<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: bangaladore</title><link>https://news.ycombinator.com/user?id=bangaladore</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 08 Apr 2026 10:38:03 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=bangaladore" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by bangaladore in "Our commitment to Windows quality"]]></title><description><![CDATA[
<p>> Microsofts esteemed moat (office) is “Web only” on the lowest tier.<p>If you've ever used it before, you'd quickly come to the conclusion that web only Office is only useful for someone writing essays for school.<p>The moment you need to do anything more complex than that, the document renders completely differently on web vs app-- not to mention there are tons of critical features that aren't even available on the web version.</p>
]]></description><pubDate>Fri, 20 Mar 2026 22:29:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47461579</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=47461579</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47461579</guid></item><item><title><![CDATA[New comment by bangaladore in "CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root"]]></title><description><![CDATA[
<p>The bigger problem here is it seems like the rust utilities were rushed to be released without extensive testing or security analysis because <i>simply because they are written in rust</i>. And this isn't the first serious flaw because of that.<p>Doesn't surprise me coming from Canonical though.<p>At least that's the vibe I'm getting from [1] and definitely [2]<p>[1] <a href="https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-systemd-tmpfiles.txt" rel="nofollow">https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-sys...</a>
[2] <a href="https://bugs.launchpad.net/ubuntu/+source/rust-coreutils/+bug/2111815" rel="nofollow">https://bugs.launchpad.net/ubuntu/+source/rust-coreutils/+bu...</a></p>
]]></description><pubDate>Wed, 18 Mar 2026 18:19:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47429341</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=47429341</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47429341</guid></item><item><title><![CDATA[New comment by bangaladore in "Show HN: Moonshine Open-Weights STT models – higher accuracy than WhisperLargev3"]]></title><description><![CDATA[
<p>There is a license blurb in the readme.<p>> This code, apart from the source in core/third-party, is licensed under the MIT License, see LICENSE in this repository.<p>> The English-language models are also released under the MIT License. Models for other languages are released under the Moonshine Community License, which is a non-commercial license.<p>> The code in core/third-party is licensed according to the terms of the open source projects it originates from, with details in a LICENSE file in each subfolder.</p>
]]></description><pubDate>Tue, 24 Feb 2026 22:49:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=47144507</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=47144507</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47144507</guid></item><item><title><![CDATA[New comment by bangaladore in "We hid backdoors in ~40MB binaries and asked AI + Ghidra to find them"]]></title><description><![CDATA[
<p>What's the point of posting what is clearly an AI generated comment.</p>
]]></description><pubDate>Sun, 22 Feb 2026 20:15:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47114222</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=47114222</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47114222</guid></item><item><title><![CDATA[New comment by bangaladore in "IronClaw: a Rust-based clawd that runs tools in isolated WASM sandboxes"]]></title><description><![CDATA[
<p>Afaik Anthropic is not giving pretty much any provider model weights, so any inference of Opus is certainly not private. Either going through Anthropic or Bedrock, or Vertex.<p>Of the three Bedrock is probably the best for trust, but still not private by any means.</p>
]]></description><pubDate>Fri, 13 Feb 2026 21:18:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47007965</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=47007965</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47007965</guid></item><item><title><![CDATA[New comment by bangaladore in "Deno Sandbox"]]></title><description><![CDATA[
<p>Another common tell nowadays is the apostrophe type (’ vs ').<p>I don't know personally how to even type ’ on my keyboard. According to find in chrome, they are both considered the same character, which is interesting.<p>I suspect some word processors default to one or the other, but it's becoming all too common in places like Reddit and emails.</p>
]]></description><pubDate>Tue, 03 Feb 2026 22:12:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=46878075</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=46878075</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46878075</guid></item><item><title><![CDATA[New comment by bangaladore in "Parametric CAD in Rust"]]></title><description><![CDATA[
<p>> That's the beauty of constraint-based parametric modeling as opposed to, say, modeling in Blender.<p>I was thinking the same thing. This looks more like an API that makes 3d modeling look closer to CAD, but without realizing that CAD is about constraints, parametrizing, and far more.</p>
]]></description><pubDate>Tue, 27 Jan 2026 22:08:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=46787718</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=46787718</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46787718</guid></item><item><title><![CDATA[New comment by bangaladore in "Ask HN: Why can't I apply custom fonts to HN?"]]></title><description><![CDATA[
<p>CSP is inherently a client-side browser security feature, so yes.</p>
]]></description><pubDate>Sun, 25 Jan 2026 02:50:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=46750221</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=46750221</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46750221</guid></item><item><title><![CDATA[New comment by bangaladore in "Shared Claude: A website controlled by the public"]]></title><description><![CDATA[
<p>That's certainly one of the things to be concerned with. Not certain how that's implemented, but I can still see there being holes in that strategy.</p>
]]></description><pubDate>Sun, 25 Jan 2026 01:49:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=46749849</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=46749849</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46749849</guid></item><item><title><![CDATA[New comment by bangaladore in "Shared Claude: A website controlled by the public"]]></title><description><![CDATA[
<p>True. I suspect they will ban you depending on refusal frequency and severity.</p>
]]></description><pubDate>Sun, 25 Jan 2026 01:49:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=46749839</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=46749839</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46749839</guid></item><item><title><![CDATA[New comment by bangaladore in "Claude Code's new hidden feature: Swarms"]]></title><description><![CDATA[
<p>Very much so. It feels like it can't have been that common in the original training corpus. Probably more common now given that we are training slop generators with slop.</p>
]]></description><pubDate>Sat, 24 Jan 2026 20:54:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=46747559</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=46747559</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46747559</guid></item><item><title><![CDATA[New comment by bangaladore in "Shared Claude: A website controlled by the public"]]></title><description><![CDATA[
<p>More concerned (for the author) of someone trying to host/show illegal material. AI guardrails can only be so effective.</p>
]]></description><pubDate>Sat, 24 Jan 2026 20:50:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=46747531</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=46747531</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46747531</guid></item><item><title><![CDATA[New comment by bangaladore in "Show HN: Sweep, Open-weights 1.5B model for next-edit autocomplete"]]></title><description><![CDATA[
<p>So SFT cost less only low hundreds of dollars? (1-10$ per hour per H100 if I'm seeing this correctly).<p>What about SFT?<p>Presumably basing this of Qwen is the reason it can be done for so cheap?</p>
]]></description><pubDate>Thu, 22 Jan 2026 05:05:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=46715549</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=46715549</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46715549</guid></item><item><title><![CDATA[New comment by bangaladore in "TPM on embedded systems: Pitfalls and caveats to watch out for"]]></title><description><![CDATA[
<p>It doesn't help that the TPM spec is so full of optional features (and the N spec versions), so it's often annoying to find out what the vendor even supports without signing an NDA + some.<p>TPMs work great when you have a mountain of supporting libraries to abstract them from you. Unfortunately, that's often not the case in the embedded world.</p>
]]></description><pubDate>Wed, 21 Jan 2026 16:41:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=46708071</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=46708071</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46708071</guid></item><item><title><![CDATA[New comment by bangaladore in "TPM on embedded systems: Pitfalls and caveats to watch out for"]]></title><description><![CDATA[
<p>In many industries, once someone has physical access to a device, all bets are off. And when used correctly, TPMs can provide tons of value even when not encrypting the bus.</p>
]]></description><pubDate>Wed, 21 Jan 2026 16:39:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=46708048</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=46708048</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46708048</guid></item><item><title><![CDATA[New comment by bangaladore in "Eurostar AI vulnerability: When a chatbot goes off the rails"]]></title><description><![CDATA[
<p>Which is stupid as those are the vulnerabilities worth determining if they exist.<p>I can understand in a heavily regulated industry (e.g. Medical) that a company couldn't due to liability give you the go ahead to poke into other user's data in attempt to find a vulnerability, but they could always publish a dummy account detail that can be identified with fake data.<p>Something like:<p>It is strictly forbidden to probe arbitrary user data. However, if a vulnerability is suspected to allow access to user data, the user with GUID 'xyzw' is permitted to probe.<p>Now you might say that won't help. The people who want to follow the rules probably will, and the people who don't want to won't anyways.</p>
]]></description><pubDate>Mon, 05 Jan 2026 21:40:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=46505372</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=46505372</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46505372</guid></item><item><title><![CDATA[New comment by bangaladore in "Eurostar AI vulnerability: When a chatbot goes off the rails"]]></title><description><![CDATA[
<p>The best part is if you consider it a vulnerability, it is one you can't fix.<p>It reminds me of SQL injection techniques where you have to exfiltrate the data using weird data types. Like encoding all emails as dates or numbers using (semi) complex queries.<p>If the L(L)M has the data, it can provide it back to you, maybe not verbatim, but certainly can in <i>some</i> format.</p>
]]></description><pubDate>Mon, 05 Jan 2026 21:31:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=46505269</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=46505269</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46505269</guid></item><item><title><![CDATA[New comment by bangaladore in "Eurostar AI vulnerability: When a chatbot goes off the rails"]]></title><description><![CDATA[
<p>Is the idea that you'd have to guess the GUID of a future chat? If so that is impossible in practice. And even if you could, what's the outcome? Get someone to miss a train?<p>Certainly not "clear" based off what was described in this post.</p>
]]></description><pubDate>Sun, 04 Jan 2026 21:50:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=46492660</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=46492660</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46492660</guid></item><item><title><![CDATA[New comment by bangaladore in "iOS allows alternative browser engines in Japan"]]></title><description><![CDATA[
<p>Your "substance" is "trust Apple will enforce something correctly where there isn't a correct answer". I don't agree with that. Apple has a history of interpreting things favorably for themselves and locking 3rd parties from doing the same things for <i>wave hands</i> reasons.<p>If you are going to make guidelines, make them evaluable. These aren't. If you care about memory safety, either say use a memory safe language or point to an exact reference guide to use to allow XYZ language to satisfy it.</p>
]]></description><pubDate>Sun, 04 Jan 2026 01:25:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=46483803</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=46483803</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46483803</guid></item><item><title><![CDATA[New comment by bangaladore in "iOS allows alternative browser engines in Japan"]]></title><description><![CDATA[
<p>> It’s literally their project and seems to meet their requirements.<p>This is meaningless. Apple can carve out special exceptions for themselves all day long.</p>
]]></description><pubDate>Fri, 02 Jan 2026 19:12:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=46468226</link><dc:creator>bangaladore</dc:creator><comments>https://news.ycombinator.com/item?id=46468226</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46468226</guid></item></channel></rss>