<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: acka</title><link>https://news.ycombinator.com/user?id=acka</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 05 Apr 2026 22:34:37 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=acka" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by acka in "Run Linux containers on Android, no root required"]]></title><description><![CDATA[
<p>Not everyone owns one of the limited range of devices that Linux Terminal is available for. For example, no Snapdragon chips currently in use support the "non-protected" virtual machines required by the Android Virtualization Framework. Also, it doesn't jive with Samsung Knox, so the few Samsung devices that this might work on (mostly international models with Exynos chips) will likely not be supported.</p>
]]></description><pubDate>Sat, 04 Apr 2026 23:12:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47644521</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=47644521</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47644521</guid></item><item><title><![CDATA[New comment by acka in "Windows 95 defenses against installers that overwrite a file with an older one"]]></title><description><![CDATA[
<p>Two words: proprietary installers.<p>If an installer expects to be able to overwrite a file and fails to do so, it might crash, leaving the user with a borked installation.<p>Of course you can blame the installer, but resolution of the problem might take a long time, or might never happen, depending on the willingness of the vendor to fix it.</p>
]]></description><pubDate>Wed, 01 Apr 2026 21:24:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=47606738</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=47606738</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47606738</guid></item><item><title><![CDATA[New comment by acka in "Copilot edited an ad into my PR"]]></title><description><![CDATA[
<p>An originally macOS-only product, too.<p>Also, the documentation on Github, linked to by the ad, shows only Mac keyboard shortcuts for operating Raycast.</p>
]]></description><pubDate>Mon, 30 Mar 2026 10:28:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47572566</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=47572566</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47572566</guid></item><item><title><![CDATA[New comment by acka in "My iPhone 16 Pro Max produces garbage output when running MLX LLMs"]]></title><description><![CDATA[
<p>Moon implies there is a planet the moon is orbiting. So unless the planet and its moon are too close to the sun the long term result could also be: solar system.</p>
]]></description><pubDate>Mon, 02 Feb 2026 09:22:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=46854007</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=46854007</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46854007</guid></item><item><title><![CDATA[New comment by acka in "Iran's internet blackout may become permanent, with access for elites only"]]></title><description><![CDATA[
<p>Reading comprehension, my friend.<p>The article you linked to is about the dropped plan to require ID for permission to work in the UK.<p>The parent commenter is referring to age verification for accessing adult content using "highly effective age-assurance systems" (such as photo ID cards, biometrics, etc.) under the Online Safety Act 2023, which is still very much in effect.</p>
]]></description><pubDate>Mon, 26 Jan 2026 14:06:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=46765782</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=46765782</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46765782</guid></item><item><title><![CDATA[New comment by acka in "Booting from a vinyl record (2020)"]]></title><description><![CDATA[
<p>In the Netherlands they used to broadcast software as part of the Hobbyscoop radio show. It was generic BASIC code that could run on a variety of home computers, requiring a small loader program for conversion. The project was named BASICODE[1].<p>[1] <a href="https://en.wikipedia.org/wiki/BASICODE" rel="nofollow">https://en.wikipedia.org/wiki/BASICODE</a></p>
]]></description><pubDate>Fri, 23 Jan 2026 15:20:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=46733534</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=46733534</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46733534</guid></item><item><title><![CDATA[New comment by acka in "So, you’ve hit an age gate. What now?"]]></title><description><![CDATA[
<p>Netflix has been checking accounts against public IP addresses and local networks for ages, at least in The Netherlands. if I use my Dad's account, I get flagged as being "not on the same home network" immediately.
I think that using a VPN and Netflix detecting that would only make matters worse, like termination of service.</p>
]]></description><pubDate>Wed, 14 Jan 2026 18:21:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=46620081</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=46620081</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46620081</guid></item><item><title><![CDATA[New comment by acka in "Report: Microsoft kills official way to activate Windows 11/10 without internet"]]></title><description><![CDATA[
<p>Developers, developers, developers, developers[1].<p>[1] <a href="https://www.youtube.com/watch?v=8fcSviC7cRM" rel="nofollow">https://www.youtube.com/watch?v=8fcSviC7cRM</a></p>
]]></description><pubDate>Sat, 03 Jan 2026 19:59:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=46480905</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=46480905</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46480905</guid></item><item><title><![CDATA[New comment by acka in "Google is dead. Where do we go now?"]]></title><description><![CDATA[
<p>> Why would it plunge instead of re-focusing on things that are intrinsically important?<p>Because a lot of the economy is focused on creating and maintaining a surplus[1]: make people buy things that they don't really need, make them discard and replace things that they've been convinced are no longer worth it.<p>[1] <a href="https://en.wikipedia.org/wiki/Surplus%3A_Terrorized_into_Being_Consumers" rel="nofollow">https://en.wikipedia.org/wiki/Surplus%3A_Terrorized_into_Bei...</a></p>
]]></description><pubDate>Tue, 30 Dec 2025 07:52:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46430666</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=46430666</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46430666</guid></item><item><title><![CDATA[New comment by acka in "SoundCloud has banned VPN access"]]></title><description><![CDATA[
<p>> Years on, our primary data source is literally holding dozens of subscriptions to every commercial provider we can find, and enumerating the exit node IP addresses they use.<p>Assuming your VPN identification service operates commercially, I trust that you are in full compliance with all contractual agreements and Terms of Service for the services you utilize. Many of these agreements specifically prohibit commercial use, which could encompass the harvesting of exit node IP addresses and the subsequent sale of such information.</p>
]]></description><pubDate>Mon, 15 Dec 2025 13:25:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=46274205</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=46274205</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46274205</guid></item><item><title><![CDATA[New comment by acka in "Voyager 1 is about to reach one light-day from Earth"]]></title><description><![CDATA[
<p>The stylus and cartridge needed to play the record were included on each spacecraft. The instructions to assemble the record player were included on a protective aluminum cover.</p>
]]></description><pubDate>Fri, 28 Nov 2025 19:42:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=46082066</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=46082066</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46082066</guid></item><item><title><![CDATA[New comment by acka in "Pebble Watch software is now open source"]]></title><description><![CDATA[
<p>This title is misleading. As explained in the comments, there are still non-free binary blobs in the firmware. Please reserve phrasing like "100% X" for things that are indeed "0% Not(X)."</p>
]]></description><pubDate>Tue, 25 Nov 2025 06:10:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=46042816</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=46042816</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46042816</guid></item><item><title><![CDATA[New comment by acka in "AirPods libreated from Apple's ecosystem"]]></title><description><![CDATA[
<p>Dongle-based license management or DRM isn't the same as product tying; each dongle just validates the license for the use of a piece of software. But forcing customers to only use ink cartridges from a specific brand, deliberately rejecting or invalidating third-party refill options? That is a form of product tying, and it is being deemed illegal in more and more countries.</p>
]]></description><pubDate>Sun, 16 Nov 2025 15:42:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=45945897</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=45945897</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45945897</guid></item><item><title><![CDATA[New comment by acka in "Unexpected things that are people"]]></title><description><![CDATA[
<p>I believe it would be redundant to explicitly grant freedom of speech to an organization such as a union, as its individual members inherently possess this right.</p>
]]></description><pubDate>Tue, 11 Nov 2025 05:19:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=45884369</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=45884369</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45884369</guid></item><item><title><![CDATA[New comment by acka in "Unexpected things that are people"]]></title><description><![CDATA[
<p>Corporations can be held criminally liable, but they can't go to prison. And while lots of countries have gotten rid of the death penalty, a corporation can actually be "executed" by getting dissolved.<p>I think these are some pretty big deals.</p>
]]></description><pubDate>Tue, 11 Nov 2025 05:04:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=45884296</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=45884296</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45884296</guid></item><item><title><![CDATA[New comment by acka in "Google suspended my company's Google cloud account for the third time"]]></title><description><![CDATA[
<p>Note that you need to be on a paid Google Workspace plan before pointing your DNS MX records at Gmail as provider, or else your emails will either be rejected at best or simply vanish into thin air in the worst case.</p>
]]></description><pubDate>Mon, 03 Nov 2025 22:20:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=45805148</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=45805148</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45805148</guid></item><item><title><![CDATA[New comment by acka in "Some people can't see mental images"]]></title><description><![CDATA[
<p>The Aphantasia Network has several interesting studies and a self-assessment test[2] that you can take.<p>[1] <a href="https://aphantasia.com" rel="nofollow">https://aphantasia.com</a><p>[2] <a href="https://aphantasia.com/study/vviq" rel="nofollow">https://aphantasia.com/study/vviq</a></p>
]]></description><pubDate>Fri, 31 Oct 2025 02:15:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=45767642</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=45767642</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45767642</guid></item><item><title><![CDATA[New comment by acka in "Google flags Immich sites as dangerous"]]></title><description><![CDATA[
<p>Maybe it's time to revive something like the uzbl[1] project, or start something similar.<p>[1] <a href="https://www.uzbl.org/" rel="nofollow">https://www.uzbl.org/</a></p>
]]></description><pubDate>Thu, 23 Oct 2025 07:56:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=45679367</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=45679367</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45679367</guid></item><item><title><![CDATA[New comment by acka in "Could the XZ backdoor been detected with better Git/Deb packaging practices?"]]></title><description><![CDATA[
<p>My apologies: yes, I edited my comment to try and clarify that I did not mean executable binaries, but rather binary data, such as the test files in the case of XZ.</p>
]]></description><pubDate>Mon, 20 Oct 2025 08:42:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=45641382</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=45641382</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45641382</guid></item><item><title><![CDATA[New comment by acka in "Could the XZ backdoor been detected with better Git/Deb packaging practices?"]]></title><description><![CDATA[
<p>I believe the XZ compromise partly stemmed from including binary files in what should have remained a source-only project. From what I remember, well-run projects such as those of the GNU project have always required that all binaries—whether executables or embedded data such as test files—be built directly from source, compiling a purpose-built DSL if necessary. This ensures transparency and reproducibility, both of which might have helped catch the issue earlier.</p>
]]></description><pubDate>Sun, 19 Oct 2025 22:04:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=45638458</link><dc:creator>acka</dc:creator><comments>https://news.ycombinator.com/item?id=45638458</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45638458</guid></item></channel></rss>