<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: Ukv</title><link>https://news.ycombinator.com/user?id=Ukv</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 10 May 2026 08:42:29 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=Ukv" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by Ukv in "Just Use Go"]]></title><description><![CDATA[
<p>I may be missing something, but I don't see how just forgetting to handle/propagate the error (and, say, causing data corruption by continuing with whatever empty/partial return value the function happens to give) would be a conscious decision.<p>Even when it is intentional, like writing some quick/dirty code and planning on handling errors properly later, I'd imagine it's difficult to grep for instances of unchecked errors in the way you can with `.unwrap()` - though tooling should help.</p>
]]></description><pubDate>Sat, 09 May 2026 00:22:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=48070423</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=48070423</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48070423</guid></item><item><title><![CDATA[New comment by Ukv in "Just Use Go"]]></title><description><![CDATA[
<p>Silently ignoring errors by leaving out some boilerplate doesn't really seem like an active/forced decision, or a selling point over the languages it disparages ("[...] hellscape doesn't make errors disappear, it just hides them"). Then that the correct path is the one of more resistance seems poor design, in my surface-level opinion.</p>
]]></description><pubDate>Fri, 08 May 2026 16:00:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=48064993</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=48064993</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48064993</guid></item><item><title><![CDATA[New comment by Ukv in "Just Use Go"]]></title><description><![CDATA[
<p>I agree that Rust's approach is better. I'm questioning the claim that Go "forces you" to handle errors, since to my understanding with Go someone can just eschew that 3-line boilerplate, silently ignoring the error, and still use the result (which is bad).</p>
]]></description><pubDate>Fri, 08 May 2026 15:04:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=48064237</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=48064237</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48064237</guid></item><item><title><![CDATA[New comment by Ukv in "Just Use Go"]]></title><description><![CDATA[
<p>> `if err != nil` is the feature, not the bug. It forces you to look at every place something can go wrong and decide what to do about it<p>Haven't really used Go, but can't someone just `result, _ := foo()` and go on using `result`, not checking any errors?<p>The way Rust does it seems closer to forcing you to handle any errors in order to obtain the result (though it is still easy to just `.unwrap()` without properly thinking about it).</p>
]]></description><pubDate>Fri, 08 May 2026 14:27:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=48063752</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=48063752</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48063752</guid></item><item><title><![CDATA[New comment by Ukv in "Mouse Pointer as a Mere Mortal"]]></title><description><![CDATA[
<p>> Seeing is an inferior means of knowing where the cursor is compared to intuition. When I move the cursor, I know where it is with no conscious effort [...]<p>Realize it consciously or not, visual feedback is a critical part of this loop.<p>> As soon as the off-screen action finishes, the mouse cursor snaps back to the position it would have otherwise been in.<p>The cursor jumping to the edge of the screen, which is not somewhere the user ever saw it and may be outside of the application, seems worse than any current issue while still being insufficient for most legitimate use-cases.<p>I don't really see any fake cursor approach that isn't going to behave awkwardly in practice - e.g: is it your real (invisible?) cursor or fake cursor that can click to focus another application, and what happens to your cursors when you do so?<p>Just letting the user deny mouse control for an app (like on Wayland) seems sufficient to solve your annoyance. Maybe adding a separate permission for control while unfocused, since that's rarer. No need to break all windowed applications with reason to capture/move the mouse.</p>
]]></description><pubDate>Wed, 06 May 2026 10:10:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=48034456</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=48034456</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48034456</guid></item><item><title><![CDATA[New comment by Ukv in "Mouse Pointer as a Mere Mortal"]]></title><description><![CDATA[
<p>> But if it's windowed then it should be impossible.<p>I have one monitor, so fairly often have games/editors windowed with something else alongside them (a video, documentation, …). There are also uses where the mouse is only captured temporarily - like FPS-controls flying mode in Godot and Blender. Some image editors also allow for things like moving the cursor with arrow keys, which I find useful.</p>
]]></description><pubDate>Tue, 05 May 2026 14:22:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=48022917</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=48022917</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48022917</guid></item><item><title><![CDATA[New comment by Ukv in "New statue in London, attributed to Banksy, of a suited man, blinded by a flag"]]></title><description><![CDATA[
<p>> It’s amazing how everyone thinks this sculpture’s message doesn’t apply to them. “My side’s flags are different, it’s the other side’s flags that are bad”<p>The sculpture's message isn't "flags are bad" - it's using a flag as a metaphor for nationalism/blind patriotism (based on the rest of the statue, the location chosen, what it's a response to, and Banksy's other works).</p>
]]></description><pubDate>Tue, 05 May 2026 12:17:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=48021453</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=48021453</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48021453</guid></item><item><title><![CDATA[New comment by Ukv in "For Linux kernel vulnerabilities, there is no heads-up to distributions"]]></title><description><![CDATA[
<p>> Again, the current flow was that the researchers only reported the vuln to kernel devs<p>That's what happened in this case, but the current idea/expectation (according to what was linked in the comment chain I replied to) seems to be that the researcher would email the distro maintainers with information:<p>> > Notify security@kernel.org, linux-distros@vs.openwall.org and relevant maintainers of the vulnerability; establishing details, embargo period, CVE request and possible fix<p>This is the process I'm suggesting could make more sense if it was instead the kernel maintainers alerting distro maintainers (with no more detail than necessary) after a fix has made it in. Should also be less fallible than relying on the researcher to do so.<p>> Also you’re just wrong about the ability of bad actors to identify vuln remediations (and consequently vulns) by looking at commits to major projects. I don’t know what else to say here other than that this is happening, and is easily attainable via the current combination of human expertise and automated tools<p>I don't deny that bad actors <i>can</i> figure out vulnerabilities from tracking commits, but removing or refactoring some subsystem does not immediately give all bad actors a full list of vulnerabilities with the old version. Developing an abusable exploit chain (as may be shown by the researcher to justify high priority patching) is also not necessarily trivial even if they do figure out an issue that was fixed.</p>
]]></description><pubDate>Sat, 02 May 2026 17:15:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47988317</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=47988317</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47988317</guid></item><item><title><![CDATA[New comment by Ukv in "For Linux kernel vulnerabilities, there is no heads-up to distributions"]]></title><description><![CDATA[
<p>> The information exposed in the current process was: code changes in the git commits and a commit message that did not mention the vulnerability.<p>Idea with the current process is for the researcher to email distro maintainers about the vulnerability - that's the part I believe could make more sense to be done by a kernel maintainer so that less information about the vulnerability has to be shared around (distro maintainers can just trust the word of the kernel maintainer that a vulnerability exists and is serious, without further evidence).<p>> [...] existence of a vuln, or a nudge to patch with no context, or whatever, is totally irrelevant and does not change the calculus: the moment the fix is committed, bad actors who were not already aware notice it<p>I'd claim this is too much binary thinking - not every vulnerability will be immediately found by every bad actor just from a well-disguised commit (like here). There are many more commits refactoring parts of code or removing complexity that <i>don't</i> hide a known vulnerability. More information available about the vulnerability will expedite its discovery and exploitation, so it makes sense to minimize that information where it's not necessary.</p>
]]></description><pubDate>Sat, 02 May 2026 15:43:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47987368</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=47987368</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47987368</guid></item><item><title><![CDATA[New comment by Ukv in "For Linux kernel vulnerabilities, there is no heads-up to distributions"]]></title><description><![CDATA[
<p>I'm suggesting that <i>less</i> information about the vulnerability could be circulated than the current process, not more, due to distro maintainers being able to trust just "version X contains a fix for a high-impact security vulnerability" coming from a kernel maintainer - whereas they'll need some information/proof of that claim when coming from an outsider.</p>
]]></description><pubDate>Sat, 02 May 2026 00:56:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47982217</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=47982217</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47982217</guid></item><item><title><![CDATA[New comment by Ukv in "For Linux kernel vulnerabilities, there is no heads-up to distributions"]]></title><description><![CDATA[
<p>The patch itself can be made to look fairly innocuous, as was done here. Won't always successfully prevent bad actors finding the vulnerability, but seems better to at least not unnecessarily increase that risk.</p>
]]></description><pubDate>Sat, 02 May 2026 00:36:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47982116</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=47982116</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47982116</guid></item><item><title><![CDATA[New comment by Ukv in "Grok 4.3"]]></title><description><![CDATA[
<p>You can meaningfully test if one slot machine hits the jackpot more often than another, just that the methodology should involve a large number of repeats rather than a few anecdotes. There are some LLM leaderboard sites that do it with blind comparisons.</p>
]]></description><pubDate>Fri, 01 May 2026 14:03:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47974956</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=47974956</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47974956</guid></item><item><title><![CDATA[New comment by Ukv in "For Linux kernel vulnerabilities, there is no heads-up to distributions"]]></title><description><![CDATA[
<p>I'd imagine it's not that they lacked the time to email linux-distros, but that they were unaware they were supposed to do so.<p>Feels like the more sensible process would be for kernel maintainers to announce when a version contains a fix for a high-impact security vulnerability and for distro maintainers to pay attention to that. Could be done without revealing what the vulnerability actually is in most cases, trusting the kernel maintainer's judgement. There does seem to be a public linux-cve-announce mailing list.</p>
]]></description><pubDate>Fri, 01 May 2026 11:34:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47973570</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=47973570</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47973570</guid></item><item><title><![CDATA[New comment by Ukv in "He asked AI to count carbs 27000 times. It couldn't give the same answer twice"]]></title><description><![CDATA[
<p>Quantifying their own confidence is also something they're not good at, and which the format would prevent them from refusing to do or preceding with a caveat if that's what you'd want of them. Particularly since the response format seems backwards - giving confidence, <i>then</i> carbs estimate, <i>then</i> observations/notes, rather than being able to base carbs estimate off of observations/notes and then confidence estimate off of both of those.<p>> They'll qualify their answers in English but [...]<p>That the default user-facing chat as a normal user would use it gives a warning is the key part IMO. I don't think expectations of there being no "wrong way" to use the model can necessarily extend to API usage with long custom system prompt and restricted output format.</p>
]]></description><pubDate>Wed, 29 Apr 2026 14:31:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47948980</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=47948980</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47948980</guid></item><item><title><![CDATA[New comment by Ukv in "He asked AI to count carbs 27000 times. It couldn't give the same answer twice"]]></title><description><![CDATA[
<p>> Then the correct answer is “I can’t tell.”<p>From the paper they're using structured JSON schema mode opposed to freeform answers, so it can't. Models do typically caveat their answer for questions like this, in my experience.</p>
]]></description><pubDate>Wed, 29 Apr 2026 13:27:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47948139</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=47948139</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47948139</guid></item><item><title><![CDATA[New comment by Ukv in "Bitwarden CLI compromised in ongoing Checkmarx supply chain campaign"]]></title><description><![CDATA[
<p>> and how that's <i>good enough</i> for me<p>I'd go further than that and say for me personally, the fact it's just a file is a selling point, not a "good enough" concession. I can just put passwords.kdbx alongside my notes.txt and other files (originally on a thumbdrive, now on my FTP server) - no additional setup required.<p>There will be people who use multiple devices but don't already have a good way to access files across them, but even then I'm not fully convinced that SaaS specifically for syncing [notes/passwords/photos/...] really is the most convenient option for them opposed to just being a well-marketed local maximum. Easy to add one more subscription, easy to suck it up when terms changes forbid you syncing your laptop, easy to pray you're not affected by recurring breaches, ... but I'd suspect often (not always) adds up to more hassle overall.</p>
]]></description><pubDate>Fri, 24 Apr 2026 11:57:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47889014</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=47889014</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47889014</guid></item><item><title><![CDATA[New comment by Ukv in "Bitwarden CLI compromised in ongoing Checkmarx supply chain campaign"]]></title><description><![CDATA[
<p>> presumably this comprise was only found out because a lot of people did update<p>This was supposedly discovered by "Socket researchers", and the product they're selling is proactive scanning to detect/block malicious packages, so I'd assume this would've been discovered even if no regular users had updated.<p>But I'd claim even for malware that's only discovered due to normal users updating, it'd generally be better to reduce the number of people affected with a slow roll-out (which should happen somewhat naturally if everyone sets, or doesn't set, their cool-down based on their own risk tolerance/threat model) rather than everyone jumping onto the malicious package at once and having way more people compromised than was necessary for discovery of the malware.</p>
]]></description><pubDate>Thu, 23 Apr 2026 22:16:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=47882872</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=47882872</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47882872</guid></item><item><title><![CDATA[New comment by Ukv in "How many products does Microsoft have named 'Copilot'?"]]></title><description><![CDATA[
<p>> start by not renaming Microsoft Office<p>To my understanding, Office (or "Microsoft 365") itself becoming "Copilot" was just confused messaging about the "Office Hub" app/shortcut being repurposed.</p>
]]></description><pubDate>Sun, 05 Apr 2026 02:40:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47645657</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=47645657</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47645657</guid></item><item><title><![CDATA[New comment by Ukv in "Claude Code Found a Linux Vulnerability Hidden for 23 Years"]]></title><description><![CDATA[
<p>The article quote was being given as the supposed source for "Claude Code also found one thousand false positive bugs, which developers spent three months to rule out", so should substantiate that claim - which it doesn't.<p>If the claim was instead just "a good portion of the hundreds more potential bugs it found <i>might be</i> false positives", then sure.</p>
]]></description><pubDate>Sat, 04 Apr 2026 15:04:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47639662</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=47639662</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47639662</guid></item><item><title><![CDATA[New comment by Ukv in "Meta will shut down VR Horizon Worlds access June 15"]]></title><description><![CDATA[
<p>I think Meta's position as a large company under (rightfully) a lot of media scrutiny fundamentally prevents it from creating a successful "metaverse". It'll be pushed towards being overly corporate/sanitized and centrally controlled to meet expectations of managing misinformation, player safety, etc. opposed to the less restricted conditions that resulted in the web. Smaller companies (like VRChat) or individual hobbyists can get away with more, and generally have less cynical motivations.</p>
]]></description><pubDate>Wed, 18 Mar 2026 17:19:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47428500</link><dc:creator>Ukv</dc:creator><comments>https://news.ycombinator.com/item?id=47428500</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47428500</guid></item></channel></rss>