<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: _alphageek</title><link>https://news.ycombinator.com/user?id=_alphageek</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 26 Apr 2026 08:49:42 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=_alphageek" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by _alphageek in "Reverse-engineering a supply chain attack delivered via fake Web3 job interview"]]></title><description><![CDATA[
<p>These attacks evolve each year. Initial ones were just obfuscated code inside some utilities jest/tailwind config, most sophisticated I have seen obfuscated code loaded on chain. So you can not find any trace in the packages, but when you start/install it loads transaction info - decode and boom - you are hacked. So the safest way not to run it or run in isolated docker environment.</p>
]]></description><pubDate>Wed, 22 Apr 2026 14:33:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47864238</link><dc:creator>_alphageek</dc:creator><comments>https://news.ycombinator.com/item?id=47864238</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47864238</guid></item><item><title><![CDATA[New comment by _alphageek in "AI fact-checker with guardrail classifier and MCP server"]]></title><description><![CDATA[
<p>How it is different from perplexity prompt?</p>
]]></description><pubDate>Wed, 22 Apr 2026 14:30:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47864182</link><dc:creator>_alphageek</dc:creator><comments>https://news.ycombinator.com/item?id=47864182</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47864182</guid></item><item><title><![CDATA[New comment by _alphageek in "Show HN: Minimal visual chess openings explorer"]]></title><description><![CDATA[
<p>Really nice.<p>If I were you I would also develop interactive opening tree as an embeddable widget for chess blogs, coaches, and content creators. Chess.com is static one.<p>Also if you can get api/history of user plays - you can help them with analyze to get better openers and become better players.</p>
]]></description><pubDate>Wed, 22 Apr 2026 10:49:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47861694</link><dc:creator>_alphageek</dc:creator><comments>https://news.ycombinator.com/item?id=47861694</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47861694</guid></item><item><title><![CDATA[New comment by _alphageek in "How to make a fast dynamic language interpreter"]]></title><description><![CDATA[
<p>Good writeup. The Arguments arc (#7→#13) hits close — did basically the same dance for an async step evaluator in Rust a while back. Went all in on Cow<'_, Input> assuming borrow-in-the-common-case would earn its keep. Microbenches looked great. Real workload: the Cow discriminant plus lifetime gunk bled into every combinator past the first await, inlining fell off a cliff, the whole point of Cow evaporated. Ripped it out for NoInput / OneInput<T> / MultiInput(Vec<T>) at the evaluator boundary — same split as your ZeroArguments / OneArgument / TwoArguments, just arrived at the ugly way.
One thing I keep wondering: have you stacked arity specialization with type specialization on the native path? Binary<add, int, int> style, drops the isInt probe altogether. Guessing the code size math didn't work out, or ICs are already soaking up whatever's hot on the object side so the native fast paths don't matter much. Which one?</p>
]]></description><pubDate>Tue, 21 Apr 2026 21:40:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47854881</link><dc:creator>_alphageek</dc:creator><comments>https://news.ycombinator.com/item?id=47854881</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47854881</guid></item><item><title><![CDATA[New comment by _alphageek in "Kimi vendor verifier – verify accuracy of inference providers"]]></title><description><![CDATA[
<p>Once vendors optimize for 6 KVV benchmarks, they measure compliance with KVV, not model fidelity. Is there rotation strategy in place?</p>
]]></description><pubDate>Tue, 21 Apr 2026 21:38:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47854852</link><dc:creator>_alphageek</dc:creator><comments>https://news.ycombinator.com/item?id=47854852</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47854852</guid></item></channel></rss>