<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: byteknight</title><link>https://news.ycombinator.com/user?id=byteknight</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 08 Apr 2026 22:50:57 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=byteknight" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by byteknight in "GPT-5o-mini hallucinates medical residency applicant grades"]]></title><description><![CDATA[
<p>Never thought about it from that perspective, but I think you're right. It is by design, not deceptive intent, just the infinite monkeys theorem where we've replaced randomness with pattern matching trained on massive datasets.</p>
]]></description><pubDate>Tue, 14 Oct 2025 15:33:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=45581274</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=45581274</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45581274</guid></item><item><title><![CDATA[New comment by byteknight in "A Guide for WireGuard VPN Setup with Pi-Hole Adblock and Unbound DNS"]]></title><description><![CDATA[
<p>May be helpful for others. Fully packaged version<p><a href="https://github.com/IAmStoxe/wirehole" rel="nofollow">https://github.com/IAmStoxe/wirehole</a></p>
]]></description><pubDate>Sun, 12 Oct 2025 01:58:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=45554484</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=45554484</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45554484</guid></item><item><title><![CDATA[New comment by byteknight in "Working pipe operator today in pure JavaScript"]]></title><description><![CDATA[
<p>Seems similar to the problem encountered when making the stupid idea PyNQ:<p><a href="https://github.com/IAmStoxe/PyNQ" rel="nofollow">https://github.com/IAmStoxe/PyNQ</a></p>
]]></description><pubDate>Wed, 08 Oct 2025 15:43:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=45517411</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=45517411</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45517411</guid></item><item><title><![CDATA[New comment by byteknight in "Germany must stand firmly against client-side scanning in Chat Control [pdf]"]]></title><description><![CDATA[
<p>Isn't that specific to pictures?</p>
]]></description><pubDate>Mon, 06 Oct 2025 16:22:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=45493027</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=45493027</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45493027</guid></item><item><title><![CDATA[New comment by byteknight in "Germany must stand firmly against client-side scanning in Chat Control [pdf]"]]></title><description><![CDATA[
<p>Encryption is defined as "the process of converting information or data into a code, especially to prevent unauthorized access."<p>What you describe is the same thing just not cryptographic.</p>
]]></description><pubDate>Fri, 03 Oct 2025 17:12:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=45465208</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=45465208</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45465208</guid></item><item><title><![CDATA[New comment by byteknight in "Gemini 2.5 Flash Image"]]></title><description><![CDATA[
<p>Are you doing roleplay?</p>
]]></description><pubDate>Tue, 26 Aug 2025 16:24:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=45028723</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=45028723</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45028723</guid></item><item><title><![CDATA[New comment by byteknight in "FFmpeg Assembly Language Lessons"]]></title><description><![CDATA[
<p>Seems so easy! You only need the entire world even tangentially related to video to rely solely on your project for a task and you too can have all the developers you need to work on performance!</p>
]]></description><pubDate>Mon, 18 Aug 2025 15:05:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=44941439</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=44941439</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44941439</guid></item><item><title><![CDATA[New comment by byteknight in "Why LLMs can't really build software"]]></title><description><![CDATA[
<p>"Just ask AI" is a phrase you will hear around enterprises now. You less often hear "Google it". You hear "ChatGPT it".</p>
]]></description><pubDate>Thu, 14 Aug 2025 18:15:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=44903765</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=44903765</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44903765</guid></item><item><title><![CDATA[New comment by byteknight in "Why LLMs can't really build software"]]></title><description><![CDATA[
<p>Not sure how that fits. Do you produce good results every time, first try? Didn't think so.</p>
]]></description><pubDate>Thu, 14 Aug 2025 18:14:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=44903757</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=44903757</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44903757</guid></item><item><title><![CDATA[New comment by byteknight in "Why LLMs can't really build software"]]></title><description><![CDATA[
<p>I think you replied in the wrong place, bud. All the best.<p>EDIT - I see now. sorry.<p>For all intents and purposes of the public. AI == LLM. End of story. Doesn't matter what developers say.</p>
]]></description><pubDate>Thu, 14 Aug 2025 17:19:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=44903104</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=44903104</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44903104</guid></item><item><title><![CDATA[New comment by byteknight in "NSF and Nvidia award Ai2 $152M to support building an open AI ecosystem"]]></title><description><![CDATA[
<p>As an American, I obviously can get behind it, but I can easily see how a declared goal of superiority of others would rub those others the wrong way (and possibly prevent their contribution)<p>[Insert xkcd new standard image here]</p>
]]></description><pubDate>Thu, 14 Aug 2025 16:56:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=44902799</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=44902799</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44902799</guid></item><item><title><![CDATA[New comment by byteknight in "Why LLMs can't really build software"]]></title><description><![CDATA[
<p>I have to disagree. Anyone that says LLMs do not qualify as AI are the same people who will continue to move the goal posts for AGI. "Well it doesn't do this!". No one here is trying to replicate a human brain or condition in its entirety. They just want to replicate the thinking ability of one. LLMs represent the closest parallel we have experienced thus far to that goal. Saying that LLMs are not AI feel disingenuous at best and entirely purposely dishonest at the worst (perhaps perceived as staving off the impending demise of a profession).<p>The sooner people stop worrying about a label for what you feel fits LLMs best, the sooner they can find the things they (LLMs) absolutely excel at and improve their (the user's) workflows.<p>Stop fighting the future. Its not replacing right now. Later? Maybe. But right now the developers and users fully embracing it are experiencing productivity boosts unseen previously.<p>Language is what people use it as.</p>
]]></description><pubDate>Thu, 14 Aug 2025 15:58:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=44902007</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=44902007</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44902007</guid></item><item><title><![CDATA[New comment by byteknight in "Uber will let women drivers and riders request to avoid being paired with men"]]></title><description><![CDATA[
<p>While it is totally nonsensical, as as suggestion as a business practice, I will indulge in the idea as if you are being genuine.<p>You cannot give a gender more money to do the same job with the criteria being a specific gender. That is blatantly illegal.</p>
]]></description><pubDate>Wed, 23 Jul 2025 15:18:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=44660192</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=44660192</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44660192</guid></item><item><title><![CDATA[New comment by byteknight in "Show HN: Open source alternative to Perplexity Comet"]]></title><description><![CDATA[
<p>But in reality, would much more consistently be automated by a single playwright script.</p>
]]></description><pubDate>Fri, 11 Jul 2025 01:31:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=44527583</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=44527583</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44527583</guid></item><item><title><![CDATA[New comment by byteknight in "MCP-B: A Protocol for AI Browser Automation"]]></title><description><![CDATA[
<p>He rewrote history to hide it?<p>He admits it here <a href="https://news.ycombinator.com/item?id=44516104">https://news.ycombinator.com/item?id=44516104</a></p>
]]></description><pubDate>Thu, 10 Jul 2025 01:18:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=44516325</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=44516325</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44516325</guid></item><item><title><![CDATA[New comment by byteknight in "Get the location of the ISS using DNS"]]></title><description><![CDATA[
<p>Gives a whole new meaning to its always DNS.</p>
]]></description><pubDate>Sun, 06 Jul 2025 15:52:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=44481783</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=44481783</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44481783</guid></item><item><title><![CDATA[New comment by byteknight in "FICO to incorporate buy-now-pay-later loans into credit scores"]]></title><description><![CDATA[
<p>Regardless no one can make you buy anything</p>
]]></description><pubDate>Tue, 24 Jun 2025 12:38:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=44365533</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=44365533</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44365533</guid></item><item><title><![CDATA[New comment by byteknight in "EchoLeak – 0-Click AI Vulnerability Enabling Data Exfiltration from 365 Copilot"]]></title><description><![CDATA[
<p>No, zero click requires no interaction from the user. For a hypothetical example simply having a phone on a cellular network and being susceptible to base-band attacks. No interaction needed, just existing.</p>
]]></description><pubDate>Fri, 13 Jun 2025 18:26:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=44270915</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=44270915</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44270915</guid></item><item><title><![CDATA[New comment by byteknight in "A dark adtech empire fed by fake CAPTCHAs"]]></title><description><![CDATA[
<p>It bypasses a lot of the checks they do on the initial site when submitting to ad networks. It also allows custom redirections based on user agent, potential ip location, etc. Common in phishing.</p>
]]></description><pubDate>Fri, 13 Jun 2025 02:31:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=44265248</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=44265248</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44265248</guid></item><item><title><![CDATA[New comment by byteknight in "Chatterbox TTS"]]></title><description><![CDATA[
<p>TTS is a very common initialism for Text-to-Speech going back to at least the 90s.</p>
]]></description><pubDate>Wed, 11 Jun 2025 22:04:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=44252323</link><dc:creator>byteknight</dc:creator><comments>https://news.ycombinator.com/item?id=44252323</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44252323</guid></item></channel></rss>