<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: captainmuon</title><link>https://news.ycombinator.com/user?id=captainmuon</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 18 Apr 2026 12:32:41 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=captainmuon" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by captainmuon in "Long Range E-Bike (2021)"]]></title><description><![CDATA[
<p>I don't understand that point. Why do e-bikes become better or more safe when you have to rotate your legs? Its really frustrating and silly that I have to go through the motions (literally) of riding a bicycle if I want to get the priviledge of using a bike lane or going without a license plate. (At least that's the case here in Germany AFAIK).<p>They could go ahead and make "fast electric bikes" and "slow electric bikes" or something as categories and that would make sense - but hinging the decision on whether your legs or your wrist is turning is illogical. I think it is actually morally charged - like you have to put in the work if you want the privilege.</p>
]]></description><pubDate>Sun, 01 Mar 2026 17:40:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47208841</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=47208841</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47208841</guid></item><item><title><![CDATA[New comment by captainmuon in "AI doesn’t reduce work, it intensifies it"]]></title><description><![CDATA[
<p>It's like the invention of the power loom, but for knowledge workers. Might be interesting to look at the history of industrialisation and the reactions to it.</p>
]]></description><pubDate>Tue, 10 Feb 2026 11:07:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=46958108</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=46958108</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46958108</guid></item><item><title><![CDATA[New comment by captainmuon in "IPv6 just turned 30 and still hasn't taken over the world"]]></title><description><![CDATA[
<p>I guess technically you are right, in that NAT doesn't <i>prevent</i> connections, it <i>enables</i> connections. But in the situation where you would have a NAT, behind a residential router, an outside host cannot connect to an arbitrary host on my internal network.<p>On a publicly routed PC, I can call `listen` and an outside host can connect to me.<p>On a PC behind a NAT - if I don't set up port forwarding - I can call `listen` and nobody from outside can connect to me.<p>So one could say, going from publicy routed to behind a NAT means that only allowed incoming connections are possible. Or am I missing something and you can really, from the outside, open a connection to a PC on a residential network which is behind a simple NAT (TCP server listening on that PC)?</p>
]]></description><pubDate>Sat, 03 Jan 2026 10:09:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=46474856</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=46474856</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46474856</guid></item><item><title><![CDATA[New comment by captainmuon in "Roc Camera"]]></title><description><![CDATA[
<p>Nooo... I don't want something to exist that can absolutely prove that a photo is real. This only serves to enforce social norms more rigidly. These include reasonable norms like against committing crimes or behaving abusingly but it also includes stupid norms like behaving uncool or doing something embarrasing. The problem is, where do you draw the line? I think if somebody does something stupid or even morally dubious there should always be a way of forgetting it.<p>That you can't believe everything you see in the age of AI is a feature, not a bug. We are so used to photographs being hard facts that we'll have to go through a hard transition, but we'll be fine afterwards, just as we were before the invention of photography. Our norms will adapt. And photographs will become mere heresay and illustration, but that's OK.<p>I think here the same dynamic is at play as with music/videos and DRM. Our society is so used to doing it the old way - selling physical records - that when new technology comes along, which allows free copying, we can't go where the technology leads us (because we don't know how to feed the artists, and because the record industry has too much power), so we invent a mechanism to turn back the wheel and make music into a scarce good again. Similar here: we can't ban Photoshop and AI, but we invent a technology to try to turn back time and make photos "evidence" again.</p>
]]></description><pubDate>Fri, 24 Oct 2025 09:41:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=45692737</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=45692737</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45692737</guid></item><item><title><![CDATA[New comment by captainmuon in "Why do LLMs freak out over the seahorse emoji?"]]></title><description><![CDATA[
<p>LLMs are just the speech center part of the brain, not a whole brain. It's like when you are speaking on autopilot, or reciting something by heart, it just comes out. There is no reflection or inner thought process. Now thinking models do actually do a bit of inner monologue before showing you the output so they have this problem to a much lesser degree.</p>
]]></description><pubDate>Mon, 06 Oct 2025 05:56:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=45488070</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=45488070</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45488070</guid></item><item><title><![CDATA[New comment by captainmuon in "Defer: Resource cleanup in C with GCCs magic"]]></title><description><![CDATA[
<p>> this just hasn't been the case for some time now<p>Which I find sad actually. The idea of C++ as a superset of C is really powerful, especially when mixing C and C++. A while ago I had a C project (firmware for a microcontroller) and wanted to bake the version and the compilation time into the firmware. I didn't find a way to do this in plain C, but in C++ you can initialize a global struct and it gets statically linked into the output. This didn't even use constexpr, just preprocessor trickery. Then it was just a matter of renaming the c file to cpp and recompiling. I guess you could also do that with C, but there are things like RAII or constexpr or consuming a C++ library that you can't do without.</p>
]]></description><pubDate>Wed, 01 Oct 2025 13:52:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=45437752</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=45437752</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45437752</guid></item><item><title><![CDATA[New comment by captainmuon in "GrapheneOS and forensic extraction of data (2024)"]]></title><description><![CDATA[
<p>> Cellebrite admits they can not hack GrapheneOS if users had installed updates since late 2022.<p>So, how do I know that GrapheneOS is not a honeypot for the really big fish?<p>At this point it seems if you really want to be safe, you have to add obscurity (in addition to conventional best practices). Like changing the pinout on your USB port so the exploit device can't connect.</p>
]]></description><pubDate>Fri, 12 Sep 2025 05:54:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=45219017</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=45219017</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45219017</guid></item><item><title><![CDATA[New comment by captainmuon in "Unfortunately, the ICEBlock app is activism theater"]]></title><description><![CDATA[
<p>Or 3) there are illegal immigrants and ICE is deporting them according to the law, BUT some people think this is unjust and want to do something against it. The democratic process to change laws is too slow or doesn't work properly, or there is no majority to change the law.<p>Remember there is a difference between legal and legitimate. You don't <i>have to</i> do something <i>just</i> because it is the law (well, you could define "have to" to mean what the law says, but then it becomes pretty circular).<p>Historically, often behavior changes before the applicable laws change. Think about the acceptance of gay relationships, or the use of cannabis. If people don't sometimes break the law, society can't evolve. That doesn't mean the rule of law has to break down. I think the rule of law is very important and would uphold it in most cases, but there are certain cases where conscience might order one to break or circumvent a law.</p>
]]></description><pubDate>Tue, 02 Sep 2025 14:27:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=45103566</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=45103566</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45103566</guid></item><item><title><![CDATA[New comment by captainmuon in "Bear is now source-available"]]></title><description><![CDATA[
<p>I think users applies to end-users here. So you must not run the software as a service (either paid or for free) for other users. You are free to use it yourself.<p>Crucially, I think what is banned to offer accounts. Offering turnkey-hosting is probably banned in spirit, but the person offering the turnkey-hosting is not in violation, rather the person <i>booking</i> the turnkey hosting and <i>offering</i> the accounts on the instance to third parties is in violation.<p>I think the wording is originally against somebody like Amazon hosting e.g. <i>database</i> instances for other people to use, and then giving you an account in that database. It's still OK to rent a VM from them and use the package manager to install it.<p>In any way, it is really confusing, in a way a license should not be. And I don't really understand why someone builds a blog <i>platform</i>, which is not monetized, open sources it, but doesn't want other people to host it. If I open source my stuff, I want people to use it. If I want to share the code but don't want people to use it I'd just put it somewhere it with no license at all (all rights reserved).</p>
]]></description><pubDate>Mon, 01 Sep 2025 17:38:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=45094836</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=45094836</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45094836</guid></item><item><title><![CDATA[New comment by captainmuon in "Nintendo Switch 2 Dock USB-C Compatibility"]]></title><description><![CDATA[
<p>So, as there are a couple of docks coming out that work with Switch 2 and have apparently reverse engineered the protocol... I wonder if some company could make a small dongle that just sits between the switch and my monitor, or my USB-C docking station, and fixes the communication.<p>For a DIY solution, protocol wise it doesn't seem too complicated, but electronically USB-C or HDMI is out of reach for most hobbyists. And I assume most USB-C interface chips you can get aren't programmable to the degree neccessary...</p>
]]></description><pubDate>Mon, 01 Sep 2025 10:09:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=45091303</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=45091303</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45091303</guid></item><item><title><![CDATA[New comment by captainmuon in "Show HN: Anonymous Age Verification"]]></title><description><![CDATA[
<p>No, please do invent your own crypto, just don't deploy it! Coming up with schemes and then seeing where they fail is the best way to learn the intricacies. I think more of us 'lowly developers' should be familiar with the common pitfalls.<p>That the bank is aware of your identity is not neccessarily a flaw, but a boundary condition of the protocol. <i>Assuming a trusted intermediary, how can we...</i>. I think a solution here is not purely technical, but also <i>social</i>. How about establishing a trusted intermediary that can check your identity, but for sure does not do anything malicious with the information? Maybe there is a strong taboo against disclosing the information, like with the confidentiality of confession.<p>There is another flaw in the proposed scheme, how do you make sure that people don't just take the signature from another person? This one is pretty tricky to solve.<p>I have been thinking about similar "proof of attribute" protocols for a while, since they have interesting use cases outside of age verification. You could verify that a person on HN is really an Apple employee, without Apple being able to identify that user. Or on a dating site, you could verify that the user is a certain gender, in a certain age bracket, and the account is tied to a social media account in good standing (not a throwaway account), without having the link explicit somewhere (and thus leakable).</p>
]]></description><pubDate>Mon, 01 Sep 2025 07:37:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=45090414</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=45090414</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45090414</guid></item><item><title><![CDATA[New comment by captainmuon in "Uncertain<T>"]]></title><description><![CDATA[
<p>Back when I was studying physics, we frequently had to do calculations with error propagation. I tried to implement something very similar in C++ and in Python, but never finished it. I also thought it would be neat if a spreadsheet program could understand uncertainties, and also units, so you could enter 1m +- 10cm and it would propagate the errors correctly. If you laid out the data with one column for the values and one for the errors, I had a couple of OpenOffice macros that would perform the calculations.<p>Another place where I think this would be neat would be in CAD. Imagine if you are trying to create a model of an existing workpiece or of a room, and your measurements don't exactly add up. It's really frustrating and you have to go back and measure again, and you usually end up idealizing the model and putting in rounder numbers to make it fit, but it is less true to reality. It would be cool if you could put in uncertainties for all lengths and angles, and it would run a solver to minimize the total error.</p>
]]></description><pubDate>Fri, 29 Aug 2025 16:14:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=45065987</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=45065987</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45065987</guid></item><item><title><![CDATA[New comment by captainmuon in "Open hardware desktop 3D printing is dead?"]]></title><description><![CDATA[
<p>Their business model might be dead, I don't know. But the latest Prusa printers are as far as I know not really open - I can't download the schematics for free and make a clone, can I? And also a truely open schematic that I could download that way wouldn't be affected by patents, as long as I'm not selling it. Granted, commercial development with open core might be in trouble.<p>But first, that is not a technical nor a business problem, that sounds like a political problem. Prusa is literally the leading european name in the 3D-printing industry. Surely they can get an appointment with some government officials, who are concerned about manufacturing capabilities and future technologies - who pull some strings, and then every patent clerk will receive a memo to double check the relevant patents when someone tries to register them.<p>Second, Chinese patents have a different weight than EU/US patents. As he writes, they are a dime a dozen. Probably not worth caring about, unless they are targeting the Chinese market. And if they are, the best defense would probably to register some patents their themselves.</p>
]]></description><pubDate>Fri, 15 Aug 2025 14:49:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=44913128</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=44913128</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44913128</guid></item><item><title><![CDATA[New comment by captainmuon in "Ask HN: How can ChatGPT serve 700M users when I can't run one GPT-4 locally?"]]></title><description><![CDATA[
<p>I work at a university data center, although not on LLMs. We host state of the art models for a large number of users. As far as I understand, there is no secret sauce. We just have a big GPU cluster with a batch system, where we spin up jobs to run certain models. The tricky part for us is to have the various models available on demand with no waiting time.<p>But I also have to say 700M weekly users could mean 100M daily or 70k a minute (low ball estimate with no returning users...) is a lot, but achievable at startup scale. I don't have out current numbers but we are several orders of magnitude smaller of course :-)<p>The big difference to home use is the amount of VRAM. Large VRAM GPUs such as H100 are gated being support contracts and cost 20k. Theoretically you could buy a Mac Pro with a ton of RAM as an individual if you wanted to run auch models yourself.</p>
]]></description><pubDate>Fri, 08 Aug 2025 20:13:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=44841184</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=44841184</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44841184</guid></item><item><title><![CDATA[New comment by captainmuon in "C++: "model of the hardware" vs. "model of the compiler" (2018)"]]></title><description><![CDATA[
<p>> The reason you are using C++ in the first place is because you care about details like allocation, so to me this is a gigantic fumble.<p>I wouldn't say that applies to everybody. I use C++ because it interfaces with the system libraries on every platform, because it has class-based inheritance (like Java and C#, unlike Rust and Zig) and because it compiles to native code without an external runtime. I don't care to much about allocations.<p>For me the biggest fumble is that C++ provides the async framework, but no actual async stdlib (file io and networking). It took a while for options to be available, and while eg Asio works nicely it is crazily over engineered in places.</p>
]]></description><pubDate>Mon, 04 Aug 2025 12:58:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=44785165</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=44785165</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44785165</guid></item><item><title><![CDATA[New comment by captainmuon in "Apple introduces a universal design across platforms"]]></title><description><![CDATA[
<p>We have these brilliant high resolution displays, and these powerful, energy efficient GPUs that are always running and compositing frames like a game engine 120 times a second.<p>It's about time we start seeing more physicality in our user interfaces!<p>We can make things look convincingly like glass, or metal, or even materials that don't exist in reality. One reason for flat design is because it was the lowest common denominator and easy for devs to implement. If Apple makes it easy to implement this liquid glass stuff - Rectangle().background(.glass) or something - then it's going to be really successful.</p>
]]></description><pubDate>Mon, 09 Jun 2025 18:45:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=44227799</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=44227799</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44227799</guid></item><item><title><![CDATA[New comment by captainmuon in "Apple introduces a universal design across platforms"]]></title><description><![CDATA[
<p>It's just a shader, so maybe not in pure CSS, but you could probably achive something like that in WebGL.<p>About "only Apple can achive that": It would be pretty simple for MS to do something like this in Windows. DirectComposition (or whatever it is called nowadays) could set the appropriate shader when drawing windows. You cannot do it as a normal user, because you can only pick from a select set of backdrop shaders (but if some hacker wants a challenge, you could inject the code into dwm.exe to do so :-)).</p>
]]></description><pubDate>Mon, 09 Jun 2025 18:39:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=44227702</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=44227702</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44227702</guid></item><item><title><![CDATA[New comment by captainmuon in "A thought on JavaScript "proof of work" anti-scraper systems"]]></title><description><![CDATA[
<p>I don't know, Sandbox escape from a browser is a big deal, a million dollars bounty kind of deal. I feel safe to put an automated browser in a container or a VM and let it run with a timeout.<p>And if a site pulls something like that on me, then I just don't take their data. Joke is on them, soon if something is not visible to AI it will not 'exist', like it is now when you are delisted from Google.</p>
]]></description><pubDate>Wed, 28 May 2025 09:09:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=44114099</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=44114099</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44114099</guid></item><item><title><![CDATA[New comment by captainmuon in "A thought on JavaScript "proof of work" anti-scraper systems"]]></title><description><![CDATA[
<p>As somebody who does some scraping / crawling for legitimate uses, I'm really unhappy with this development. I understand people have valid cases why they don't want their content scraped. Maybe they want to sell it - I can understand that, although I don't like it. Maybe they are opposed to it for fundamental reasons. I for one would <i>like</i> my content to be spread maximally. I want my arguments to be incorporated into AIs, so I can reach more people. But of course that is just me when I'd write certain content, others have different goals.<p>It gets annoying when you have the right to scrape something - either because the owner of the data gave you the OK or because it is openly licensed. But then the webmaster can't be bothered to relax the rate limiter for you, and nobody can give you a nice API. Now people are putting their Open Educational Resources, their open source software, even their freaking essays about openness that they want the world to read behind Anubis. It makes me shake my head.<p>I understand perfectly it is annoying when badly written bots hammer your site. But maybe then HTTP and those bots are the problem. Maybe we should make it easier for site owners to push their content somewhere where we can scrape it easier?</p>
]]></description><pubDate>Wed, 28 May 2025 09:03:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=44114066</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=44114066</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44114066</guid></item><item><title><![CDATA[New comment by captainmuon in "Leeks and Leaks"]]></title><description><![CDATA[
<p>I feel like most people only use Tor via the Tor browser or a socks proxy, and the developers in the ecosystem cater only to these users. But there are a bunch of other creative uses of Tor around.<p>A couple of years ago, I used the TransPort feature of Tor combined with an iptables rule to redirect certain applications over Tor, like a web browser. The goal was a poor man's VPN. Access some websites without your local network admin to know about it, and without the website to know who you are. Back then there was Java applets and Flash, and this worked to hide network requests from them, too, as opposed to other solutions. Later iptables removed the feature that allowed you to filter on PID and broke my workflow. I changed it to use a dedicated unix user for tor, but that broke at some point, too, and I just got a commercial VPN.<p>Tor discouraged my use case, and I guess if you are afraid of being tracked or recognized as a returning user, then you should stick to Tor browser. But everybody has their own use cases.</p>
]]></description><pubDate>Fri, 16 May 2025 12:16:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=44004511</link><dc:creator>captainmuon</dc:creator><comments>https://news.ycombinator.com/item?id=44004511</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44004511</guid></item></channel></rss>