<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: ShowalkKama</title><link>https://news.ycombinator.com/user?id=ShowalkKama</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 06 Apr 2026 02:47:05 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=ShowalkKama" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by ShowalkKama in "Caveman: Why use many token when few token do trick"]]></title><description><![CDATA[
<p>the fact that more tokens = more smart should be expected given cot / thinking / other techniques that increase the model accuracy by using more tokens.<p>Did you test that ""caveman mode"" has similar performance to the ""normal"" model?</p>
]]></description><pubDate>Sun, 05 Apr 2026 12:09:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47648543</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47648543</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47648543</guid></item><item><title><![CDATA[New comment by ShowalkKama in "Gone (Almost) Phishin'"]]></title><description><![CDATA[
<p>step 1) use a password mamager
step 2) forget your own password
step 3) witness the password mamager NOT autofill on phishing sites</p>
]]></description><pubDate>Thu, 02 Apr 2026 13:26:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47614182</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47614182</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47614182</guid></item><item><title><![CDATA[New comment by ShowalkKama in "Swappa.com for GrapheneOS compatible devices – Stay Away"]]></title><description><![CDATA[
<p>>I don't care about google pay/wallet<p>and if you did you could use curve pay instead. Basically the same thing with more features, the only catch is that they charge FX fees after surpassing a limit (but that can be mitigated by paying with the same currency of your linked card, thus never executing a change in the first place)</p>
]]></description><pubDate>Wed, 01 Apr 2026 23:47:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47608171</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47608171</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47608171</guid></item><item><title><![CDATA[New comment by ShowalkKama in "Netflix raises prices for every subscription tier by up to 12.5 percent"]]></title><description><![CDATA[
<p>you can get a seedbox with 1T of storage for about 6€/month.
That gives you access to basically all popular movies and tv series in 4k, most media in 1080p and spotty access to older/niche releases you'd not be able to watch on mainstream streaming platforms.</p>
]]></description><pubDate>Fri, 27 Mar 2026 18:55:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=47546780</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47546780</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47546780</guid></item><item><title><![CDATA[New comment by ShowalkKama in "Mozilla to launch free built-in VPN in upcoming Firefox 149"]]></title><description><![CDATA[
<p><a href="https://www.pornhub.com/blog/age-verification-in-the-news" rel="nofollow">https://www.pornhub.com/blog/age-verification-in-the-news</a><p>Over the past year, Pornhub had to make the difficult decision to block access to users in the following American states due to Age Verification laws:<p><pre><code>    Alabama
    Arizona
    Arkansas
    Florida
    Georgia
    Idaho
    Indiana
    Kansas
    Kentucky
    Mississippi
    Missouri
    Montana
    Nebraska
    North Carolina
    North Dakota
    Oklahoma
    South Carolina
    South Dakota
    Tennessee
    Texas
    Utah
    Virginia
    Wyoming</code></pre></p>
]]></description><pubDate>Thu, 19 Mar 2026 06:44:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47435761</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47435761</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47435761</guid></item><item><title><![CDATA[New comment by ShowalkKama in "Mozilla to launch free built-in VPN in upcoming Firefox 149"]]></title><description><![CDATA[
<p>> You can use them for whatever protocol you want.<p>the two most commons protocols used for proxying traffic support arbitrary tcp traffic.
socks is quite self explanatory but http is not limited to https either!<p>Of course most providers might block non https traffic by doing DPI or (more realistically) refusing to proxy ports other than 80/443 but nothing is inherent to the protocol.<p>edit:
this is also mentioned on MDN: <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Methods/CONNECT" rel="nofollow">https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/...</a><p>> Aside from enabling secure access to websites behind proxies, a HTTP tunnel provides a way to allow traffic that would otherwise be restricted (SSH or FTP) over the HTTP(S) protocol.<p>> If you are running a proxy that supports CONNECT, restrict its use to a set of known ports or a configurable list of safe request targets<p>> A loosely-configured proxy may be abused to forward traffic such as SMTP to relay spam email, for example.</p>
]]></description><pubDate>Thu, 19 Mar 2026 06:34:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47435694</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47435694</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47435694</guid></item><item><title><![CDATA[New comment by ShowalkKama in "How kernel anti-cheats work"]]></title><description><![CDATA[
<p>under the doctrine that software "trust" is needed YOU are the attacker. It's entirely about stripping your control (thus ownership) from the hardware you paid for (see the safetynet shitshow).</p>
]]></description><pubDate>Sun, 15 Mar 2026 22:35:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47392726</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47392726</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47392726</guid></item><item><title><![CDATA[New comment by ShowalkKama in "I Got Root on Meta AI's Infrastructure Using a Chat Prompt"]]></title><description><![CDATA[
<p>wer impact?<p>Just because you have root it doesn't mean it's a vulnerability. Can he read the data of other customers? Can he interact with the internal network?
Do you want to know how you can get code execution on microsoft's servers? Easy, go to github and spin up a github action.<p>The SSRF section does NOT prove SSRF, just because you can make a server interact with attacker supplied urls it doesn't automatically mean it can reach internal things and it does not automatically mean it's exploitable, far from it.<p>The user location leak is also not a leak since it's fair to assume that the user already knows his own physical location. It'd be interesting if there was a way to reveal the location of other users but alas that isn't mentioned, let alone proved.</p>
]]></description><pubDate>Tue, 10 Mar 2026 23:52:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47330259</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47330259</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47330259</guid></item><item><title><![CDATA[New comment by ShowalkKama in "Uber is letting women avoid male drivers and riders in the US"]]></title><description><![CDATA[
<p>Uber could ask for it but the customer does not have more information</p>
]]></description><pubDate>Mon, 09 Mar 2026 20:42:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47315225</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47315225</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47315225</guid></item><item><title><![CDATA[New comment by ShowalkKama in "Uber is letting women avoid male drivers and riders in the US"]]></title><description><![CDATA[
<p>No, that's a question.
I imagine it's not that since the rest of my comment is dedicated to pointing out how that'd be racist.
I was trying to make you explain what exactly the difference is since you didn't clearly define it in your reply.</p>
]]></description><pubDate>Mon, 09 Mar 2026 20:41:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47315208</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47315208</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47315208</guid></item><item><title><![CDATA[New comment by ShowalkKama in "Payment fees matter more than you think"]]></title><description><![CDATA[
<p>If the payment method is skimmer resistant then they cannot use my payment method...<p>Also my entire point is that I <i>don't</i> need a card, paying with an app would be acceptable.</p>
]]></description><pubDate>Mon, 09 Mar 2026 20:30:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47315030</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47315030</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47315030</guid></item><item><title><![CDATA[New comment by ShowalkKama in "Uber is letting women avoid male drivers and riders in the US"]]></title><description><![CDATA[
<p>>If someone is presenting themselves to you in person for entry into your bar, you have far more information to make a judgement on than the color of their skin... so it is not the same.<p>So the difference between "good" discrimination and "bad" discrimination is the amount of information on which the decision is based upon?<p>Logically then uber could add a "white only" option, "no queer" and "no leftist". 
(of course this is arbitrary but you can easily come up with a reason why: if you split any group of real people in two it's only natural that one group has an higher incidence of a negative trait)<p>This also has a second problem: what if we let the passenger know not only the sex but also if the driver ate fish in the morning (and hundreds of other useless facts)? Does that make it discrimination because they have far more information?<p>I guess not but then how do you decide what information is valuable in order to decide if there is enough information to judge the individual instead of going off statistics?
How can you say that our theoretical racist patron is in fact racist and not going off the only valuable information?</p>
]]></description><pubDate>Mon, 09 Mar 2026 20:25:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=47314944</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47314944</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47314944</guid></item><item><title><![CDATA[New comment by ShowalkKama in "Uber is letting women avoid male drivers and riders in the US"]]></title><description><![CDATA[
<p>the fact that skin color can be a proxy for socioeconomic factors does not change the statistics.
Do you investigate why a rapist has raped someone and then ignore it if the reason is socioeconomic factors?<p>If applying your logic on skin color leads to discrimination then maybe it's discrimination even when the discriminated party is males.</p>
]]></description><pubDate>Mon, 09 Mar 2026 20:14:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=47314816</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47314816</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47314816</guid></item><item><title><![CDATA[New comment by ShowalkKama in "Uber is letting women avoid male drivers and riders in the US"]]></title><description><![CDATA[
<p>> Allowing women to make a selection based on this likelihood means that female customers that are alone can make choices to still use the service while reducing the overall risk.<p>I'm failing to see how anything you say could be used as a guideline to pick between "good" discrimination and "bad" discrimination.
The major distinction you draw between "Type II" and "Type I" is the fact that one is fueled by "arbitrary aversion" which is not a particularly useful distinction.<p>What if I denied entry to black people from my bar because ""they commit more crimes"" and ""are more likely to break stuff"", is it morally ok? Why not?
My opinion is that no, it's not ok because the majority of people punished were never going to behave in an uncivil way.<p>The same logic can be easily applied to this situation. Are men more likely to behave sexually inappropriately (which ranges from verbal harassment to assault)? Sure.
Is it the majority? Hell no, it's nowhere close.<p>(Of course it's worth nothing that the "majority" does not necessarily have 50.01%, it's just an arbitrary line you can draw as long as you are consistent about it)</p>
]]></description><pubDate>Mon, 09 Mar 2026 20:00:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47314630</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47314630</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47314630</guid></item><item><title><![CDATA[New comment by ShowalkKama in "No right to relicense this project"]]></title><description><![CDATA[
<p>If your backend is trivial enough to be implemented by a large language model, what value are you providing?<p>I know it's a provoking question but that answers why a competitor is not a competitor.</p>
]]></description><pubDate>Thu, 05 Mar 2026 09:45:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47259686</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47259686</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47259686</guid></item><item><title><![CDATA[New comment by ShowalkKama in "Payment fees matter more than you think"]]></title><description><![CDATA[
<p>>The real thing consumers get is fraud protection<p>I don't need fraud protection and the ability to charge back when lunch at a restaurant, I just need a skimmer-resistant payment method (which a phone is).</p>
]]></description><pubDate>Wed, 04 Mar 2026 06:25:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47243856</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47243856</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47243856</guid></item><item><title><![CDATA[New comment by ShowalkKama in "AIs can generate near-verbatim copies of novels from training data"]]></title><description><![CDATA[
<p>>If you can bypass paywalls by using google's cache feature<p>that is quite different. Google serves (used to serve) to its users whatever the website presents to its crawler, it does not try to avoid paywalls or interact with the website in any capacity other than requesting information</p>
]]></description><pubDate>Mon, 23 Feb 2026 18:31:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47126582</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47126582</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47126582</guid></item><item><title><![CDATA[New comment by ShowalkKama in "Spain’s LaLiga has blocked access to freedom.gov"]]></title><description><![CDATA[
<p>rt.com does not use Cloudflare, they are a customer of DDOS Guard:<p><pre><code>  $ drill -Q rt.com | tee $(tty) | xargs whois | grep org-name
  91.215.41.4
  org-name:       DDOS-GUARD LTD

  $ curl --silent https://www.rt.com | grep '<title>[^<]\*</title>' | head -1
  <title>RT - Breaking News, Russia News, World News and Video</title></code></pre></p>
]]></description><pubDate>Sun, 22 Feb 2026 21:52:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47115123</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47115123</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47115123</guid></item><item><title><![CDATA[New comment by ShowalkKama in "Grok Exposed a Porn Performer's Legal Name and Birthdate–Without Being Asked"]]></title><description><![CDATA[
<p>how did grok gain access to this supposedly private information? Did it pilfer her private emails? Did it hack the producer's website and gained access to confidential files? Did it look through her computer?<p>Look, I hate grok just as much as the next person but if it was just crawled then <i>by definition</i> it is not private.<p>You may very well argue that people are harassing her (and that it's not ok), you may even argue that AI should not facilitate such harassment but to call publicly available information private is mental gymnastic.</p>
]]></description><pubDate>Fri, 20 Feb 2026 09:28:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=47085649</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=47085649</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47085649</guid></item><item><title><![CDATA[New comment by ShowalkKama in "Cloudflare CEO on the Italy fines"]]></title><description><![CDATA[
<p>yes, it's quite similar.
They blocked some lawful services too such as google drive (yes, really) and a TON of sites behind cloudflare by blocking some of its IPs (it happened a while ago, it's not directly related to this).</p>
]]></description><pubDate>Fri, 09 Jan 2026 19:42:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=46558264</link><dc:creator>ShowalkKama</dc:creator><comments>https://news.ycombinator.com/item?id=46558264</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46558264</guid></item></channel></rss>