<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: Reisen</title><link>https://news.ycombinator.com/user?id=Reisen</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 24 Apr 2026 10:11:11 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=Reisen" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by Reisen in "Meta to start capturing employee mouse movements, keystrokes for AI training"]]></title><description><![CDATA[
<p>Wait so the engineers doing novel work are ousted; you fire the engineer that had the skill set to produce the work in the first place? Surely this is creating a Stasi-like neighbour snitching environment with chilling effect where the better you do the faster you become a target for replacement by engineer's incentivized to win points by replacing you. Even being very charitable where the scenario is the code was so poor that the code the employee is working on is so entrenched in domain knowledge they've become a huge bus factor, an LLM is going to make that kind of code worse. I'm struggling to imagine the subset of people this replaces that is not a long term detriment to everyone working there. Those people became "key personnel" for a reason no?</p>
]]></description><pubDate>Tue, 21 Apr 2026 23:19:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47856139</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=47856139</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47856139</guid></item><item><title><![CDATA[New comment by Reisen in "Is Telegram really an encrypted messaging app?"]]></title><description><![CDATA[
<p>I agree with the principle here wholeheartedly. One addendum though is I think this isn't quite the same as the mud puddle test. The idea behind the mud puddle test is if you've forgotten everything, but then manage to recover your data, then the principle must be that someone other than you has to have had access. With Signal, they intentionally refuse to sync data as an extra security step even if you have the keys, the software just refuses to do the syncing step. I'm glad they do personally and I'm not contradicting your point, just adding some notes. Just thought it worth noting.<p>Edit: Actually, yeah that proves your point.</p>
]]></description><pubDate>Sun, 25 Aug 2024 21:15:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=41351506</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=41351506</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41351506</guid></item><item><title><![CDATA[New comment by Reisen in "How LSP could have been better"]]></title><description><![CDATA[
<p>This is something I have been wanting for nearly a decade. A lot of writing software isn't just implementing your logic and abstractions but actively thinking about how to organize code to the constraints of the filesystem. Having to actively model your modules around file paths, Rust for example tightly binding the use of `mod` to your layout. Refactoring is the same, a non-trivial amount of time on large projects when re-factoring is realising you need to re-organise some module hierarchy and that involves modifying the file system too.<p>I really dislike this, instead of a fuzzy file finder I want a fuzzy function finder, where all functions are just kept in a database that I can pull into buffers at will. Where hierarchy is only based on the logical structure of your program and the filesystem ceases exist. "New Function" over "New File". You can get the "Fuzzy Function" finder part somewhat with LSP Symbols, but it doesn't get rid of the having to think about files.<p>Unfortunately I don't think you can get this without first-class support by the language itself, and new languages getting critical adoption isn't a regular thing.</p>
]]></description><pubDate>Thu, 12 Oct 2023 07:17:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=37854361</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=37854361</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37854361</guid></item><item><title><![CDATA[New comment by Reisen in "VPN use is at an all-time high – but are people safe?"]]></title><description><![CDATA[
<p>It's worth considering that spying on DNS is a tremendous privacy leak, much more than "the most they can do" implies. An aware user might configure their system with DoH and use a privacy respecting DNS provider but for many users on a default home connection the ISP is pretty much able to build up a traffic profile of everything you visit and when you visit it. A VPN provider can close this hole too quite easily.<p>Just from DNS, your ISP can:<p>1. Infer shopping habbits.<p>2. Infer which communication services you use (flag users hitting signal.org)<p>3. Infer when you install, update, or open programs based on telemetry DNS, potentially the versions being run, and how long they run for.<p>4. Infer when you're most active, infer sleeping habits.<p>5. Infer probability of health problems if you're hitting more medical sites.<p>6. Infer political alliance from news sites you visit.<p>And much more.<p>Since US congress dropped the rules preventing ISPs selling this data this might be the most insidious thing your ISP can do today.<p>If you believe that a VPN provider is less likely to spy due to it being the incentive for a paying customer, then a VPN with a no-log DNS option is a huge privacy win. I would argue DoH with NextDNS by itself does more for your privacy than any VPN does with IP masking.</p>
]]></description><pubDate>Tue, 04 Jul 2023 14:05:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=36586863</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=36586863</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36586863</guid></item><item><title><![CDATA[New comment by Reisen in "Proton Pass end-to-end encrypted password manager is here and free for everyone"]]></title><description><![CDATA[
<p>I hadn't! I just gave it a shot and it seems sadly it suffers from the same problem. If I try and reply to an email received via SimpleLogin, it leaks my real email address (no option to reply as the receiving address), protonmail-bridge rejects it as a sender as well same as a catch all reply. Unfortunate.<p>Edit: Seems there is a reverse alias option, and seems to work well, will give it an honest go before migrating, thanks for the tip.</p>
]]></description><pubDate>Wed, 28 Jun 2023 21:53:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=36513150</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=36513150</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36513150</guid></item><item><title><![CDATA[New comment by Reisen in "Proton Pass end-to-end encrypted password manager is here and free for everyone"]]></title><description><![CDATA[
<p>Sure. I'm not sure what case you're trying to make. Lack of competition does not mean there is no place for criticism, if the service works for you by all means you should use them if that's the best decision for yourself. These are just my reasons for avoiding a product like Proton Pass from this particular company and why I will migrate away and would not recommend them for users who might be similar to myself.</p>
]]></description><pubDate>Wed, 28 Jun 2023 21:13:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=36512688</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=36512688</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36512688</guid></item><item><title><![CDATA[New comment by Reisen in "Proton Pass end-to-end encrypted password manager is here and free for everyone"]]></title><description><![CDATA[
<p>At least last I checked they didn't have a protonmail-bridge equivalent for IMAP support, so you're locked into the web UI unfortunately. It might be that if you value privacy the best choice at the moment is actually to pick a non-encrypted provider with a strong GDPR/deletion policy and IMAP pull everything and simply keep your account clean by purging the remote at all times.</p>
]]></description><pubDate>Wed, 28 Jun 2023 20:13:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=36511929</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=36511929</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36511929</guid></item><item><title><![CDATA[New comment by Reisen in "Proton Pass end-to-end encrypted password manager is here and free for everyone"]]></title><description><![CDATA[
<p>I am a current user of Proton about to search for a solution to move away from this company, I am quite disappointed in my experience with them in general.<p>1) Their mail import tool reports wrong email set count and sizes leading to low confidence the tool worked, in the end I mbsync'd from both fastmail and proton and compared the email set because the migration UX was so poor (this is reported by other users also).<p>2) Their alias address implementation is severely limited, on Fastmail I used *@domain to have infinite emails, on Proton you have to add every alias you want manually one by one, if you do not, you cannot reply from any address. This is not only limited in the UI, but everywhere, protonmail-bridge for example will reject sending any email that is not in your alias list, and as they limit it to 100 addresses you can't work around it programatically either.<p>3) Their bridge software is buggy, and poorly documented, it's better with the recent release but for a while it made heavy assumptions about your installation and would log you out sporadically, sometimes requiring gpg-agent to be restarted (for no reason I could figure out) before being able to re-auth.<p>4) Their Proton Drive offering is basically useless, it is not available on Linux so can't use it as a target for backup software like Kopia/restic etc, and desktop apps have been in development for as long as I can remember. The WebUI for it will break if you try and drop too many files at once. It has problems with file name limits which don't appear until you try and access the filesystem again; after uploading several documents with extremely long names I found they were straight up inaccessible on my phone or via the web, so as far as I can tell if I hadn't had a second backup I would have lost these files.<p>All this would have been rough, but acceptible for me if I felt their client attention / support was good, but the support I received was terrible. Multi-day back and forths with support agents who did not seem to understand my questions, where with fastmail I would have a technical response to almost any question within an hour.<p>Their uservoice page is full of basic requests that are unanswered after years: <a href="https://protonmail.uservoice.com/" rel="nofollow noreferrer">https://protonmail.uservoice.com/</a><p>I've never regretted migrating to a company as much as I do Proton and I would not recommend switching to their applications, everything feels half baked or limited by poor focus on reaching feature parity with other competing services. The fact I can't do basic catch-all domain with their email service without being forced to reply via a limited alias list (if I can, their support was incapable of telling me how), was my last straw.<p>It's a shame there's basically no other encrypted mail host that competes.</p>
]]></description><pubDate>Wed, 28 Jun 2023 18:11:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=36510328</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=36510328</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36510328</guid></item><item><title><![CDATA[New comment by Reisen in "The Cairo Programming Language"]]></title><description><![CDATA[
<p>This is a correct intuition yes. A program written in Cairo taking your balance (private) and a minimum collateral (public) and outputs a boolean for pass/fail, where the lender can only see "pass/fail" but trust the program was executed correctly is right.<p>However the technology isn't particularly useful in this scenario. It's enough for your bank to just reply to a request with "yes" without running the program because in theory you are forced to trust the bank no matter what as you have no guarantee the bank didn't just lie about your balance in the input to the Cairo program, so in this scenario the proof doesn't bring much. This technology is a lot more useful when the data being verified is combined with something that guarantees that the data input wasn't forged somehow, which is why this is more useful in blockchain environments where all transactions and balances are signed, so someone can't just invent a balance out of thin air.</p>
]]></description><pubDate>Wed, 03 May 2023 13:20:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=35802056</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=35802056</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35802056</guid></item><item><title><![CDATA[New comment by Reisen in "The Cairo Programming Language"]]></title><description><![CDATA[
<p>Paranoia about untrusted hardware is absolutely warranted but just to try and convince you of what this is trying to do. Imagine you have a file that you have never shown anyone, and some untrusted host wants to convince you they also have that file. They can prove this to you without you revealing the file to them (or them to you) by having them send you the hash of the file that you can compare to your own. If it matches there is an overwhelming probability they also have the file even though you completely distrust them or their execution environment. In other words, you are able to verify the computation (via the hash) was executed even though you don't trust them. Cairo is using similar techniques that let you verify other forms of computation than just hashes using more advanced primitives.<p>The obvious caveat to this just as with hashes is you trust the underlying cryptography is secure.</p>
]]></description><pubDate>Wed, 03 May 2023 12:57:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=35801840</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=35801840</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35801840</guid></item><item><title><![CDATA[New comment by Reisen in "New Cryptographic Tools on Keybase"]]></title><description><![CDATA[
<p>I use Keybase as a daily driver and I really love the platform, but almost every other chat client I use when switching from Keybase feels butter smooth in comparison. These tools look like a great addition, and the Stellar integration is something I think has a lot of potential if it ends up being able to manage other wallets as well.<p>I just really wish more love would go into the UX of the application. I have duplicate undeletable conversations with contacts, duplicate folders in KBFS that I cannot delete or access which cause I/O errors in tools that do full system scans. I keep running into errors in the UI with obscure error codes that I keep reporting to no avail. There are currently 3,292~ open issues on Github at the time of writing so it's difficult to track what the team is focusing on.<p>Everything feels just a little too janky.<p>Still, I don't believe there is any other decent alternative to Keybase that offers the same identity based mechanism for communication, and Keybase absolutely nails that. I can message half the users on HN with very little friction. People can encrypt and send me documents without registering with a single page view. A bit of polish and I think Keybase could shine, but right now It's hard to suggest as a Slack alternative.</p>
]]></description><pubDate>Fri, 31 Jan 2020 20:12:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=22205141</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=22205141</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22205141</guid></item><item><title><![CDATA[New comment by Reisen in "The Lx Programming Language"]]></title><description><![CDATA[
<p>It makes me so happy to see more rewrite based languages. Another one that is extremely cool that I almost never see brought up is [pure][1][2].<p>[1]: <a href="https://agraef.github.io/pure-lang/" rel="nofollow">https://agraef.github.io/pure-lang/</a>  
[2]: <a href="https://github.com/agraef/pure-lang/wiki/PureIntro" rel="nofollow">https://github.com/agraef/pure-lang/wiki/PureIntro</a></p>
]]></description><pubDate>Sat, 02 Nov 2019 14:25:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=21427859</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=21427859</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21427859</guid></item><item><title><![CDATA[New comment by Reisen in "The most advanced MySQL raytracer on the market"]]></title><description><![CDATA[
<p>I really appreciate comments like this for the quick time save they offer. Thank you for this comment, it was the most useful in this post for me.</p>
]]></description><pubDate>Fri, 11 Oct 2019 00:38:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=21220560</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=21220560</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21220560</guid></item><item><title><![CDATA[New comment by Reisen in "Noclip"]]></title><description><![CDATA[
<p>This is amazing.<p>I can't believe how stunning some of these level's look on what seems to be very little processing. If the "Statistic's" panel is right for example, the entire Shadow Temple in Ocarina of Time 3D is being rendered in just 29 draw calls and 8104 triangles and honestly it looks better than half the games that come out today.<p>I feel like level design isn't quite as clever as it used to be.</p>
]]></description><pubDate>Sat, 23 Feb 2019 22:29:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=19235849</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=19235849</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19235849</guid></item><item><title><![CDATA[New comment by Reisen in "Rocket v0.4: Typed URIs, Database Support, Revamped Queries"]]></title><description><![CDATA[
<p>There's some super exciting stuff in this release, but what caught my eye was this:<p>> Aynchronous Request Handling (#17)
> 
> In 0.5, Rocket will migrate to the latest asynchronous version of hyperand futures with compatibility for async/await syntax. Of utmost importance is preserving Rocket's usability. As such, these changes will be largely internal, with asynchronous I/O peeking over the covers only when explicitly desired or required. As a side effect, we expect a substantial performance boost from the migration as well as resolution to long-standing issues.<p>Lacking async was my main reason at the time for switching out a hobby project from Rocket to Actix, It's exciting to see that this might change soon as Rocket really just hits the nail on the head when it comes to useability. It _feels_ fantastic compared to so many frameworks both in Rust and other languages.</p>
]]></description><pubDate>Sat, 08 Dec 2018 18:25:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=18636637</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=18636637</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18636637</guid></item><item><title><![CDATA[New comment by Reisen in "Math and Analogies"]]></title><description><![CDATA[
<p>Kind of a nice proof of his point! We're not used to the numbers, people would be far less likely to make the mistake with 1997.</p>
]]></description><pubDate>Wed, 28 Nov 2018 21:40:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=18555930</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=18555930</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18555930</guid></item><item><title><![CDATA[New comment by Reisen in "Chicken Scheme 5.0"]]></title><description><![CDATA[
<p>One of the best intros to generational garbage collection is on chicken internals[1]. If you've ever wondered about GCs I thoroughly recommend giving the article a read, it's full of interesting asides as well.<p>I think I would use chicken more but usually when reaching for scheme it seems to be because I want something embeddable. Even so, extremely excited about this release!<p>[1]: <a href="https://www.more-magic.net/posts/internals-gc.html" rel="nofollow">https://www.more-magic.net/posts/internals-gc.html</a></p>
]]></description><pubDate>Thu, 08 Nov 2018 08:45:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=18405108</link><dc:creator>Reisen</dc:creator><comments>https://news.ycombinator.com/item?id=18405108</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18405108</guid></item></channel></rss>