<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: Veserv</title><link>https://news.ycombinator.com/user?id=Veserv</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 17 Apr 2026 13:40:47 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=Veserv" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by Veserv in "Ransomware Is Growing Three Times Faster Than the Spending Meant to Stop It"]]></title><description><![CDATA[
<p>That does not work. They just infect you and do not demand a ransom for a few months as they encrypt all your data going to the backup. Now your backups are also encrypted going back multiple months and you have to discard months of work.</p>
]]></description><pubDate>Tue, 14 Apr 2026 18:35:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47769463</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47769463</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47769463</guid></item><item><title><![CDATA[New comment by Veserv in "Linux extreme performance H1 load generator"]]></title><description><![CDATA[
<p>What is the point of making up claims of "extreme" performance without any accompanying benchmarks or comparisons?<p>It really should be shameful to use unqualified adjectives in headline claims without also providing the supporting evidence.</p>
]]></description><pubDate>Tue, 07 Apr 2026 04:42:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47670834</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47670834</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47670834</guid></item><item><title><![CDATA[New comment by Veserv in "Endian wars and anti-portability: this again?"]]></title><description><![CDATA[
<p>There are plenty of ways for language to be better now that we know far more about arithmetic than when number words were created.<p>"One Five Five Two Three One" is 6 words, 6 syllables long where as "One Hundred and Thirty Two Thousand" is 6 words, 9 syllables long and conveys less information. Even shortening it to "One Hundred Thirty Two Thousand" is still 5 words, 8 syllables long and conveys less information.<p>You can also easily convey high order digits first by using a unambiguous "and/add" construction: "Thousand Two Three One Add One Five Five". You have now conveyed the three high order digits in 5 words, 5 syllables. You also convey the full number in 9 words, 9 syllables in contrast to "One Hundred Thirty Two Thousand One Hundred Fifty Five" which is 9 words, 14 syllables.<p>You could go even further and express things in pseudo-scientific notation which would be even more general and close to as efficient. "Zero E Three (10^3) Two Three One" which is 6 words, 6 syllables, but no longer requires unique separator words like "Thousand", "Million", "Billion", etc. This shows even greater efficiency if you are conveying "One Hundred Thirty Thousand" which would be something more like "Zero E Four (10^4) Three One" since the scientific notation digit position description is highly uniform.<p>This distinction might seem somewhat arbitrary since this just seems like it is changing the order for the sake of things. However, the advantage of little-endian description is that it is non-contextual. When you say the number "One" it literally always means the one's place "One". If you wish to speak of a different positional "One" you would prefix it with the position e.g. "Zero E Three (10^3) One". In contrast, in the normal way of speaking numbers "One" could mean any positional one. Are you saying "One Hundred", "One Thousand", "One Hundred Million"? You need to wait for subsequent words to know what "One" is being said. Transcription must fundamentally buffer a significant fraction of the word stream to disambiguate.<p>It also results in the hilariously duplicative "One Hundred Thirty Two Thousand One Hundred Fifty Five" which has positional signifiers for basically every word. "One <i>Hundred</i> Thir-<i>ty</i> <i>Thousand</i> One <i>Hundred</i> Fif-<i>ty</i> Five”. Fully 8 of the 14 syllables are used for positional disambiguation to reduce necessary lookahead. "And/Add" constructions get you that for a fraction of the word and syllable count. They allow arbitrary chunking since you can separate digit streams on any boundary. It also reinforces the fact that numbers are just composites of their components which may help with numeracy.<p>Little endian is actually just better in every respect, expect for compatibility and familiarity, if we use our modern robust knowledge of arithmetic to formulate the grammar rules.</p>
]]></description><pubDate>Mon, 06 Apr 2026 06:02:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=47657456</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47657456</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47657456</guid></item><item><title><![CDATA[New comment by Veserv in "Big-Endian Testing with QEMU"]]></title><description><![CDATA[
<p>You should actually not use format-swapping operations.<p>You should actually use format-swapping loads/stores (i.e deserialization/serialization).<p>This is because your computer can not compute on values of non-native endianness. As such, the value is logically converted back and forth on every operation. Of course, a competent optimizer can elide these conversions, but such actions fundamentally lack machine sympathy.<p>The better model is viewing the endianness as a serialization format and converting at the boundaries of your compute engine. This ensures you only need to care about endianness when serializing and deserializing wire formats and that you have no accidental mixing of formats in your internals; everything has been parsed to native before any computation occurs.<p>Essentially, non-native endianness should only exist in memory and preferably only memory filled in by the outside world before being parsed.</p>
]]></description><pubDate>Fri, 03 Apr 2026 19:53:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47631373</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47631373</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47631373</guid></item><item><title><![CDATA[New comment by Veserv in "Microsoft: Copilot is for entertainment purposes only"]]></title><description><![CDATA[
<p>I have frequently proposed a objective legal standard for false advertising that handles that: "Technically, your honor". If somebody says that in court, they lose.<p>The words they used, as commonly understood by the target audience, were intentionally crafted to be interpreted differently than what they were going to say they meant in court. They spent time, effort, and money, ran focus groups, and carefully selected and curated their words to be incorrectly interpreted by the target audience to reach knowingly false conclusions.<p>The correct standard should be that they spent time, effort, and money, ran focus groups, and carefully selected and curated their words to be correctly interpreted by the target audience to reach true conclusions. Their statements should only be accidentally incorrect in proportion to the time and effort spent crafting and distributing them.<p>"Technically, your honor", should be treated as the ethical abomination it is.</p>
]]></description><pubDate>Tue, 31 Mar 2026 19:53:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=47592562</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47592562</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47592562</guid></item><item><title><![CDATA[New comment by Veserv in "Vulnerability research is cooked"]]></title><description><![CDATA[
<p>When did we enter the twilight zone where bug trackers are consistently empty? The limiting factor of bug reduction is remediation, not discovery. Even developer smoke testing usually surfaces bugs at a rate far faster than they can be fixed let alone actual QA.<p>To be fair, the limiting factor in remediation is usually finding a reproducible test case which a vulnerability is by necessity. But, I would still bet most systems have plenty of bugs in their bug trackers which are accompanied by a reproducible test case which are still bottlenecked on remediation resources.<p>This is of course orthogonal to the fact that patching systems that are insecure by design into security has so far been a colossal failure.</p>
]]></description><pubDate>Mon, 30 Mar 2026 20:43:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47579485</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47579485</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47579485</guid></item><item><title><![CDATA[New comment by Veserv in "Apple says no one using Lockdown Mode has been hacked with spyware"]]></title><description><![CDATA[
<p>I am glad that you agree that their legal department’s explicit and intentional exclusion of known successful non-mercenary attacks is precise and legally sound.<p>It is advisable to not grasp at straws to think up ways that highly paid lawyers are not saying exactly the words they have approved. That is literally their job and they are good at it.<p>If they meant something more expansive they can do so. It is not the public’s job to do it for them while letting them retreat to the legally binding interpretation at their pleasure.</p>
]]></description><pubDate>Fri, 27 Mar 2026 23:32:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47549766</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47549766</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47549766</guid></item><item><title><![CDATA[New comment by Veserv in "Apple says no one using Lockdown Mode has been hacked with spyware"]]></title><description><![CDATA[
<p>They have a legal department carefully directing what they say. In a court of law, their lawyers will successfully argue that they are beholden to only the precise letter of their statement. Are you arguing that their lawyers are incompetent and imprecise in their wording? If so, what evidence do you have that their lawyers are incompetent?<p>In light of the correct legal interpretation of their words, being only the specific letters, we can see that your interpretation is incorrect.<p>> They know of a lot of attack attempts<p>No, their statement says nothing about attack attempts.<p>> so far they have no reason to believe any were successful<p>No, their statement says nothing about their belief, only their explicit knowledge. Their statement says nothing about their investigation practices or whether they even attempted to investigate and learn about attacks. Their statement says nothing about non-mercenary attacks.<p>Their statement is technically correct as long as any successful attacks they know about are not explicitly known to be committed by mercenarys.</p>
]]></description><pubDate>Fri, 27 Mar 2026 19:08:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47546933</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47546933</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47546933</guid></item><item><title><![CDATA[New comment by Veserv in "Apple says no one using Lockdown Mode has been hacked with spyware"]]></title><description><![CDATA[
<p>Oh geez. Legal did not give them the go ahead to make the unqualified statement: “We are not aware of any successful spyware attacks” they had to explicitly qualify it with “mercenary”.</p>
]]></description><pubDate>Fri, 27 Mar 2026 18:13:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=47546257</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47546257</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47546257</guid></item><item><title><![CDATA[New comment by Veserv in "Drone attack on parked U.S. Army BlackHawk in Iraq"]]></title><description><![CDATA[
<p>The argument is literally that it is problematic to send 100 k$ interceptors to stop 1 k$ drones and then you turn about and argue you can end 100 k$ cruise missiles to stop 1 k$ turrets. Your argument is inconsistent with the entire premise.<p>You have presented no evidence as to the overall cost of this mystical unstoppable drone swarm. In contrast, we do know that shotguns, machine guns, and bullets are cheap, mass-produced, and mass-deployed by the tens of millions.<p>The key unknown of my proposal is the bulk cost and production of a small automated turret or fighter drone that can economically and flexibly deploy cheap bullet interceptors to asymmetrically defeat expensive drones. However, the operational requirements for such devices are simple and within the range of existing technology.<p>There is no clear evidence that cheap explosive drone swarms are magically cheaper than cheap fighter drone swarms or cheap ground drone swarms. It could easily go either way and without a rigorous actual analysis you and I are both unqualified to determine what is actually dominant.</p>
]]></description><pubDate>Thu, 26 Mar 2026 00:41:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47525338</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47525338</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47525338</guid></item><item><title><![CDATA[New comment by Veserv in "Drone attack on parked U.S. Army BlackHawk in Iraq"]]></title><description><![CDATA[
<p>> Then two drones approach from opposite sides at 200 MPH.<p>A drone that can go 300 km/h is way more than 100 $, you are in the thousands of dollar range at that point. Turret wins if it blows up one.<p>Also, it could probably blow up more than one since at 300 km/h you would get 0.5 seconds to respond and I was arguing 0.1 seconds per target anywhere in a full 360. 0.25 seconds for anywhere on a full 360 would be enough for 2 and that is within human capability.<p>> you send in a cruise missile to clear it out<p>Cool, you sent in a hundred thousand dollar cruise missile to blow up a thousand dollar turret. Turret wins. Also you can put wheels on the turret, so it might not even be there.<p>Now you are probably going to argue about a drone that goes 1000 km/h at which point what you have is a cruise missile which costs tens to hundreds of thousands of dollars. At that point the entire argument about drones being too cheap to cost-effectively stop is moot.<p>Or you might argue that the drones just go high. 50 m is a ludicrously low flight ceiling. But then your drone can not explode on contact. You could use a drone that drops explosives, but that still requires flying over the target. High flying drones are easier to detect, and you could counter that with flying shotgun drones or turret mounted machine guns which have ranges in the hundreds to thousands of meters and would still only cost a few dollars of ammo per kill.<p>My main point is that bullets can easily disable a cheap drone and are much cheaper than a cheap drone. You just need a cost-effective way of deploying mass bullets against mass drones. Logical answers are ground deployments around targets or drones with bullets that cost-effectively shoot down drones without bullets.<p>You will then likely get into a arms race of fighter drones to protect your bomber drones. And scale up your drones until they are not easily bullet-destroyable. But then your drone costs have likely increased to the point where anti-air cannons shooting 100 $ explosive shells are cost-effective. And so on and so forth.</p>
]]></description><pubDate>Wed, 25 Mar 2026 21:18:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=47523403</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47523403</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47523403</guid></item><item><title><![CDATA[New comment by Veserv in "Drone attack on parked U.S. Army BlackHawk in Iraq"]]></title><description><![CDATA[
<p>> Which only protect a small area<p>We have these things called wheels. Or you could mount it on a drone.<p>> Meanwhile your guns shoot birds and once in a while - an occasional bystander<p>We are discussing protecting military bases or military assets.<p>> Some drones just drop grenades<p>That requires flying above the target. See counter-point 1.<p>Please put in the minimal effort needed to follow through at least a few steps of argument and counter-argument in your head. I assure you I am not putting in as little effort into my arguments as you did.</p>
]]></description><pubDate>Wed, 25 Mar 2026 20:54:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47523089</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47523089</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47523089</guid></item><item><title><![CDATA[New comment by Veserv in "Drone attack on parked U.S. Army BlackHawk in Iraq"]]></title><description><![CDATA[
<p>Automatic turret-mounted anti-air shotguns. Blow up 100 $ drones for the cost of a 0.50 $ shotgun shell.<p>I bet you could do aiming and firing in less than 0.1 seconds with nearly 100% accuracy in the 50 meter range which would enable ~10 destroyed drones per unit if the drones are going 150 km/h.<p>Shotgun pellets are also basically entirely safe when shot into the air as they have low falling velocity enabling usage when shooting over populated areas.</p>
]]></description><pubDate>Wed, 25 Mar 2026 20:24:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47522664</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47522664</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47522664</guid></item><item><title><![CDATA[New comment by Veserv in "A tale about fixing eBPF spinlock issues in the Linux kernel"]]></title><description><![CDATA[
<p>The code described is not nested interrupt handlers. It is eBPF code executing during a context switch which is interrupted by the sampling NMI which is also configured to execute eBPF code.<p>NMIs will not nest, so there is no risk of arbitrary nesting. So, there should be at most three nesting levels: regular, interrupt (I suspect they do not do logging during interrupts so this may not even exist in their use case), non-maskable interrupt.<p>Off the top of my head I can think of at least 5 unique ways to not drop the sample with your idea of separate ring buffers being one of them.</p>
]]></description><pubDate>Tue, 24 Mar 2026 06:19:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47499175</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47499175</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47499175</guid></item><item><title><![CDATA[New comment by Veserv in "Tesla: Failure of the FSD's degradation detection system [pdf]"]]></title><description><![CDATA[
<p>Just to elaborate:<p>Tesla’s actually have zero binocular vision coverage because the cameras have different focal lengths and are too close even if they did have the same focal lengths.<p>They are also below minimum vision requirements for driving in many states.</p>
]]></description><pubDate>Fri, 20 Mar 2026 00:37:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47448650</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47448650</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47448650</guid></item><item><title><![CDATA[New comment by Veserv in "A tale about fixing eBPF spinlock issues in the Linux kernel"]]></title><description><![CDATA[
<p>Geez, your company really needs to not be writing code in interrupt context until you learn how it works.<p>bpf_ringbuf_reserve() is perfectly fine to call from interrupt context. The problem is that you are manipulating the <i>same</i> data structure from non-interrupt and interrupt context. Your code was deadlocking with itself. You wrote every side of that deadlock.<p>For that matter, how are you even handling the deadlock detected return code? If the sampling event gets a deadlock error, that deadlock cause can not resolve until the context switch code you interrupted resolves. That means you can not reserve the space to store your sample. Are you just naively dropping that sample?</p>
]]></description><pubDate>Wed, 18 Mar 2026 21:15:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47431523</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47431523</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47431523</guid></item><item><title><![CDATA[New comment by Veserv in "A tale about fixing eBPF spinlock issues in the Linux kernel"]]></title><description><![CDATA[
<p>How is this a kernel issue? The code that deadlocked was entirely written by Superluminal who grabbed a shared lock from a interrupt handler. Not doing that is literally the very first lesson of writing interrupt handlers and if you do not know that you have no business doing so.<p>The only way this could be considered a issue is that it appears that the Linux kernel added the rqspinlock which is supposed to automatically detect incorrect code at runtime and kind of “un-incorrect” it. That piece of code did not correctly detect callers who were blindly using it incorrectly in ways that the writers probably expected to detect.<p>However, this entire escapade is absurd. Not only does this indicate that eBPF has gotten extensions that grossly violate any concept of sandboxing that proponents claim, I do not see how you can effectively program in the rqspinlock environment. Any lock acquire can now fail with a timeout because some poorly written eBPF program decided that deadlocks were a enjoyable activity. Every single code path that acquires more than one lock must be able to guarantee global consistency before every lock acquire.<p>For instance, you can not lock a sub-component for modification and then acquire a whole component lock to rectify the state since that second lock acquire may arbitrarily fail.<p>Furthermore, even if you do that all it does is turn deadlocks due to incorrect code into incredibly long multi-millisecond denials of service due to incorrect code. I mean, yes, bad is better than horrible, but it is still bad.</p>
]]></description><pubDate>Wed, 18 Mar 2026 18:03:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47429114</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47429114</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47429114</guid></item><item><title><![CDATA[New comment by Veserv in "Nasdaq's Shame"]]></title><description><![CDATA[
<p>It is amazing that you can complain about a simplified example and then both misunderstand it and get literally every single one of your "corrections" wrong.<p>1. As I made abundantly clear, 20% is the passive ownership of the index. It has no relation to the index weighting which you are mentioning.<p>2. They have to buy 20% of the weighted value. The actual weight is 5x the float. I chose to use a weight of 100% instead of a multiple of the float as a simplification since any weighting greater than the float could result in a squeeze given a large enough passive/obligated ownership pool. However, since I was expecting this sort of "correction", I chose 20% passive ownership of the index (i.e. 1/5) so that they would have to buy 20% of the 25% which is 5%, the same amount as the 5% float. This would result in the passive investors having to purchase all of publicly traded stock which is the divide by zero point that spikes the stock. So, even if your correction was not wrong, I also already countered it.<p>3. Tracking errors are distinct from intentionally not tracking the index you are contractually obligated to match. You are insinuating that the target of these financial manipulations will defend their clients by ignoring their legal obligations and blaming it on "tracking error". While that is possible, I see no reason to assume that will be the case upfront or to do anything other than apply blame to the entity attempting to financially manipulate retirement accounts into lining their own pockets.<p>4. Yes, there are other insiders with shares. I used a simplified example where there is a single insider, the founder, to highlight the power that the insiders have over the pricing in such a squeeze. However, you also got this wrong because insiders usually have lockup periods after the IPO that are longer than the 15-days expected for index inclusion. As such, the fund managers would not be able to purchase any shares other than the public shares until after the first rebalance.</p>
]]></description><pubDate>Mon, 16 Mar 2026 18:26:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47402802</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47402802</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47402802</guid></item><item><title><![CDATA[New comment by Veserv in "Nasdaq's Shame"]]></title><description><![CDATA[
<p>To explain the mechanism simply.<p>Suppose you had a index of 100 companys each with a market cap of 1 G$ for a total of 100 G$.
You have passive investors owning 20 G$ of that index, amounting to 20% of the total, 20% of each company, and 200 M$ per company.<p>You then rotate out a company for a new one also worth 1 G$. The index is still 100 G$, but to match the index you are contractually required to sell your 20% ownership of the old company and are contractually required to buy 20% ownership of the new company.<p>However, the newly added company only released 5% of its shares to the public and the founder kept hold of the remaining 95%. Those fund managers are contractually obligated to buy 20% of the newly added company, but only 5% is available. Like a short squeeze, where the squeezer buys and holds supply so there are not enough purchasable shares to cover the shorts (obligated ownership), this is a financial divide by zero.<p>To get the remaining 15%, which they are contractually obligated to acquire, they must purchase from the founder. As they are in violation of their contract if they fail to acquire the remaining 15%, the founder now has complete control to dictate any price they want.<p>That is the scheme described: how to short squeeze retirement funds who do not even have shorts for fun and profit.<p>Note that this is a minor variation on my post on the same underlying topic here: <a href="https://news.ycombinator.com/item?id=47392325">https://news.ycombinator.com/item?id=47392325</a></p>
]]></description><pubDate>Mon, 16 Mar 2026 02:10:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47394355</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47394355</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47394355</guid></item><item><title><![CDATA[New comment by Veserv in "SpaceX IPO Scandal"]]></title><description><![CDATA[
<p>Yes, but not the Nasdaq-100 [1] which added the "Fast Entry" rule listed right there in section 2 literally this February because SpaceX is demanding immediate inclusion into the Nasdaq-100 as a condition for listing on the Nasdaq instead of the NYSE.<p>[1] <a href="https://indexes.nasdaqomx.com/docs/NDX_Consultation-February_2026.pdf" rel="nofollow">https://indexes.nasdaqomx.com/docs/NDX_Consultation-February...</a> Section 3</p>
]]></description><pubDate>Sun, 15 Mar 2026 23:29:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47393184</link><dc:creator>Veserv</dc:creator><comments>https://news.ycombinator.com/item?id=47393184</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47393184</guid></item></channel></rss>