<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: Perseids</title><link>https://news.ycombinator.com/user?id=Perseids</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 20 May 2026 12:26:54 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=Perseids" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by Perseids in "Restore full BambuNetwork support for Bambu Lab printers"]]></title><description><![CDATA[
<p><i>All</i> of their issues are self-inflicted. What benefit is there to their cloud backend except getting around the home NAT? If you want to build your IoT product privacy-friendly, your cloud offering can be reduced to a STUN/rendezvous server and a proxy server as fallback [1]. Ship your devices with individual tokens to rate limit the proxy, have the STUN/rendezvous/proxy server  address configurable and publish their source code for users to not be dependent on your continuous operation.<p>You can even go so far and have a public sub domain for each devices ( serialnumber.manufacturer.com ) which you only operate as a dumb proxy so that even the TLS certificates are negotiated end-to-end between the IoT device and Let's Encrypt. (The devices connect to your backend via Wireguard and you rate limit with their device individual key, whose public key you read out during the end-of-line production step.)<p>Hell, with today's browser heavy applications you can even run the whole slicer in the browser. Let the app be distributed via CDN so the code does not need to go through the proxy.<p>[1] In the case of non-battery operated and always or mostly on devices, like 3d printers at least.</p>
]]></description><pubDate>Wed, 13 May 2026 10:46:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=48120217</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=48120217</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48120217</guid></item><item><title><![CDATA[New comment by Perseids in "Talking to strangers at the gym"]]></title><description><![CDATA[
<p>Do try to follow the advice of my sibling comments, but its also okay to find out you are simply <i>really</i> bad at remembering names. I think I'm in the bottom 10% percent in that regard. The only way I can somewhat manage to remember the names of the people I would like to is to use Anki (spaced repetition) on a semi-daily bases. This comes down to what others would consider a crazy amount of work, but at least it is somewhat successful. It frustrating for the long tail of people I might not meet again, but where it still would be really helpful to know their name. Where I really fail is situations that don't allow me to write down names shortly after they were used, which is often the case in introduction rounds. Trying to constantly repeat all names in my head means I'm missing on the other stuff people say.</p>
]]></description><pubDate>Mon, 04 May 2026 21:03:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=48014970</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=48014970</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48014970</guid></item><item><title><![CDATA[New comment by Perseids in "HERMES.md in commit messages causes requests to route to extra usage billing"]]></title><description><![CDATA[
<p>A side aspect of this drama is the root feature which enabled this bug:<p>> ugh sorry this was a bug with the 3rd party harness detection and how we pull git status into the system prompt<p>Claude wants to exercise control of how I use the "inclusive volume" that I purchased with my monthly subscription. This harms competition (someone else could write a more efficient or safer coding agent) and is generally not in the best interest of society. Why do we allow this?<p>This specific case is interesting, because it is so clear cut. There is no cross financing via ads, they already have the infrastructure to measure usage and even the infrastructure to bill extra usage. I also don't see how you can plausible make the argument that restricting usage to their blessed client is necessary for fair use or for the basic structure of their business model (this would be the standard argument for e.g. Youtube: Purposefully degrading the experience of their free client to not support background playback enables the subscription model).</p>
]]></description><pubDate>Wed, 29 Apr 2026 23:09:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47955898</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=47955898</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47955898</guid></item><item><title><![CDATA[New comment by Perseids in "Stop Flock"]]></title><description><![CDATA[
<p>This is the important point. You need the right to not be discriminated when you withhold your consent, otherwise your consent is effectively meaningless, as it is forced on you by your impossible bargaining position. This is one of the central pillars of the GDPR without which it wouldn't work at all. Be advised to make asking customers for consent that doesn't directly benefit them illegal as well, lest you risk creating another wave of malicious cookie banners.</p>
]]></description><pubDate>Wed, 15 Apr 2026 06:40:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47775501</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=47775501</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47775501</guid></item><item><title><![CDATA[New comment by Perseids in "A cryptography engineer's perspective on quantum computing timelines"]]></title><description><![CDATA[
<p>> This is like saying we should have halted all RSA deployments until improvements in sieving stopped happening.<p>Absolutely not. If people were advocating for ECC only, you would have a point. But this thread is about hybrids vs ML-KEM-only (for key exchange!). Everybody here wants to deploy the algorithm your favoring and wants to deploy it now, just not without a safety net.</p>
]]></description><pubDate>Wed, 08 Apr 2026 07:02:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=47686372</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=47686372</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47686372</guid></item><item><title><![CDATA[New comment by Perseids in "A cryptography engineer's perspective on quantum computing timelines"]]></title><description><![CDATA[
<p>Off the top of my head?<p>Pro hybrid: Negligible performance impact (negligible for battery devices, negligible for data send over the wire (number of packets -> sub-discussion about specific circumstances, time on the air for cellular), negligible for speed, negligible code size increase), little implementation effort as every library already has ECC in it, ML-KEM is too new (yes actually old, but far less research interest, implementations new), conservative design choice<p>Pro ML-KEM only / produce a TLS RFC for non-hybrid ML-KEM: Reduction in complexity, reduction of transitions (non-hybrid is going to be the final state, so lets skip ahead already), lattice crypto is actually an old branch of cryptography (discussion over different metrics), NSA says its secure for government use, NSA stipulates use of non-hybrid and we want/need to be compatible, we want/need to have a well defined place to have a reference, if people are going to write an RFC to document non-hybrid ML-KEM let us at least have influence over what is written there, better performance (speed, data on the wire, number of packets in handshake, energy budget), actually the non-hybrid TLS connection is intended to be the inner one while the outer transport is secured with classic cryptography (or vice versa) so hybrids are a complete waste, for any interesting timeline ECC is broken anyway so it is a useless burden, we just want choice dammit, don't undermine the process dammit.<p>Pro hybrid only / don't produce a TLS RFC for non-hybrid ML-KEM: Let's not make it easy for people to choose wrongly by accident/incompetence/malice, actually no complexity reduction as implementations still need to implement hybrids to be compatible, TLS WG publishing something has weight and might sway others to consider non-hybrid ML-KEM, NSA might have pushed for non-hybrid ML-KEM because they believe only they can break it, don't care if US institutions are pushing for non-hybrid ML-KEM for weird internal political reasons, don't you see how this is all a ploy to weaken our crypto <i>again</i>?, don't undermine the process dammit.<p>Did I forget any important talking point? The TLS WG discussion is actually quite tiresome. For anybody new the party, here is a random pointer for a current thread: <a href="https://mailarchive.ietf.org/arch/msg/tls/7OGS_X1e-zG8O0eRJPLKdmYcpU8/" rel="nofollow">https://mailarchive.ietf.org/arch/msg/tls/7OGS_X1e-zG8O0eRJP...</a></p>
]]></description><pubDate>Tue, 07 Apr 2026 16:25:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=47677736</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=47677736</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47677736</guid></item><item><title><![CDATA[New comment by Perseids in "A cryptography engineer's perspective on quantum computing timelines"]]></title><description><![CDATA[
<p>> How do you mean the risk profile is comparable<p>Exactly in the way the succeeding sentence defines: "For both cases there are credible expert opinions that say the risk is incredibly overrated and credible expert opinions that say the risk is incredible underrated."<p>> when ECDH is nearly guaranteed to be broken in five years<p>Most of your argument (and that of many others pushing the contra-hybrid point) hinges on this. I don't think this position is justified. I believe there is <i>significant</i> risk for quantum attacks in the near term (and thus fully support the speedy adoption of hybrids), yes, but quite far away from certainty. Personally, I'd even say better than coin-flip is pushing it. I mean, look at what Scott Aaronson is writing on that matter:<p>"I also continue to profess ignorance of exactly how many years it will take to realize those principles in the lab, and of which hardware approach will get there first. […] This year [=2025] updated me in favor of taking more seriously the aggressive pronouncements—the “roadmaps”—of Google, Quantinuum, QuEra, PsiQuantum, and other companies about where they could be in 2028 or 2029." -- <a href="https://scottaaronson.blog/?p=9425" rel="nofollow">https://scottaaronson.blog/?p=9425</a><p>This is nothing like "nearly guaranteed" in five years.<p>> and Kyber is two decades old<p>But the <i>implementations</i> aren't and it's not been under heavy scrutiny for that long. One can very much make the point that we weren't that critical when elliptic curve cryptography entered the scene, but we <i>do</i> now have the luxury to have these heavily battle-tested primitives and implementations at our disposal, so why throw them out of the window so eagerly? Also an interesting comparison to elliptic curve cryptography is that it took until 2005 to get <i>good</i> key exchanges primitives and until 2011 to get good signature primitives (Curve25519, now known as X25519, and Ed25519 respectively) and mainstream availability of those took waaaay longer.<p>Coming back to this again, for second remark:<p>> when ECDH is nearly guaranteed to be broken in five years<p>Another important point is all quantum attack on ECDH will require inherently expensive equipment for the foreseeable future, see adgjlsfhk1's comment <a href="https://news.ycombinator.com/item?id=47665561">https://news.ycombinator.com/item?id=47665561</a> , whereas a stupid Kyber implementation error in a mainstream library can very likely end up being attackable by a Metasploit plugin. Our threat model should most definitely include nation state attackers prominently, but these are not at all the only attackers that we should focus on. There is still significant value in keeping out attackers that did not spend >100k$ on equipment.<p>> Yes, djb keeps making the same crankish complaint without any evidence or reason, that doesn't mean you have to repeat it uncritically.<p>I did not repeat it uncritically, I just happen to share his conclusion, even after months of following the pro and contra discussion. Also, how can you say he complains without reason? He has explained them at length, see <a href="https://cr.yp.to/2025/20250812-non-hybrid.pdf" rel="nofollow">https://cr.yp.to/2025/20250812-non-hybrid.pdf</a> for example. Whether his methods of complaining are commendable or effective is another topic, though.</p>
]]></description><pubDate>Tue, 07 Apr 2026 13:26:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47675060</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=47675060</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47675060</guid></item><item><title><![CDATA[New comment by Perseids in "A cryptography engineer's perspective on quantum computing timelines"]]></title><description><![CDATA[
<p>The argument is that deploying PQ-authentication mechanisms takes time. If the authenticity of some connections (firmware signatures, etc…) is critical to you and news comes out that (")cheap(") quantum attacks are going to materialize in six months, but you need at least twelve months to migrate, you are screwed.<p>There is also a difference between closed ecosystems and systems that are composed of components by many different vendors and suppliers. If you are Google, securing the connection between data centers on different continents requires only trivial coordination. If you are an industrial IoT operator, you require dozens of suppliers to flock around a shared solution. And for comparison, in the space of operation technology ("OT"), there are still operators that choose RSA for new setups, because that is what they know best. Change happens in a glacial pace there.</p>
]]></description><pubDate>Tue, 07 Apr 2026 07:58:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47672033</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=47672033</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47672033</guid></item><item><title><![CDATA[New comment by Perseids in "A cryptography engineer's perspective on quantum computing timelines"]]></title><description><![CDATA[
<p>Super important: Don't <i>replace</i> traditional (elliptic curve) Diffie-Hellman with ML-KEM, but enhance it by using <i>hybrid key exchanges</i>. Done thusly, you need to break both the classical and post-quantum cryptography to launch an attack.<p>If you worry about a >=1% risk of quantum attacks being available soon, you should also worry about a >=1% risk of the relatively new ML-KEM being broken soon. The risk profile is pretty comparable. For both cases there are credible expert opinions that say the risk is incredibly overrated and credible expert opinions that say the risk is incredible underrated.<p>Filippo has linked opinions that quantum attacks are right around the corner. People like Dan Bernstein (djb) are throwing all their weight to stress that anything but hybrids are irresponsible. I don't think there is anybody that says "hybrids are a bad idea", just people that want to make it easy to choose non-hybrid ML-KEM.</p>
]]></description><pubDate>Tue, 07 Apr 2026 07:32:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=47671858</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=47671858</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47671858</guid></item><item><title><![CDATA[New comment by Perseids in "Elon Musk pushes out more xAI founders as AI coding effort falters"]]></title><description><![CDATA[
<p>Thanks, I can very much agree with that.<p>Re Oppenheimer: I know. My point was that he very much knew what his work was being used for, as should people working at xAI at the moment.</p>
]]></description><pubDate>Sat, 14 Mar 2026 01:10:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47372228</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=47372228</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47372228</guid></item><item><title><![CDATA[New comment by Perseids in "Elon Musk pushes out more xAI founders as AI coding effort falters"]]></title><description><![CDATA[
<p>Yes, yes, true, but you've massively moved the goalpost. The original commenter was referring to people working at xAI <i>right now</i>. To continue your comparison, your argument would be like Oppenheimer claiming "How could I have ever known my work would be used as a weapon? I just wanted to make big explosions."<p>I don't know why this argument often pops up in these kinds of discussions. Approximately no one is judging people who have done their best effort to avoid doing harm. We are judging people who don't care in the first place.</p>
]]></description><pubDate>Sat, 14 Mar 2026 00:40:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47372001</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=47372001</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47372001</guid></item><item><title><![CDATA[New comment by Perseids in "3D-Knitting: The Ultimate Guide"]]></title><description><![CDATA[
<p>> on-demand can never compete with mass production even if a big part of the mass produced stuff is discarded.<p>This is definitely not universally true. E.g. photos are very cheaply printed on demand. Even on-demand books are printed at reasonable prices. Sure, mass production is cheaper (both for books and pictures), but the value difference of the individual product is high enough to bridge the price gap.<p>For cloth this area has found little exploration. TFA covers production at niche scale. If you would mass produce the looms to reduce the capital expense and heavily lean into customer value, e.g. individual fittings via 3d scans, as my sister comment proposes, or even just letting me customize my sweater with motive, color choice, garment etc., this could radically change the cost to value ratio. The company that has published TFA sells extremely bland apparel in a shop that looks just like any mass produced clothing shop and leaves <i>all</i> of the customer value of custom production on the table.<p>Last but not least: This "3d knitting" seems to need only a fraction of the labor of traditional sewed clothes. If textile production didn't default to underpaid labor under precarious working conditions in low income countries, it would probably already be cheaper.</p>
]]></description><pubDate>Thu, 12 Mar 2026 11:47:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47349323</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=47349323</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47349323</guid></item><item><title><![CDATA[New comment by Perseids in "Where things stand with the Department of War"]]></title><description><![CDATA[
<p>> But what is the option? I feel each of us wants to draw a line based off of our morality but the circumstances don't allow us to stick to it (still gotta pay rent)<p>I was with you up to this point, but when you say "life is to hard to stay moral" I am thinking about how buying the wrong shampoo contributes to micro plastic in the ocean, or how buying a fitting jeans that is not exploiting labor is an extremely time intensive endeavor, or how avocados may be vegan but often produced unsustainable. Basically I thought you were making this point from The Good Place <a href="https://www.youtube.com/watch?v=Lci6P1-jMV8" rel="nofollow">https://www.youtube.com/watch?v=Lci6P1-jMV8</a> .<p>But when you are working in IT, an industry that is generally still very well of, avoiding an employer that is actively making the world a worse place, is a low bar to cross. It's just one decision every few years, which also is comparatively easy to research (you are probably doing it as your normal preparation for the job interview anyway) and the impact of that decision is enormous in comparison to most other decisions you make, so it's well worth it to ponder a bit.</p>
]]></description><pubDate>Fri, 06 Mar 2026 08:27:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47272421</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=47272421</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47272421</guid></item><item><title><![CDATA[New comment by Perseids in "Prism"]]></title><description><![CDATA[
<p>I'm dumbfounded they chose the name of the infamous NSA mass surveillance program revealed by Snowden in 2013. And even more so that there is just one other comment among 320 pointing this out [1]. Has the technical and scientific community in the US already forgotten this huge breach of trust? This is especially jarring at a time where the US is burning its political good-will at unprecedented rate (at least unprecedented during the life-times of most of us) and talking about digital sovereignty has become mainstream in Europe. As a company trying to promote a product, I would stay as far away from that memory as possible, at least if you care about international markets.<p>[1] <a href="https://news.ycombinator.com/item?id=46787165">https://news.ycombinator.com/item?id=46787165</a></p>
]]></description><pubDate>Wed, 28 Jan 2026 07:12:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=46792035</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=46792035</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46792035</guid></item><item><title><![CDATA[New comment by Perseids in "How uv got so fast"]]></title><description><![CDATA[
<p>You misunderstand. The <i>physicists</i> are developing their <i>own</i> software to analyze their experimental data. They typically have little software development experience, but there is seldom someone more knowledgeable available to support them. Making matters worse, they often are not at all interested in software development and thus also don't invest the time to learn more than the absolute minimum necessary to solve their current problem, even if it could save them a lot of time in the long run. (Even though I find the situation frustration, I can't say I don't relate, given that I feel the same way about LaTeX.)</p>
]]></description><pubDate>Sat, 27 Dec 2025 08:14:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=46400132</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=46400132</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46400132</guid></item><item><title><![CDATA[New comment by Perseids in "I'm just having fun"]]></title><description><![CDATA[
<p>I wish non-conformity was more of a thing at points where it actually matters. Your product manager asks you to add invasive user tracking and surveillance? Push back and explain how this makes the world a worse place. Got a ticket to implement a "[yes][ask me later]" dialog [1]? Make a short survey that shows how user hate it. Nobody listens to you? Refuse to comply. The government requires you to take deeply unethical or unlawful actions? <i>Sabotage the feature</i> [2] (or quit/resign).<p>Performative non-conformance might be e.g. helpful to nurture a culture of critical thinking, but if it is <i>just</i> performative, then it is worthless.<p>(I write this with no intent to criticize you, burningChrome, or Jyn. You might very well do just that.)<p>(Also, I'm aware that the ability to push back is very unevenly distributed. I'm addressing those that can afford this agency. And also, non-conformance is spectrum: You can also push back a little without choosing the specific point to be the hill to die on. Every bit counts.)<p>[1] <a href="https://idiallo.com/blog/hostile-not-enshittification" rel="nofollow">https://idiallo.com/blog/hostile-not-enshittification</a><p>[2] <a href="https://www.404media.co/heres-a-pdf-version-of-the-cia-guide-to-sabotaging-fascism/" rel="nofollow">https://www.404media.co/heres-a-pdf-version-of-the-cia-guide...</a></p>
]]></description><pubDate>Mon, 22 Dec 2025 11:39:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=46353366</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=46353366</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46353366</guid></item><item><title><![CDATA[New comment by Perseids in "CO2 batteries that store grid energy take off globally"]]></title><description><![CDATA[
<p>To cite and expand on lambdaone below [1]:<p>> Clearly power capacity cost (scaling compressors/expanders and related kit) and energy storage cost (scaling gasbags and storage vessels) are decoupled from one another in this design<p>Lambdaone is differentiating between the costs to store <i>energy</i> (measured in kWh or Joules) and the costs to store energy per time (which is <i>power</i>, measured in Watts). If you want to store the whole excess energy that solar panels and wind turbines generate on a sunny, windy day, you need to have a lot of power storage capability (gigawatts of power generated during peak power generation). This can be profitable even if you only have a low energy storage capability, e.g. if you can only store a day worth of excess solar/wind energy, because you can sell this energy in the short term, for example in the next night, when the data centers are still running, but solar panels don't produce power. This is what batteries give you -- high <i>power</i> storage capabilities but low <i>energy</i> storage capacities.<p>Of course, you can always buy more batteries to increase the energy storage capacities, but they are very expensive per energy (kWh) stored. In contrast, these CO2 "batteries" are very cheap per energy (kWh) stored -- "just" build more high pressure tanks -- but expensive per power (Watts) stored, because to store more power, you need to build more expensive compressors, coolers etc. This ability to scale out the energy storage capability independently of the power storage capability is what Lambdaone was referring to with the decoupling.<p>For what is this useful? For shifting energy over a larger amount of time. Because <i>energy</i> storage costs of batteries are so high, they are a bad fit for storing excess energy in the summer (lots of solar) and releasing it in the winter (lots of heating). I'm not sure if these "CO2" batteries are good for such long time frames (maybe pressure loss is too high), but the claim most certainly is that they can shift energy over a longer time frame than is possible with batteries <i>in an economically profitable fashion</i>.<p>[1] <a href="https://news.ycombinator.com/item?id=46347251">https://news.ycombinator.com/item?id=46347251</a></p>
]]></description><pubDate>Mon, 22 Dec 2025 09:50:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=46352694</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=46352694</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46352694</guid></item><item><title><![CDATA[New comment by Perseids in "CBP is monitoring US drivers and detaining those with suspicious travel patterns"]]></title><description><![CDATA[
<p>> But that's literally the question I'm asking. Where do you draw the line in a way that stops what we consider to be abuses, but doesn't stop what we think of as legitimate uses by journalists, academics, etc.?<p>I think the wrong assumption you're making, is that there is supposed to be a simple answer, like something you can describe with a thousand words. But with messy reality this basically never the case: Where do you draw the line of what is considered a taxable business? What are the limits of free speech? What procedures should be paid by health insurance?<p>It is important to accept this messiness and the complexity it brings instead of giving up and declaring the problem unsolvable. If you have ever asked yourself, why the GDPR is so difficult and so multifaceted in its implications, the messiness you are pointing out is the reason.<p>And of course, the answer to your question is: Look at the GDPR and European legislation as a precedent to where you draw the line <i>for each instance and situation</i>. It's not perfect of course, but given the problem, it can't be.</p>
]]></description><pubDate>Thu, 20 Nov 2025 23:22:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=45999272</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=45999272</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45999272</guid></item><item><title><![CDATA[New comment by Perseids in "AWS multiple services outage in us-east-1"]]></title><description><![CDATA[
<p>> If people moved to other providers, things would still go down, more likely than not it would be more downtime in aggregate, just spread out so you wouldn't notice as much.<p>That is the point, though: Correlated outages are worse than uncorrelated outages. If one payment provider has an outage, chose another card or another store and you can still buy your goods. If all are down, no one can shop anything[1]. If a small region has a power blackout, all surrounding regions can provide emergency support. If the whole country has a blackout, all emergency responders are bound locally.<p>[1] Except with cash – might be worth to keep a stash handy for such purposes.</p>
]]></description><pubDate>Tue, 21 Oct 2025 06:29:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=45653040</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=45653040</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45653040</guid></item><item><title><![CDATA[370k Grok AI chats made public without user consent]]></title><description><![CDATA[
<p>Article URL: <a href="https://9to5mac.com/2025/08/20/370k-grok-ai-chats-made-public-without-user-consent/">https://9to5mac.com/2025/08/20/370k-grok-ai-chats-made-public-without-user-consent/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44961381">https://news.ycombinator.com/item?id=44961381</a></p>
<p>Points: 1</p>
<p># Comments: 1</p>
]]></description><pubDate>Wed, 20 Aug 2025 12:39:52 +0000</pubDate><link>https://9to5mac.com/2025/08/20/370k-grok-ai-chats-made-public-without-user-consent/</link><dc:creator>Perseids</dc:creator><comments>https://news.ycombinator.com/item?id=44961381</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44961381</guid></item></channel></rss>