<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: catalypso</title><link>https://news.ycombinator.com/user?id=catalypso</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 12 Apr 2026 16:18:08 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=catalypso" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by catalypso in "Privacy Pass Authentication for Kagi Search"]]></title><description><![CDATA[
<p>> the tokens are actually generated by the user and the server never sees them (unblinded) before their first usage<p>Here is how I see it:<p><pre><code>  1. The user generates a token/nonce => T

  2. The user blinds the token with secret blinding factor b => Blinded token TB = T*b

  3. The user sends the blinded token for signing. The server signs it and returns it to the user => Signed blinded token TBS = Sign(TB)

  4. The user unblinds the token (this does not break the signature) => Signed Unblinded token TS = TBS/b

  5. The user sends TS for its search query.
</code></pre>
The server signed TB, then received TS. Even if it logged that TB = user, it cannot link TS to TB, because it does not know the blinding factor b. Thus, it cannot link the search query with TS to the user.</p>
]]></description><pubDate>Sat, 15 Feb 2025 23:53:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=43063723</link><dc:creator>catalypso</dc:creator><comments>https://news.ycombinator.com/item?id=43063723</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43063723</guid></item><item><title><![CDATA[New comment by catalypso in "Things we learned about LLMs in 2024"]]></title><description><![CDATA[
<p>I just tried it and I'm actually surprised with how well they work even with base64 encoded inputs.<p><i>This is assuming they don't call an external pre-processing decoding tool.</i></p>
]]></description><pubDate>Wed, 01 Jan 2025 19:08:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=42568351</link><dc:creator>catalypso</dc:creator><comments>https://news.ycombinator.com/item?id=42568351</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42568351</guid></item><item><title><![CDATA[New comment by catalypso in "OpenAI O3 breakthrough high score on ARC-AGI-PUB"]]></title><description><![CDATA[
<p>Just a clarification, they tuned on the public training dataset, not the semi-private one. The 87.5% score was on the semi-private eval, which means the model was still able to generalize well.<p>That being said, the fact that this is not a "raw" base model, but one tuned on the ARC-AGI tests distribution takes away from the impressiveness of the result — How much ? — I'm not sure, we'd need the un-tuned base o3 model score for that.<p>In the meantime, comparing this tuned o3 model to other un-tuned base models is unfair (apples-to-oranges kind of comparison).</p>
]]></description><pubDate>Sun, 22 Dec 2024 15:07:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=42486771</link><dc:creator>catalypso</dc:creator><comments>https://news.ycombinator.com/item?id=42486771</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42486771</guid></item><item><title><![CDATA[New comment by catalypso in "Show HN: Hacker News frontpage as a print newspaper that you can personalize"]]></title><description><![CDATA[
<p>This looks cool!<p>I now almost exclusively get my HN feed through a simple script I wrote to  get desc sorted posts by score or trend (score/time): <a href="https://github.com/faroukfaiz10/hackernews-homepage">https://github.com/faroukfaiz10/hackernews-homepage</a><p>The result looks something like this ({score/time} - {score} - {link} - {comments link}):<p><pre><code>  59 - 1478 - Passport Photos - https://maxsiedentopf.com/passport-photos/ - https://news.ycombinator.com/item?id=42069646

  16 - 790 - Useful built-in macOS command-line utilities - https://weiyen.net/articles/useful-macos-cmd-line-utilities- https://news.ycombinator.com/item?id=42057431

  ...</code></pre></p>
]]></description><pubDate>Fri, 08 Nov 2024 16:43:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=42088230</link><dc:creator>catalypso</dc:creator><comments>https://news.ycombinator.com/item?id=42088230</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42088230</guid></item><item><title><![CDATA[New comment by catalypso in "Magic Wormhole: get things from one computer to another, safely"]]></title><description><![CDATA[
<p>Not magic-wormhole compatible, but saw these shared on other comments:<p>- <a href="https://wormhole.app" rel="nofollow">https://wormhole.app</a><p>- <a href="https://sendfiles.dev" rel="nofollow">https://sendfiles.dev</a><p>- <a href="https://file.pizza" rel="nofollow">https://file.pizza</a><p>- <a href="https://winden.app" rel="nofollow">https://winden.app</a></p>
]]></description><pubDate>Mon, 19 Aug 2024 22:44:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=41295188</link><dc:creator>catalypso</dc:creator><comments>https://news.ycombinator.com/item?id=41295188</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41295188</guid></item><item><title><![CDATA[New comment by catalypso in "The New Internet"]]></title><description><![CDATA[
<p>Clickbait is BLUF with a deceptive bottom line (BL). Clickbait is bad. You can choose to write in BLUF style without that.<p>In my experience, I only prefer "Classical philosophical writing" when I'm already convinced of reading the content (e.g. know the author, interested by the subject).<p>In almost all other cases, I prefer BLUF format: i.e. "get to the point, I'll read more if I'm intrigued".</p>
]]></description><pubDate>Mon, 29 Jul 2024 22:42:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=41104445</link><dc:creator>catalypso</dc:creator><comments>https://news.ycombinator.com/item?id=41104445</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41104445</guid></item><item><title><![CDATA[New comment by catalypso in "Anyone can access deleted and private repository data on GitHub"]]></title><description><![CDATA[
<p>> I'll be calling "private" repos "unlisted"<p>That might be a bit too strict. I'd still expect my private repos (no forks involved) to be private, unless we discover another footnote in GH's docs in a few years ¯\_(ツ)_/¯<p>But I'll forget about using forks except for publicly contributing to public repos.<p>> Users should never be expected to know these gotchas for a feature called "private".<p>Yes, the principle of least astonishment[0] should apply to security as well.<p>[0] <a href="https://en.wikipedia.org/wiki/Principle_of_least_astonishment" rel="nofollow">https://en.wikipedia.org/wiki/Principle_of_least_astonishmen...</a></p>
]]></description><pubDate>Wed, 24 Jul 2024 23:31:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=41063323</link><dc:creator>catalypso</dc:creator><comments>https://news.ycombinator.com/item?id=41063323</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41063323</guid></item><item><title><![CDATA[New comment by catalypso in "What You Get After Running an SSH Honeypot for 30 Days"]]></title><description><![CDATA[
<p>> People don't believe it's possible for software to be secure<p>Rightfully so. You'd statistically be almost always right considering a software unsecure given enough time (for the vulnerabilities to be introduced then found).<p>> need a secondary defense to "protect them"<p>Nothing wrong with that. It's called Defense in Depth and is rather advised. Once you understand that security measures are not bulletproof, stacking them proves to be an easy way to increase protection.<p>The case of fail2ban is not trivial: reducing log noise is a great perk, and can indirectly help with monitoring (you'd more easily notice suspicious behaviour if it's the only thing on your logs), but it comes at the small cost of setting it up, and accepting the risk of having a shared IP unwillingly blocked.</p>
]]></description><pubDate>Sun, 16 Jun 2024 19:45:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=40699548</link><dc:creator>catalypso</dc:creator><comments>https://news.ycombinator.com/item?id=40699548</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40699548</guid></item><item><title><![CDATA[New comment by catalypso in "Ask HN: Best UI design courses for hackers?"]]></title><description><![CDATA[
<p>Adding two resources to the mix:<p>1. <a href="https://growth.design" rel="nofollow noreferrer">https://growth.design</a>: case studies + cognitive biases & principles that affect your UX<p>2. <a href="https://lawsofux.com/" rel="nofollow noreferrer">https://lawsofux.com/</a>: a collection of best practices that designers can consider when building user interfaces.</p>
]]></description><pubDate>Sat, 16 Dec 2023 13:05:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=38663902</link><dc:creator>catalypso</dc:creator><comments>https://news.ycombinator.com/item?id=38663902</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38663902</guid></item><item><title><![CDATA[New comment by catalypso in "Squeeze the hell out of the system you have"]]></title><description><![CDATA[
<p>Thanks for the effort.<p>Probably nitpicking but these types of measures are usually tricky to interpret because there is a high chance your indexes (maybe even rows) are still on PostgreSQL shared buffers and OS cache and might not reflect real usage performance.<p>To get a more "worst-case" measure, after your inserts and indexes creation, you can restart your database server  + flush OS pages cache (e.g. drop_caches for Linux), then do the measure.<p>Sometimes the difference is huge, although I don't suspect it will be in this case.</p>
]]></description><pubDate>Sat, 12 Aug 2023 13:43:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=37100082</link><dc:creator>catalypso</dc:creator><comments>https://news.ycombinator.com/item?id=37100082</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37100082</guid></item><item><title><![CDATA[New comment by catalypso in "Detecting the use of “curl | bash” server side (2016)"]]></title><description><![CDATA[
<p>That would indeed be more precise, but it would be harder to obfuscate.<p>If I simply curl the script (without piping to bash), I'd be less suspicious if I saw a sleep than I would be if I saw a callback to a server.</p>
]]></description><pubDate>Tue, 27 Dec 2022 15:27:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=34149445</link><dc:creator>catalypso</dc:creator><comments>https://news.ycombinator.com/item?id=34149445</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34149445</guid></item><item><title><![CDATA[New comment by catalypso in "I worked at LastPass as an engineer"]]></title><description><![CDATA[
<p>It seems that it was a social engineering attack. From their notice: <a href="https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/" rel="nofollow">https://blog.lastpass.com/2022/12/notice-of-recent-security-...</a><p>> some source code and technical information were stolen from our development environment and used to target another employee</p>
]]></description><pubDate>Sun, 25 Dec 2022 22:57:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=34132393</link><dc:creator>catalypso</dc:creator><comments>https://news.ycombinator.com/item?id=34132393</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34132393</guid></item><item><title><![CDATA[New comment by catalypso in "Ask HN: Can I see your scripts?"]]></title><description><![CDATA[
<p>I've never thought about this problem until now. Now that I see it, it makes total sense one would want to monitor those packages for changes.<p>What surprises me is that there seems to be no other way than hacking (cutting, grepping, etc.) each package separately. I wonder how this is handled in machines that use a lot of MISC packages (other than pulling+building every time to automatically have the latest version)?<p>Also, kudos on the acronym :)</p>
]]></description><pubDate>Mon, 15 Aug 2022 23:22:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=32476883</link><dc:creator>catalypso</dc:creator><comments>https://news.ycombinator.com/item?id=32476883</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32476883</guid></item><item><title><![CDATA[New comment by catalypso in "Launch HN: Meticulous (YC S21) – Catch JavaScript errors before they hit prod"]]></title><description><![CDATA[
<p>Congrats on the launch and good luck!<p>Reading through thus just reminded me of Datadog browser tests. It's not exactly the same, but it might be interesting to check them out.</p>
]]></description><pubDate>Mon, 02 May 2022 18:59:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=31239330</link><dc:creator>catalypso</dc:creator><comments>https://news.ycombinator.com/item?id=31239330</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31239330</guid></item></channel></rss>