<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: NMDaniel</title><link>https://news.ycombinator.com/user?id=NMDaniel</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 25 Apr 2026 21:25:57 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=NMDaniel" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by NMDaniel in "Leak uncovers global abuse of cyber-surveillance weapon"]]></title><description><![CDATA[
<p>This isn't very different from the West selling guns, tanks and police equipment to allied 3rd world countries. You hope they'll be used for good causes(preventing crime and terrorism) but knowing that these governments tend to be corrupt, you acknowledge the risk that these weapons will be used by bad elements too.</p>
]]></description><pubDate>Mon, 19 Jul 2021 00:56:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=27878152</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=27878152</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27878152</guid></item><item><title><![CDATA[New comment by NMDaniel in "The Vaccine Had to Be Used. He Used It. He Was Fired"]]></title><description><![CDATA[
<p>> It's too easy for a bad actor to artificially create "leftover" doses to give to friends and family<p>How? If X people made appointments in a day, then exactly X vaccines should be distributed for that day. Leftover vaccines will only be distributed after all those appointments are over, so it is impossible for any of the X people(assuming they arrived on time) to lose their vaccine.</p>
]]></description><pubDate>Thu, 11 Feb 2021 20:15:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=26106530</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=26106530</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26106530</guid></item><item><title><![CDATA[New comment by NMDaniel in "The Vaccine Had to Be Used. He Used It. He Was Fired"]]></title><description><![CDATA[
<p>You don't even need a system<p>In Israel, before vaccines were made available to the entire public, people created Facebook groups reporting clinics which had spare vaccines, nurses would even go outside and offer random passerbys an option to get vaccinated.</p>
]]></description><pubDate>Thu, 11 Feb 2021 20:06:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=26106412</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=26106412</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26106412</guid></item><item><title><![CDATA[New comment by NMDaniel in "Tokio 1.0 – async runtime for Rust"]]></title><description><![CDATA[
<p>You're talking about the runtime aspects of executing concurrent code (OS threads vs green threads) but these are orthogonal to the idea of async APIs, which are one way of modelling concurrent programming flows.<p>For example, futures in Rust can be used with both OS threads and lightweight tasks. Tokio is mostly agnostic about the choice of the executor.<p>It definitely takes some time to grok async Rust (even if you come from C#/JS), but I think it really shines once you get to know it, similar to the benefits you get from learning
about iterators & higher level functions as opposed to plain loops.<p>For instance, I've recently implemented the Raft protocol as part of a distributed algorithms course. Using Tokio and a single threaded executor made the implementation fairly readable, mostly relying on few async constructs(futures, tasks, channels and select loops) to model fairly complex behavior (bidirectional messaging, multiple states, timeouts, etc..)
Doing so in a more traditional callback oriented style would've required maintaining a very complex state machine(in addition to the state machine of the algorithm itself)<p>Also, Async/Await originated in C#, a language which already supports threads(and many other concurrency models), not JavaScript which historically relied on callbacks</p>
]]></description><pubDate>Thu, 24 Dec 2020 19:22:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=25530529</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=25530529</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25530529</guid></item><item><title><![CDATA[New comment by NMDaniel in "NewPipe – ad-free, open-source Android YouTube client"]]></title><description><![CDATA[
<p>Sorry, I wasn't aware that YouTube lets you rent movies, I was mostly speaking about normal clips that anyone can watch for free.</p>
]]></description><pubDate>Fri, 17 Jul 2020 19:11:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=23874247</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=23874247</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23874247</guid></item><item><title><![CDATA[New comment by NMDaniel in "NewPipe – ad-free, open-source Android YouTube client"]]></title><description><![CDATA[
<p>Nowhere did I imply that I'd gain copyright over the content.<p>What's the difference between downloading and streaming a video? It's OK for the bytes to stay in main memory/network cache, but not in HDD? Would taking a memory dump of the RAM break their TOS?</p>
]]></description><pubDate>Fri, 17 Jul 2020 18:54:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=23874068</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=23874068</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23874068</guid></item><item><title><![CDATA[New comment by NMDaniel in "NewPipe – ad-free, open-source Android YouTube client"]]></title><description><![CDATA[
<p>Assuming this is true(that there's a clause against viewing YouTube with a third party client), then they're free to ban users like me from their service(and suffer the PR backlash),
that doesn't mean that breaking that clause is unethical or illegal(I'm not from the US, we don't have draconian internet laws here)</p>
]]></description><pubDate>Fri, 17 Jul 2020 18:36:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=23873877</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=23873877</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23873877</guid></item><item><title><![CDATA[New comment by NMDaniel in "NewPipe – ad-free, open-source Android YouTube client"]]></title><description><![CDATA[
<p>That's not piracy. Youtube is sending you packets, out of their own choice. It's my own right to save those packets(without re-distributing) them and watch them in any form I like.<p>Playing in the background is not a "feature", it's a basic device capability, the fact that YouTube went out of their way to prevent it does not make it right, imagine if the browser client had stopped playing when you went out of focus - that'd be completely unacceptable. The fact that somehow this is accepted on smartphones probably says more about consumers lack of technological competence and awareness (and maybe historical reasons, as earlier versions of Android/iOS didn't have proper multi-tasking)</p>
]]></description><pubDate>Fri, 17 Jul 2020 17:45:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=23873292</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=23873292</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23873292</guid></item><item><title><![CDATA[New comment by NMDaniel in "Google's Monopoly-Based Foreign Policy"]]></title><description><![CDATA[
<p>There are many alternatives to every service Google offers, even though it might not be as good as Google's offering.</p>
]]></description><pubDate>Wed, 18 Dec 2019 18:18:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=21827607</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=21827607</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21827607</guid></item><item><title><![CDATA[New comment by NMDaniel in "Getting 1Password 7 ready for the Mac App Store"]]></title><description><![CDATA[
<p>KeepassXC does have a browser extension for Firefox & Chrome.<p>I use Syncthing to sync it among devices, it's open source and fairly simple to use(compared to other DIY cloud apps)</p>
]]></description><pubDate>Sun, 20 May 2018 15:05:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=17113020</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=17113020</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=17113020</guid></item><item><title><![CDATA[New comment by NMDaniel in "Microsoft Adds an OpenSSH Client to Windows 10"]]></title><description><![CDATA[
<p>That you can keep using Windows seamlessly?</p>
]]></description><pubDate>Tue, 12 Dec 2017 17:00:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=15907125</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=15907125</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15907125</guid></item><item><title><![CDATA[New comment by NMDaniel in "From Markdown to remote code execution in Atom"]]></title><description><![CDATA[
<p>And many developers loathe C++. Why should I have to use such a low level and antiquated language for developing a GUI?<p>Nowadays you don't even have to use JS/TS, there are many languages that target JS and have decent bindings to its ecosystem, such as Scala, Purescript, Clojure. This doesn't seem to be the case with Qt which lacks decent bindings to languages other than Python.</p>
]]></description><pubDate>Thu, 23 Nov 2017 18:25:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=15766897</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=15766897</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15766897</guid></item><item><title><![CDATA[New comment by NMDaniel in "What If OpenDocument Used SQLite?"]]></title><description><![CDATA[
<p>Some formats don't need to be read as plaintext by the average person.<p>Would the average person edit a .svg by hand? No, he'd use Adobe Illustrator or anything else.<p>Would he edit a .docx file by treating it as a zip archive and edit content.xml? No, he'd use MS Word/LibreOffice Writer...<p>Suppose Sqlite used XML/JSON instead of binary files, would you modify them with notepad? No, you'd probably use a SQLite browser software.(Or an application that is more tailored to the domain)</p>
]]></description><pubDate>Thu, 02 Nov 2017 18:10:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=15612754</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=15612754</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15612754</guid></item><item><title><![CDATA[New comment by NMDaniel in "Technology preview: Private contact discovery for Signal"]]></title><description><![CDATA[
<p>So basically emojis?</p>
]]></description><pubDate>Tue, 26 Sep 2017 22:29:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=15343153</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=15343153</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15343153</guid></item><item><title><![CDATA[New comment by NMDaniel in "It’s time to kill the web app"]]></title><description><![CDATA[
<p>That's not how it works, the server wouldn't execute JS that is meant for a browser client, it would just serve it like any other static file.<p>What you're suggesting will actually hamper security, because scripts served from your domain have less limitations(see <a href="https://en.wikipedia.org/wiki/Same-origin_policy" rel="nofollow">https://en.wikipedia.org/wiki/Same-origin_policy</a> , <a href="https://en.wikipedia.org/wiki/Content_Security_Policy" rel="nofollow">https://en.wikipedia.org/wiki/Content_Security_Policy</a> and other mechanisms)</p>
]]></description><pubDate>Sat, 23 Sep 2017 23:21:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=15322316</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=15322316</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15322316</guid></item><item><title><![CDATA[New comment by NMDaniel in "Learn GraphQL with GitHub"]]></title><description><![CDATA[
<p>Yet another tutorial about using a GraphQL client. It's nice but I think the hard part is implementing a GraphQL server. Are there any examples of a full blown GraphQL server, interpreting complex queries as SQL/NoSQL queries in a performant way?</p>
]]></description><pubDate>Fri, 04 Aug 2017 18:24:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=14930744</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=14930744</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14930744</guid></item><item><title><![CDATA[New comment by NMDaniel in "Passwords Evolved: Authentication Guidance for the Modern Era"]]></title><description><![CDATA[
<p>But then you're not answering the question, which is also bad.</p>
]]></description><pubDate>Wed, 26 Jul 2017 19:02:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=14859124</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=14859124</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14859124</guid></item><item><title><![CDATA[New comment by NMDaniel in "Passwords Evolved: Authentication Guidance for the Modern Era"]]></title><description><![CDATA[
<p>If an attacker has root access to your machine, he can easily:
* Extract passwords and session tokens from your browsers
* Keylog your system and wait for you to type a certain password
* MiTM your TLS connection to grab credentials<p>>This is not an argument at all. Let's consider the situation when individual service gets compromised. Attacker has thousands of salted hashes<p>Wait, who said they are hashed? Perhaps an irresponsible webmaster stored them in plaintext. Now, even if that service itself isn't very important, it's likely that certain users re-used the same(or a similar) passwords in more important services, such as Google.<p>Now, while you're right that using a single master password does pose a risk, there aren't other viable solutions to secure password authentication,
unless you;
<i>Memorize a strong password for every service that you use
</i>Never share passwords among the services
<i>Don't store saved logins in your browser
</i>Never link your services to your email (because then if your email account is pwned, your accounts in those services would be pwned too, another "all eggs in one basket" issue)<p>If you can do all of the above, then great, but most people can't.</p>
]]></description><pubDate>Wed, 26 Jul 2017 18:59:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=14859094</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=14859094</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14859094</guid></item><item><title><![CDATA[New comment by NMDaniel in "Passwords Evolved: Authentication Guidance for the Modern Era"]]></title><description><![CDATA[
<p>I think this is actually a case for delegated authentication, you can quite simply let Facebook(or Google,MS or some other trusted auth provider) handle these things
instead of implementing them yourself. Use some form of social login(OAuth2/OpenID Connect)</p>
]]></description><pubDate>Wed, 26 Jul 2017 18:41:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=14858942</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=14858942</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14858942</guid></item><item><title><![CDATA[New comment by NMDaniel in "Passwords Evolved: Authentication Guidance for the Modern Era"]]></title><description><![CDATA[
<p>On a similar note, Keepass can be used without admin rights with the portable version, so you can keep the portable executable along with the encrypted db file in some secure and accessible email account/web service that your network doesn't block.</p>
]]></description><pubDate>Wed, 26 Jul 2017 18:14:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=14858672</link><dc:creator>NMDaniel</dc:creator><comments>https://news.ycombinator.com/item?id=14858672</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14858672</guid></item></channel></rss>