<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: atanasi</title><link>https://news.ycombinator.com/user?id=atanasi</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 06 Apr 2026 04:13:04 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=atanasi" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by atanasi in "German implementation of eIDAS will require an Apple/Google account to function"]]></title><description><![CDATA[
<p>The current policy trend in the EU is definitely not based on the principle of each user evaluating their own risk. On the contrary, service providers like financial institutes and identity providers have the responsibility to keep users safe, and more and more regulation will be made. The natural consequence is restricting which platforms are supported.</p>
]]></description><pubDate>Sun, 05 Apr 2026 07:08:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=47646919</link><dc:creator>atanasi</dc:creator><comments>https://news.ycombinator.com/item?id=47646919</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47646919</guid></item><item><title><![CDATA[New comment by atanasi in "Why are we still using Markdown?"]]></title><description><![CDATA[
<p>Bad money drives out good money only if there is a legal tender law such that both have to be accepted for the same nominal value. In this case, good money is hoarded because it cannot be traded for its true value.</p>
]]></description><pubDate>Sat, 04 Apr 2026 10:01:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47637629</link><dc:creator>atanasi</dc:creator><comments>https://news.ycombinator.com/item?id=47637629</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47637629</guid></item><item><title><![CDATA[New comment by atanasi in "Changes to Android Open Source Project"]]></title><description><![CDATA[
<p>It's the security of the ecosystem, where the interests of app vendors are fundamental: content distributors can count on enforcing DRM, and banks are relying on the camera used for KYC actually being a camera and not a virtual device.</p>
]]></description><pubDate>Sat, 10 Jan 2026 11:29:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=46564801</link><dc:creator>atanasi</dc:creator><comments>https://news.ycombinator.com/item?id=46564801</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46564801</guid></item><item><title><![CDATA[New comment by atanasi in "NPM debug and chalk packages compromised"]]></title><description><![CDATA[
<p>Reading comprehension problems can often be caught with some static analysis combined with AI.</p>
]]></description><pubDate>Wed, 10 Sep 2025 15:13:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=45198971</link><dc:creator>atanasi</dc:creator><comments>https://news.ycombinator.com/item?id=45198971</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45198971</guid></item><item><title><![CDATA[New comment by atanasi in "Bitwarden is no longer free software"]]></title><description><![CDATA[
<p>FSF has published a commentary: <a href="https://www.gnu.org/licenses/gpl-faq.html#MereAggregation" rel="nofollow">https://www.gnu.org/licenses/gpl-faq.html#MereAggregation</a><p>GPL licenses have allowed so-called "mere aggregation", where separate programs are distributed together. Such programs don't have to be all covered by GPL.<p>On the other hand, if parts are intimately tied to each other such that they are effectively a single program, GPL applies to the whole.<p>The FSF commentary explains that the judgment depends both on the mechanisms and the semantics of the co-operation. Technical implementation details don't make programs separate if they are intimately designed to work together: "But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program."</p>
]]></description><pubDate>Sun, 20 Oct 2024 17:34:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=41897037</link><dc:creator>atanasi</dc:creator><comments>https://news.ycombinator.com/item?id=41897037</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41897037</guid></item><item><title><![CDATA[New comment by atanasi in "Looking Glass: Run a Windows VM on Linux in a window with native performance"]]></title><description><![CDATA[
<p>Server-side solutions don't catch all cheats. They can block actions that are impossible according to the game rules but they cannot prevent clients from disclosing too much information to the player about other players, or automating actions that are technically possible, like using aimbots.</p>
]]></description><pubDate>Sun, 18 Jul 2021 10:12:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=27871844</link><dc:creator>atanasi</dc:creator><comments>https://news.ycombinator.com/item?id=27871844</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27871844</guid></item><item><title><![CDATA[New comment by atanasi in "64 bit OS Raspberry Pi4 Benchmarks"]]></title><description><![CDATA[
<p>I have heard that AES is very complicated to implement in software, if one intends to avoid side-channel leaks.</p>
]]></description><pubDate>Sun, 01 Mar 2020 12:10:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=22456534</link><dc:creator>atanasi</dc:creator><comments>https://news.ycombinator.com/item?id=22456534</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22456534</guid></item><item><title><![CDATA[New comment by atanasi in "“My wife has complained that OpenOffice will never print on Tuesdays” (2009)"]]></title><description><![CDATA[
<p>In the case of printing, the context provides some information. In particular, Erlang JAM file seems unlikely to be printed.</p>
]]></description><pubDate>Mon, 27 Jan 2020 14:14:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=22159362</link><dc:creator>atanasi</dc:creator><comments>https://news.ycombinator.com/item?id=22159362</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22159362</guid></item><item><title><![CDATA[New comment by atanasi in "Programming Language Checklist"]]></title><description><![CDATA[
<p>Are they even similar to JavaScript or PHP?</p>
]]></description><pubDate>Fri, 03 Jan 2020 14:45:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=21946262</link><dc:creator>atanasi</dc:creator><comments>https://news.ycombinator.com/item?id=21946262</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21946262</guid></item><item><title><![CDATA[New comment by atanasi in "Google’s Monopoly is Stifling Free Software?"]]></title><description><![CDATA[
<p>Certificates are precisely for authentication, but the simplest form employed by automatic systems like letsencrypt only tries to verify domain control. It does not bind the certificate to any legal identity, unlike stronger forms of certificates.</p>
]]></description><pubDate>Sun, 29 Dec 2019 21:43:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=21908726</link><dc:creator>atanasi</dc:creator><comments>https://news.ycombinator.com/item?id=21908726</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21908726</guid></item></channel></rss>