<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: MyNameIsFred</title><link>https://news.ycombinator.com/user?id=MyNameIsFred</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 09 Apr 2026 08:39:09 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=MyNameIsFred" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by MyNameIsFred in "Building the mouse Logitech won't make"]]></title><description><![CDATA[
<p>TL;DR Is US continues to change policy without any clear guidance nor facilitation. Impractical to comply.
<a href="https://apnews.com/article/us-tariffs-goods-services-suspension-85c7b36b9e92c0e640dfe2ac418cd907?utm_source=copy&utm_medium=share" rel="nofollow">https://apnews.com/article/us-tariffs-goods-services-suspens...</a></p>
]]></description><pubDate>Mon, 25 Aug 2025 17:25:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=45016327</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=45016327</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45016327</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "Emailing a one-time code is worse than passwords"]]></title><description><![CDATA[
<p>I'm a personal and professional advocate from r passkeys, yet I must acknowledge that your criticisms and skepticism are valid. I don't see this as a flaw in the passkeys concept so much as a growing pain. It's a very different mental model, and I've seen businesses make some very poor implementation decisions based on some poor understanding of what this system aims to be. That in turn adds to a bad consumer impression, a growing body of bad examples for others to look to and replucate, and it all just compounds.</p>
]]></description><pubDate>Sat, 09 Aug 2025 19:27:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=44849366</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=44849366</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44849366</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "Arrest of Pavel Durov, Telegram CEO, charges of terrorism, fraud, child porn"]]></title><description><![CDATA[
<p>This rebuttalakes no sense to me. What you cite is about about transport encryption. App -> Server. The end of the process is that the receiver (Telegram servers) receives a decrypted (plaintext) message, just as kelsey98765431 is saying.</p>
]]></description><pubDate>Sun, 25 Aug 2024 17:07:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=41349048</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=41349048</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41349048</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "Passkeys: The beginning of the end of the password"]]></title><description><![CDATA[
<p>The simplified terminology is not for you or I as technologists. It is for the general consumer market. Yes, public/private key cryptography has been a thing for decades, but it has been out of reach for the consumer market. The whole passkey idea is to reduce the technical and cognitive friction to make it a viable replacement for passwords.</p>
]]></description><pubDate>Sat, 06 May 2023 23:58:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=35846525</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=35846525</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35846525</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "The computers are fast, but you don't know it"]]></title><description><![CDATA[
<p>You are completely correct and I really wish you weren't.</p>
]]></description><pubDate>Sat, 18 Jun 2022 19:43:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=31793100</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=31793100</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31793100</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "The most satisfying checkbox"]]></title><description><![CDATA[
<p>MS ToDo was hewn from the corpse of Wunderlist. It's the same "ding".</p>
]]></description><pubDate>Sat, 18 Jun 2022 19:15:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=31792853</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=31792853</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31792853</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "Keyboard lets people type so fast it’s banned from typing competitions"]]></title><description><![CDATA[
<p>Yes! I dove into this (and later, Moondlander) because I have mobility issues and <i>had</i> to reduce travel, but the resulting 90WPM and (unprovably) faster coding have been awesome side-effects.</p>
]]></description><pubDate>Thu, 06 Jan 2022 23:56:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=29832513</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=29832513</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29832513</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "Dolt is Git for Data: a SQL database that you can fork, clone, branch, merge"]]></title><description><![CDATA[
<p>> Yeah it's a neat idea but I struggle to think of good use-cases [...] If I'm working on a service [...]<p>I suspect that's simply not the use-case they're targeting. You're thinking of a database as simply the persistence component for your service, a means to an end. For you, the service/app/software is the thing you're trying to deliver. Where this looks useful is the cases where the data itself is the thing you're trying to deliver.</p>
]]></description><pubDate>Sun, 07 Mar 2021 04:12:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=26373073</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=26373073</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26373073</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "IRS budget cuts cost $34.3B in lost revenue from big business"]]></title><description><![CDATA[
<p>That's an alarming equation. The harder you lie, the less likely you'll be called out on it.<p>What else in life works that way?</p>
]]></description><pubDate>Wed, 21 Aug 2019 00:36:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=20753675</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=20753675</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20753675</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "How to Build Good Software"]]></title><description><![CDATA[
<p>Yes, thank you. A mindset which thinks that documentation is wasted due to a need to constantly update, is cousin to the mindset which thinks that software, once written, is a purchased asset which needs no further attention nor maintenance.</p>
]]></description><pubDate>Tue, 20 Aug 2019 16:36:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=20748916</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=20748916</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20748916</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "I Can No Longer Recommend Google Fi"]]></title><description><![CDATA[
<p>They most certainly do not "handle it just fine". They are highly scammable, they know it, and it's "solved" my moving as much of the burden and repercussions onto the consumer as possible.<p>I've had my identity stolen, and both my wife and I have been mistaken for somebody else. There ARE way to move past this condition (inline with Google Pay, apparently), but it's just done via trust. Or apathy. Or acceptable risk. Or some combination thereof. It never truly goes away.</p>
]]></description><pubDate>Sat, 12 Jan 2019 02:08:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=18889066</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=18889066</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18889066</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "IBM acquires Red Hat"]]></title><description><![CDATA[
<p>What wouldn't be the 5th time I've heard such stories, but I don't think it's in any way specific to IBM. Employers like that want any OT you do to be dedicated to THEIR endeavor, not somebody else's...even your own.<p>If you're able and willing to code in your off-time, you should be doing it for the good of the Company. /s</p>
]]></description><pubDate>Mon, 29 Oct 2018 04:31:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=18325071</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=18325071</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18325071</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "Learn Kotlin in Y Minutes"]]></title><description><![CDATA[
<p>My team of consultants will write Android apps, and the customer takes ownership of the code base when we're done.<p>My wife would leave me if she knew how much I love Kotlin, but I could never use it for work projects because we just could not justify expecting random inheriting developers to know Kotlin and accept its legitimacy. That constraint lifted in an instant. It's a political thing, but it really matters.</p>
]]></description><pubDate>Thu, 18 May 2017 23:49:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=14371993</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=14371993</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14371993</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "Let them paste passwords"]]></title><description><![CDATA[
<p>I haven't done Windows development for a long time, but I think that this may be an overstatement, at least on that platform.<p>You need to have cursor focus to receive key events, right?<p>The clipboard, by contrast, can be continually monitored, while playing completely "by the rules", right?</p>
]]></description><pubDate>Thu, 18 May 2017 16:04:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=14368395</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=14368395</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14368395</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "Why the “WhatsApp-backdoor” is not a WhatsApp-backdoor"]]></title><description><![CDATA[
<p>I do not see this as an actual rebuttal to the idea of it being a backdoor. The article makes two points:
1. Ultimately, verification falls to the user, so even in a secure system, user error, misunderstanding, and/or laziness can result in becoming compromised
2. Clients can lie to us anyway<p>The point about this "backdoor" business is that the WhatsApp client does not even give the user the chance to even make a mistake of skipping or mis-executing validation. Instead, it will just make that mistake FOR you, every time, for your convenience!<p>That utter failure of design, and breach of trust, enables a remote actor (the WhatsApp servers) to access secure data. So yes, it is a "backdoor".</p>
]]></description><pubDate>Fri, 13 Jan 2017 13:55:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=13390747</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=13390747</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13390747</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "Show HN: CakeResume – Drag and drop resume snippets to build a unique resume"]]></title><description><![CDATA[
<p>Sometimes PDFs store actual character data (like vector graphics), and sometimes they store static images. Last I checked (admittedly a few years ago), Word conversion only works on the former. It didn't do OCR or anything so dramatic.<p>If only <i>some</i> PDFs will work for them, they wouldn't accept them at all.</p>
]]></description><pubDate>Wed, 07 Dec 2016 13:24:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=13122312</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=13122312</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13122312</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "Why I Left White Nationalism"]]></title><description><![CDATA[
<p>Following that statement, the author spends the rest of the article explaining how the people asserting supremacy often do not see it as such.<p>It is an implicit and unwitting reality of the position they are taking. I used to be one of these folks; I couldn't see the harm and hate of my own positions, thanks to the fog of ethnocentrism.</p>
]]></description><pubDate>Tue, 29 Nov 2016 04:43:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=13060857</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=13060857</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13060857</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "Ant species cultivates coffee for accommodation"]]></title><description><![CDATA[
<p>The striking difference here, at least to me, is the a matter of scale and delay. Aphids and fungus are smaller than the ants, and have shorter lifecycles than the ants themselves. Planting and cultivation of a coffee plant suggests understanding of much larger scale (both literally and conceptually).</p>
]]></description><pubDate>Mon, 28 Nov 2016 12:59:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=13055095</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=13055095</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13055095</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "Cash Ban the Best Thing to Happen to Indian Digital Payments"]]></title><description><![CDATA[
<p>By what reasoning? On the surface I would assume that to be false. Please elaborate?</p>
]]></description><pubDate>Thu, 24 Nov 2016 01:00:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=13027082</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=13027082</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13027082</guid></item><item><title><![CDATA[New comment by MyNameIsFred in "Programmers confess unethical, illegal tasks asked of them"]]></title><description><![CDATA[
<p>Sorta. The basis for your concern underlines one of the problems. When such gaffs happen in engineering, the firm is blamed. Within the firm, individual actors are blamed.
In software, on the other hand, your major system might have responsibility for a critical system spread across a total of 1 persons, so he gets all the blame. Is that really okay for one hip-shooter to take this on in the first place?</p>
]]></description><pubDate>Tue, 22 Nov 2016 04:59:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=13011741</link><dc:creator>MyNameIsFred</dc:creator><comments>https://news.ycombinator.com/item?id=13011741</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13011741</guid></item></channel></rss>