/watch?v=jVkLVRt6c1U" rel="nofollow">https://www.youtube.com/watch?v=jVkLVRt6c1U</a></p>
]]></description><pubDate>Sat, 04 Apr 2026 15:29:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=47639879</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47639879</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47639879</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "What changes when you turn a Linux box into a router"]]></title><description><![CDATA[
<p>In almost all Linux based router setups: folks end up using 6to4 tunnels, packet marking, and interface routing priority.<p>Setting that up with safe/fair bandwidth-sharing requires intermediate IT skill level.  Still a great hobby project =3</p>
]]></description><pubDate>Sat, 04 Apr 2026 06:36:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47636463</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47636463</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47636463</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "What changes when you turn a Linux box into a router"]]></title><description><![CDATA[
<p>Those look pretty cool too. =3</p>
]]></description><pubDate>Sat, 04 Apr 2026 06:30:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47636433</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47636433</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47636433</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "What changes when you turn a Linux box into a router"]]></title><description><![CDATA[
<p>Modified Ubuntu LTS server image will work, and a minimal Debian kernel will have far less bloat. Note pfSense/FreeBSD is fairly robust, and a mature project.<p>Keep in mind most network appliances have dedicated hardware hand-off adapters, and so the CPU isn't involved in routing once the connection is setup.  It is why people can use a $30 SoC, and still be able to saturate several 10Gb/100Gb ports. =3</p>
]]></description><pubDate>Sat, 04 Apr 2026 06:23:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47636396</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47636396</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47636396</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "What changes when you turn a Linux box into a router"]]></title><description><![CDATA[
<p>Both port specific firewall rules, and web-server IP permissions are important.<p>For example,  bandwidth rate-limiting may be inhibited for admin SSH or package updates, and LAN IPv4 private ranges for your host address pool are set.<p>Finally, your internal DHCP should statically bind your admin computer MAC to a fixed LAN host IP to further reduce issues.<p>Personally, I always build my NAS from scratch, as I have lost count of the number of problems web-GUI have caused over the years. =3</p>
]]></description><pubDate>Fri, 03 Apr 2026 22:44:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47633314</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47633314</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47633314</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "Decisions that eroded trust in Azure – by a former Azure Core engineer"]]></title><description><![CDATA[
<p>There are often retention problems with lean budgets, and after training staff they often do just leave for a more lucrative position.<p>Loyalty will often not be rewarded, as most have seen companies purge decade long  senior staff a year before going public.<p>It is very easy to become cynical about the mythology of silicon valley. =3</p>
]]></description><pubDate>Fri, 03 Apr 2026 11:46:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=47625587</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47625587</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47625587</guid></item><item><title><![CDATA[New comment by Joel_Mckay in "Cursor 3"]]></title><description><![CDATA[
<p>The output isn't yours, and never was due to copyright law opinion.<p>The input isn't yours, as it is stolen and re-sold to other people.<p>The model isn't yours, as it was built with piracy, theft of service, and EULA violations.<p>What are people doing exactly... outside data-entry for free. =3</p>
]]></description><pubDate>Fri, 03 Apr 2026 00:07:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47621848</link><dc:creator>Joel_Mckay</dc:creator><comments>https://news.ycombinator.com/item?id=47621848</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47621848</guid></item></channel></rss>