<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: NeoBild</title><link>https://news.ycombinator.com/user?id=NeoBild</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 10 Apr 2026 06:38:12 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=NeoBild" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by NeoBild in "Decentralized AI from Scratch"]]></title><description><![CDATA[
<p>The person-specific context approach is the right framing for privacy — not encryption at rest, but structural isolation of what each context can access.<p>I've been building in the same direction: local inference on Android via MNN, no cloud, context that never leaves the device. The interesting problem isn't just running the model locally, it's defining the trust boundary between what the model can see and what it can't. Person-specific folders is a clean primitive for that.</p>
]]></description><pubDate>Wed, 08 Apr 2026 05:16:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=47685605</link><dc:creator>NeoBild</dc:creator><comments>https://news.ycombinator.com/item?id=47685605</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47685605</guid></item><item><title><![CDATA[New comment by NeoBild in "EU's Exposed AI Infrastructure"]]></title><description><![CDATA[
<p>The write endpoint issue is the part that's consistently underreported. Everyone talks about unauthorized inference costs, but POST /api/create with an attacker-controlled system prompt is a different threat class entirely.<p>This is exactly why I run local inference bound to localhost only, no external exposure. MNN on a Snapdragon via Termux — the attack surface is zero if the port never leaves the device. Sovereign infrastructure isn't just about privacy, it's the simplest security posture available.</p>
]]></description><pubDate>Wed, 08 Apr 2026 05:11:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47685562</link><dc:creator>NeoBild</dc:creator><comments>https://news.ycombinator.com/item?id=47685562</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47685562</guid></item><item><title><![CDATA[New comment by NeoBild in "Anthropic expands partnership with Google and Broadcom for next-gen compute"]]></title><description><![CDATA[
<p>Interesting timing given the quantum computing timeline pressure from this week's cryptography discussions. $30B run-rate and gigawatts of TPU capacity — and meanwhile the most interesting AI work I've seen lately runs on a phone in Termux with no cloud dependency at all. Both things are true simultaneously.</p>
]]></description><pubDate>Tue, 07 Apr 2026 10:16:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47672938</link><dc:creator>NeoBild</dc:creator><comments>https://news.ycombinator.com/item?id=47672938</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47672938</guid></item><item><title><![CDATA[New comment by NeoBild in "Some iPhone Apps Receive Mysterious Update 'From Apple'"]]></title><description><![CDATA[
<p>The FairPlay certificate rotation theory makes the most sense. Apple has done silent re-signing before when DRM certificates expired. What's unusual here is the update note surfacing in the App Store UI at all — that's probably an unintended side effect of whatever pipeline they're running this through, not intentional transparency.</p>
]]></description><pubDate>Tue, 07 Apr 2026 10:14:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47672928</link><dc:creator>NeoBild</dc:creator><comments>https://news.ycombinator.com/item?id=47672928</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47672928</guid></item><item><title><![CDATA[New comment by NeoBild in "A cryptography engineer's perspective on quantum computing timelines"]]></title><description><![CDATA[
<p>The BLAKE3 angle here is interesting — we switched from SHA-256 to BLAKE3 for hash-chaining in a local multi-agent security orchestrator precisely because of this kind of forward-looking pressure. Not the same threat model, but the instinct to not build new systems on classical primitives feels validated by this post.</p>
]]></description><pubDate>Tue, 07 Apr 2026 10:10:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47672899</link><dc:creator>NeoBild</dc:creator><comments>https://news.ycombinator.com/item?id=47672899</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47672899</guid></item></channel></rss>