<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: aegiso</title><link>https://news.ycombinator.com/user?id=aegiso</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 02 May 2026 11:55:13 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=aegiso" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by aegiso in "Onionshare – Securely share a file of any size using Tor"]]></title><description><![CDATA[
<p>Is this a stab at the fact that there's no hashing? Or that the credentials are pointless when you could just generate a random url to authenticate, since the HTTP channel is encrypted anyway?</p>
]]></description><pubDate>Wed, 21 May 2014 21:34:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=7780908</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7780908</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7780908</guid></item><item><title><![CDATA[New comment by aegiso in "Is libcURL slower than hand creating socket requests in C?"]]></title><description><![CDATA[
<p>A curious result, but the conclusion is ridiculous. I can think of a handful of explanations for this result, none of which would implicate libcurl.<p>-Incomparable harnesses<p>-Misuse of the library's api<p>-Build switches<p>-UA sniffing<p>-Not measuring or controlling for system/net load<p>This isn't a post about why you shouldn't use libcurl; it's a post about why you shouldn't benchmark your way to blind conclusions.</p>
]]></description><pubDate>Sun, 04 May 2014 21:45:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=7695947</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7695947</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7695947</guid></item><item><title><![CDATA[New comment by aegiso in "Show HN: Betatype - A freelance site where clients pay $3,500 for prototypes"]]></title><description><![CDATA[
<p>On the bright side, this project acknowledges the killer issue with these kinds of marketplaces: scalably managing quality, scope, and disputes.<p>But on the other hand, I see nothing but assurances and a woefully low cut that I can't imagine could keep this train chugging without shoveling time (=money) into the furnace. At ~$140 revenue a pop, if even 4% of projects go off the rails, the "insurance" policy already puts the company in the red -- forget profit.<p>There is a huge problem to solve here, for sure. I want someone to solve it. But I'm not seeing a solution.</p>
]]></description><pubDate>Tue, 29 Apr 2014 03:03:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=7664674</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7664674</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7664674</guid></item><item><title><![CDATA[New comment by aegiso in "Software Checklist"]]></title><description><![CDATA[
<p>Thing is, software doesn't happen in a vacuum.<p>Perhaps it's worth considering that maybe the reason that checklists aren't the norm in the FOSS "meritocracy" is that they hinder progress, for a certain value of progress. Maybe there was a stealth project that could have been OpenSSL, developed with scrict adherance to checklists, but OpenSSL won because it didn't have that burden? I suspect this applies more broadly to startups, too.<p>Maybe checklists are a silent killer in the natural selection of the software ecosystem, and that's why so much of our software is tripping over peacock feathers?<p>Just a thought.</p>
]]></description><pubDate>Sun, 27 Apr 2014 17:58:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=7656034</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7656034</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7656034</guid></item><item><title><![CDATA[New comment by aegiso in "Show HN: Gandalf – $1 private Docker registries"]]></title><description><![CDATA[
<p>I assure you I'm serious. You might be interested in reading patio11's essays on this. He says if far better that I can.</p>
]]></description><pubDate>Thu, 24 Apr 2014 15:38:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=7640935</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7640935</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7640935</guid></item><item><title><![CDATA[New comment by aegiso in "Show HN: Gandalf – $1 private Docker registries"]]></title><description><![CDATA[
<p>First, in the real world private registries are used for builds containing source, sensitive keys, and so forth. There is a use case here.<p>But second, no enterprisey company will use a service that bills like this, because<p>-$4 and $250 per month all rounds down to zero, so it's not a selling point<p>-$4 signals no support when the shit inevitably hits the fan<p>-$4 signals this company will tank along with your data in a month<p>An enterprise company with actual money will take an hour or two of dev time to boot up one of the open source registries (<a href="https://github.com/dotcloud/docker-registry" rel="nofollow">https://github.com/dotcloud/docker-registry</a>) and stay in control.<p>Source: working at a Docker startup for almost a year</p>
]]></description><pubDate>Thu, 24 Apr 2014 14:58:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=7640675</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7640675</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7640675</guid></item><item><title><![CDATA[New comment by aegiso in "Show HN: Gandalf – $1 private Docker registries"]]></title><description><![CDATA[
<p>Famous last words when going up against Goliath Hollywood.</p>
]]></description><pubDate>Thu, 24 Apr 2014 14:43:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=7640554</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7640554</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7640554</guid></item><item><title><![CDATA[New comment by aegiso in "Uproar over plan to dispose of Syrian chemical weapons in the Mediterranean"]]></title><description><![CDATA[
<p>Because space isn't this thing where you eject stuff like a garbage chute.<p>I recommend reading up on rocketry, orbital mechanics, and modern space programs because a) it's really cool stuff! and b) you'd quickly realize how ridiculous, dangerous, and counterproductive this suggestion is.</p>
]]></description><pubDate>Mon, 21 Apr 2014 14:26:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=7621172</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7621172</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7621172</guid></item><item><title><![CDATA[New comment by aegiso in "Google Revenue Jumps, But Misses Forecasts"]]></title><description><![CDATA[
<p>Just classic marketing psychology, of the "stopped beating your wife yet?" variety. By pondering why Google missed the forecast you automagically dump the blame on Google instead of the shitty forecast.<p>Vocab is hardly more twisted now, though; journalism has always chosen its words deliberately.</p>
]]></description><pubDate>Wed, 16 Apr 2014 22:48:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=7600997</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7600997</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7600997</guid></item><item><title><![CDATA[New comment by aegiso in "Most StartSSL certs will stay compromised"]]></title><description><![CDATA[
<p>Except the cups must be recycled where you bought them, and when they accidentally turn out to be super toxic Bob insists the recycling fee was clearly posted.<p>I don't know who's right here, but it's definitely not that simple.</p>
]]></description><pubDate>Wed, 09 Apr 2014 19:28:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=7561708</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7561708</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7561708</guid></item><item><title><![CDATA[New comment by aegiso in "The Heartbleed Bug"]]></title><description><![CDATA[
<p>Yes and no.<p>First off, TLS is crypto bread-and-butter that's used for a lot more than HTTPS. You're not out of the woods because you're not running a webserver.<p>Second, SSH itself doesn't use TLS; it has its own protocol, so sshd isn't vulnerable.<p>But third, read overflows like this can be escalated in countless ways to total compromise if some credential, key, canary, or such gets leaked. So just because sshd isn't vulnerable doesn't mean you're not screwed.</p>
]]></description><pubDate>Mon, 07 Apr 2014 21:36:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=7549698</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7549698</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7549698</guid></item><item><title><![CDATA[New comment by aegiso in "Frozen Funds"]]></title><description><![CDATA[
<p>I won't speak to this particular case, but look at the incentives for any service that stores people's coins:<p>-You can cash out (steal) an arbitrary amount of people's coins, blaming it on a "hack". If technically competent you can make it look as legitimate as you like, even giving a detailed post-mortem.<p>-This will probably tarnish your operation and possibly your internet rep if the Google juice flows that way.<p>So how much is your internet reputation worth? Personally, there's probably a number that would sway me.<p>Until these incentives are changed somehow, with regulation or otherwise, it will happen.</p>
]]></description><pubDate>Sun, 23 Mar 2014 15:37:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=7453687</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7453687</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7453687</guid></item><item><title><![CDATA[New comment by aegiso in "Mark Karpeles' blog hacked"]]></title><description><![CDATA[
<p>You know what would be brilliant? If this were Karpeles himself using "hackings" in a desperate attempt to deflect legal responsibility.<p>I have no idea what the likelihood of this is, but it's in the realm of plausibility with all of the feces hitting the fan at Gox.</p>
]]></description><pubDate>Sun, 09 Mar 2014 18:08:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=7369258</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7369258</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7369258</guid></item><item><title><![CDATA[New comment by aegiso in "Search on after Malaysia Airlines flight vanishes"]]></title><description><![CDATA[
<p>Your comment demonstrates how monumentally "The War on Terror" has failed, now that people have been so thoroughly terrorized that the most available explanation for a plane disappearing has become "terrorism".</p>
]]></description><pubDate>Sat, 08 Mar 2014 11:50:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=7364943</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7364943</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7364943</guid></item><item><title><![CDATA[New comment by aegiso in "UK official involved in national porn filter arrested for child porn"]]></title><description><![CDATA[
<p>It's less incredible once you come to terms with the fact that like so much "zero-tolerance" emotionally charged legislation its role is to be a political gun that doesn't require the ammunition of justice or reason to function. "But he's a child molester!" is all you need, logic and facts be damned. What's worse, is it's impossible to get rid of these laws because anyone who tries can easily be branded as a <insert evil demographic> sympathizer.<p>As unsurprising as it is that these laws exist and continue to do so, it's still utterly horrifying when you realize it's combined with indiscriminate data hoovering for later use.<p>I don't think there's any solution but to stop reacting emotionally to terms like "child-molester", "murderer" and "terrorist" and instead think critically about the deeper reasons behind why people do what they do. I'm doing my part and I encourage anyone reading this to do the same.</p>
]]></description><pubDate>Tue, 04 Mar 2014 15:56:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=7340947</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7340947</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7340947</guid></item><item><title><![CDATA[New comment by aegiso in "With Free Version of Windows, Microsoft Gives In to the Google Way"]]></title><description><![CDATA[
<p>End-user Windows licenses haven't been a significant source of income for Microsoft for a very long time. They make their money from their enterprise ecosystem, and end-user Windows serves only to support that ecosystem.<p>So unfortunately, I hate to break it to you that as an end user the money you're giving Microsoft for their products never gave you control.<p>But on the bright side, pissing off the end users that provide sustenance and influx for their volume-licenses cash cows doesn't serve Microsoft's bottom line either. So even if you pay nothing, your usage of Microsoft's products is very much something Microsoft would prefer to continue.</p>
]]></description><pubDate>Tue, 04 Mar 2014 06:16:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=7338801</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7338801</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7338801</guid></item><item><title><![CDATA[New comment by aegiso in "Secretary Problem"]]></title><description><![CDATA[
<p>Having been where you've been, may I suggest that the dealbreaker is that you're treating dating like a World of Warcraft inventory checklist? I wish someone had told me that when I was saying the same things.</p>
]]></description><pubDate>Tue, 04 Mar 2014 05:55:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=7338740</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7338740</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7338740</guid></item><item><title><![CDATA[New comment by aegiso in "Secretary Problem"]]></title><description><![CDATA[
<p>This only works if you stick with every partner long enough to get a perfectly accurate assessment of them as a long term mate, that your assements are perfectly objective, independent, and stable, and that you know n.<p>The amount of ifs, ands, and buts in this caveat means it's time to defer to one of my favorite xkcd's of all time. [0]<p>[0] <a href="http://xkcd.com/55/" rel="nofollow">http://xkcd.com/55/</a></p>
]]></description><pubDate>Tue, 04 Mar 2014 05:50:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=7338725</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7338725</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7338725</guid></item><item><title><![CDATA[New comment by aegiso in "JXcore – A Node.js Distribution with Multi-threading"]]></title><description><![CDATA[
<p>This thing is dead on arrival. Unless I'm mistaken it's not open source, so the main draw of node (unrestrained hackability -- see npm) goes out the window.<p>The touted benefit is marginally increased parallel performance, but even if you buy this (I don't), the best case scenario is this buys you a slightly decreased server bill for the price of closedness, lock-in, and compatibility headaches. If your code shards horizontally like this then you can already trivially parallelize and shard across servers with first-class node core clustering.<p>I spend most of my waking hours writing all sorts of crazy things in node, and I still can't think of any scenario in which using this makes sense.</p>
]]></description><pubDate>Mon, 03 Mar 2014 15:20:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=7334137</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7334137</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7334137</guid></item><item><title><![CDATA[New comment by aegiso in "Mt. Gox Has Been Hacked by People Trying to Find Out What Happened?"]]></title><description><![CDATA[
<p>Way too much schadenfreude given Gox's history.<p>Although contrary to popular belief Gox was never a Magic exchange, they <i>were</i> a Bitcoin startup at a time when Bitcoin was not much more than internet lols and pizza deliveries. The first thing you do when hacking together a stupid exchange for a joke e-currency isn't writing unit tests. You just write the code and blast it up on a domain you had lying around for a different project.<p>Cue runaway success, a company sale or two, scaling issues with complicated technology and not much precedent legal or otherwise, and this is what you get.<p>There is nothing at all surprising about this code. And it seems Gox's problems were much more deeply rooted than the subjective non-compliance of their code with "best practices".</p>
]]></description><pubDate>Mon, 03 Mar 2014 07:34:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=7332501</link><dc:creator>aegiso</dc:creator><comments>https://news.ycombinator.com/item?id=7332501</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7332501</guid></item></channel></rss>