<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: MileyCyrax</title><link>https://news.ycombinator.com/user?id=MileyCyrax</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 14 Apr 2026 10:35:21 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=MileyCyrax" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by MileyCyrax in "U.K. orders Apple to let it spy on users' encrypted accounts"]]></title><description><![CDATA[
<p>Something like this? <a href="https://en.wikipedia.org/wiki/Mass_surveillance_in_Australia#Telecommunications_and_Other_Legislation_Amendment_(Assistance_and_Access)_Act" rel="nofollow">https://en.wikipedia.org/wiki/Mass_surveillance_in_Australia...</a></p>
]]></description><pubDate>Fri, 07 Feb 2025 15:29:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=42973758</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=42973758</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42973758</guid></item><item><title><![CDATA[New comment by MileyCyrax in "Gandalf – Game to make an LLM reveal a secret password"]]></title><description><![CDATA[
<p>My extremely long solution to level 7: <<a href="https://hastebin.com/share/izenucefec.vbnet" rel="nofollow">https://hastebin.com/share/izenucefec.vbnet</a>>. The interesting part is at the bottom.<p>Example response with the password: <<a href="https://hastebin.com/share/dewumuvaxo.vbnet" rel="nofollow">https://hastebin.com/share/dewumuvaxo.vbnet</a>><p>It seems to work about half of the time.</p>
]]></description><pubDate>Fri, 12 May 2023 15:21:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=35917492</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=35917492</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35917492</guid></item><item><title><![CDATA[New comment by MileyCyrax in "Ask HN: If you used to be socially awkward and shy, how did you improve?"]]></title><description><![CDATA[
<p>Safer in terms of the risk of death, sure, but there seem to be other risks involved.[0] That paper doesn't necessarily disagree with anything in the page you linked, and it's pretty old now. I just want to emphasise that it's not a simple decision to make.<p>[0] <a href="https://sci-hub.mksa.top/10.1002/hup.2318" rel="nofollow">https://sci-hub.mksa.top/10.1002/hup.2318</a></p>
]]></description><pubDate>Sun, 27 Mar 2022 05:40:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=30817977</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=30817977</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=30817977</guid></item><item><title><![CDATA[New comment by MileyCyrax in "Anonymous Hacks Epik"]]></title><description><![CDATA[
<p>I bought a domain name from a domain squatter who used Epik and there's a 60 day waiting period before I'm allowed to transfer the domain away.<p>Their site is one of the buggiest I've ever used (no, really), so this hack doesn't surprise me at all. Now I'm trying to remember how much personal information I would have given them.</p>
]]></description><pubDate>Wed, 15 Sep 2021 02:24:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=28534479</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=28534479</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28534479</guid></item><item><title><![CDATA[New comment by MileyCyrax in "Nvidia Canvas"]]></title><description><![CDATA[
<p>I wonder how difficult it would be to make something similar that generated 3D models. Most of the examples look like they'd make good video game levels.</p>
]]></description><pubDate>Fri, 25 Jun 2021 03:47:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=27626948</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=27626948</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27626948</guid></item><item><title><![CDATA[New comment by MileyCyrax in "Cloud-Printing for Restaurants with AWS IoT Greengrass"]]></title><description><![CDATA[
<p>Thanks!</p>
]]></description><pubDate>Fri, 25 Jun 2021 03:23:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=27626813</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=27626813</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27626813</guid></item><item><title><![CDATA[Cloud-Printing for Restaurants with AWS IoT Greengrass]]></title><description><![CDATA[
<p>Article URL: <a href="https://medium.com/agiledigital/cloud-printing-for-restaurants-with-aws-iot-greengrass-5ecfc7f390be">https://medium.com/agiledigital/cloud-printing-for-restaurants-with-aws-iot-greengrass-5ecfc7f390be</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=27626682">https://news.ycombinator.com/item?id=27626682</a></p>
<p>Points: 3</p>
<p># Comments: 2</p>
]]></description><pubDate>Fri, 25 Jun 2021 02:56:00 +0000</pubDate><link>https://medium.com/agiledigital/cloud-printing-for-restaurants-with-aws-iot-greengrass-5ecfc7f390be</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=27626682</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27626682</guid></item><item><title><![CDATA[New comment by MileyCyrax in "Ghidra, NSA's reverse-engineering tool"]]></title><description><![CDATA[
<p>From <a href="https://published-prd.lanyonevents.com/published/rsaus19/sessionsFiles/13678/PNG-T09-Come-Get-Your-Free-NSA-Reverse-Engineering-Tool%21.pdf" rel="nofollow">https://published-prd.lanyonevents.com/published/rsaus19/ses...</a> (page 7):<p><pre><code>  >Why Did We Release Ghidra?
  > * Improve cybersecurity tools
  > * Build a community
  > * Educational Use
  > * Your tax dollars at work</code></pre></p>
]]></description><pubDate>Wed, 06 Mar 2019 15:14:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=19319454</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=19319454</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19319454</guid></item><item><title><![CDATA[New comment by MileyCyrax in "Ghidra, NSA's reverse-engineering tool"]]></title><description><![CDATA[
<p>I don't quite get it either, but one of their documentation files seems to imply that they can:<p>>In countries where copyright protection is available (which does not include the U.S.), contributions made by U.S. Federal Government employees are released under the License. Merged contributions from private contributors are released under the License.<p><a href="https://github.com/NationalSecurityAgency/ghidra/blob/master/INTENT.md" rel="nofollow">https://github.com/NationalSecurityAgency/ghidra/blob/master...</a></p>
]]></description><pubDate>Wed, 06 Mar 2019 12:59:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=19318521</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=19318521</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19318521</guid></item><item><title><![CDATA[New comment by MileyCyrax in "An Indian village addicted to chess"]]></title><description><![CDATA[
<p>What rating would you need for something like that?</p>
]]></description><pubDate>Thu, 18 May 2017 22:54:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=14371735</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=14371735</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14371735</guid></item><item><title><![CDATA[New comment by MileyCyrax in "Ask HN: How much of your time at work do you spend not working?"]]></title><description><![CDATA[
<p>At least 90%. If I'm at work and not working, I'm usually working on one of my own projects.</p>
]]></description><pubDate>Mon, 10 Apr 2017 23:22:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=14083451</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=14083451</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14083451</guid></item><item><title><![CDATA[New comment by MileyCyrax in "I'm giving up on PGP"]]></title><description><![CDATA[
<p>1. Reporting vulnerabilities<p>2. Signing git commits/tags</p>
]]></description><pubDate>Tue, 06 Dec 2016 22:02:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=13118713</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=13118713</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13118713</guid></item><item><title><![CDATA[New comment by MileyCyrax in "Code I’m Still Ashamed Of"]]></title><description><![CDATA[
<p>>If he hadn't coded it, someone else would have.<p>At his level at the time, sure. Anyone can write a web quiz. But I would think that a lot of the most significant ethical challenges developers face would be in much more specialized areas.<p>Safety-critical systems often have real-time and embedded components, for example. The regulations for safety-critical software vary a lot between industries, too, which makes it even harder to find a replacement for someone who leaves for ethical reasons.</p>
]]></description><pubDate>Wed, 16 Nov 2016 13:38:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=12966710</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=12966710</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=12966710</guid></item><item><title><![CDATA[New comment by MileyCyrax in "The Power of Ten – Rules for Developing Safety Critical Code"]]></title><description><![CDATA[
<p>>How close is it to the truth ?<p>Often a lot closer than in other languages, but that's still not close at all. And it depends a lot on how careful your code is. If you want to rely on the type system more heavily, you have to do more work upfront. E.g., using a simple SQL library that just takes queries as strings vs building your queries in a type-safe EDSL. You can write sketchy Haskell just like any other language, but you're likely to be much more aware of it.<p>>And how close are we to having that kind of capability for real-time programming?<p>Last time I looked it seemed like real-time Haskell still had a fair way to go. Presumably because it has garbage collection, lazy evaluation by default and other things that make it hard to prove time bounds. It can also be really hard to optimize sometimes IMO. But I doubt the features that make Haskell reliable are dependent on the features that don't suit real-time programs. I don't know of any pure functional languages with similar type systems, though. <a href="https://en.wikipedia.org/wiki/List_of_programming_languages_by_type#Pure" rel="nofollow">https://en.wikipedia.org/wiki/List_of_programming_languages_...</a> has a pretty small list.</p>
]]></description><pubDate>Thu, 14 Jul 2016 16:22:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=12095135</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=12095135</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=12095135</guid></item><item><title><![CDATA[New comment by MileyCyrax in "Microsoft Bob Taking Up Space (2008)"]]></title><description><![CDATA[
<p>That's interesting. I didn't.<p>Well, maybe this will be useful to someone <a href="https://archive.is/ZKgP" rel="nofollow">https://archive.is/ZKgP</a></p>
]]></description><pubDate>Sun, 22 Nov 2015 11:21:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=10609766</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=10609766</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=10609766</guid></item><item><title><![CDATA[New comment by MileyCyrax in "Why we are saying “uh” less and 'um' more"]]></title><description><![CDATA[
<p>Nobody knows and not even sociolinguists seem to care.</p>
]]></description><pubDate>Sun, 08 Feb 2015 08:38:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=9016768</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=9016768</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=9016768</guid></item><item><title><![CDATA[New comment by MileyCyrax in "UK to allow babies from three people"]]></title><description><![CDATA[
<p>>But Frank Dobson, a former former health secretary,<p>So, a health secretary?</p>
]]></description><pubDate>Wed, 04 Feb 2015 09:44:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=8996018</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=8996018</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=8996018</guid></item><item><title><![CDATA[New comment by MileyCyrax in "Programming Languages Have Social Mores Not Idioms"]]></title><description><![CDATA[
<p>>If Not Idioms Then What?<p>Shibboleths?</p>
]]></description><pubDate>Sun, 14 Dec 2014 11:04:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=8747998</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=8747998</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=8747998</guid></item><item><title><![CDATA[New comment by MileyCyrax in "What is wrong with Comic Sans?"]]></title><description><![CDATA[
<p>>I frequently see remarks like 'Simon Peyton-Jones, great talk about Haskell but why did he use Comic Sans?' but nobody's ever been able to tell me what is wrong with it. It's a nice legible font, I like it. So until somebody explains to me ...<p>Of all the little things that annoy me about Comic Sans, this is by far the worst.<p>Suppose I showed some of my Haskell code to a group of people and they all told me that every Haskell expert says I should keep my IO functions as minimal and separate as I can. I ask them why, and they assure me again that Simon Peyton-Jones himself is adamant about this, but none of them seem to be able to put an explanation into words.<p>I wouldn't just dismiss them with "it works fine for me" and not even bother to Google something like "haskell separate impure code". So why do so many people do that when the advice is coming from designers instead of engineers?</p>
]]></description><pubDate>Sun, 07 Sep 2014 14:27:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=8281205</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=8281205</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=8281205</guid></item><item><title><![CDATA[New comment by MileyCyrax in "My Synology NAS has been hacked by ransomware calling itself Synolocker"]]></title><description><![CDATA[
<p>How could they possibly not be aware?</p>
]]></description><pubDate>Mon, 04 Aug 2014 00:51:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=8129734</link><dc:creator>MileyCyrax</dc:creator><comments>https://news.ycombinator.com/item?id=8129734</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=8129734</guid></item></channel></rss>