<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: cbarrick</title><link>https://news.ycombinator.com/user?id=cbarrick</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 09 Apr 2026 14:13:12 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=cbarrick" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by cbarrick in "Delve removed from Y Combinator"]]></title><description><![CDATA[
<p>Yeah, it's a pretty versatile phrase that's hard to explain. But it does often have a connotation of childishness or naivety, even when used sincerely.<p>It is often used an expression of thanks or appreciation, but I associate that more with an elder speaking to someone younger.<p>Most of the time, it is an genuine expression of true empathy, but it's not uncommon to be used as a passive aggressive expression of false empathy. It's that childish connotation that give it the extra bite when used passive aggressively.<p>And that plausible deniability, where the phrase is used in a genuine context often enough that sometimes you can't tell that someone is throwing shade, is very much a reflection of southern culture.<p>Source: Grew up in Georgia and North Carolina, with some family in Alabama.</p>
]]></description><pubDate>Sat, 04 Apr 2026 20:46:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47643184</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=47643184</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47643184</guid></item><item><title><![CDATA[New comment by cbarrick in "Big-Endian Testing with QEMU"]]></title><description><![CDATA[
<p>Defining BE integer data types seems like a bad approach.<p>I wouldn't want to maintain those types. The maintainer would either have to implement all of the arithmetic operations or assume that your users would try to hack their way to arithmetic. But really, you shouldn't ever do arithmetic with non-native endianness anyway.<p>Instead, define all your interfaces to work with native endianness integers and just do byte swapping at the serialization boundaries.</p>
]]></description><pubDate>Sat, 04 Apr 2026 15:47:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47640061</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=47640061</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47640061</guid></item><item><title><![CDATA[New comment by cbarrick in "[dead]"]]></title><description><![CDATA[
<p>Zombo.com is under new management.</p>
]]></description><pubDate>Fri, 03 Apr 2026 20:49:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47632071</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=47632071</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47632071</guid></item><item><title><![CDATA[New comment by cbarrick in "Ball Pit"]]></title><description><![CDATA[
<p>Doesn't appear to put much strain on my Pixel 10!<p>Graphics and physics performance in 2026 across all kinds of hardware is wildly impressive.</p>
]]></description><pubDate>Thu, 26 Mar 2026 00:22:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=47525206</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=47525206</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47525206</guid></item><item><title><![CDATA[New comment by cbarrick in "Meta’s renewed commitment to jemalloc"]]></title><description><![CDATA[
<p>Exactly. No need to engineer an allocator. You only live once!<p><pre><code>    void* malloc(size_t size) {
        void *ptr = mmap(NULL, size, PROT_READ | PROT_WRITE, MAP_ANON, -1, 0);
        return (ptr == MAP_FAILED) ? NULL : ptr;
    }

    void free(void *ptr) { /* YOLO */ }
</code></pre>
/s</p>
]]></description><pubDate>Mon, 16 Mar 2026 21:43:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47405343</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=47405343</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47405343</guid></item><item><title><![CDATA[New comment by cbarrick in "Show HN: fftool – A Terminal UI for FFmpeg – Shows Command Before It Runs"]]></title><description><![CDATA[
<p>Fair enough. Hope you understand my suspicion.</p>
]]></description><pubDate>Fri, 13 Mar 2026 16:19:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47366427</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=47366427</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47366427</guid></item><item><title><![CDATA[New comment by cbarrick in "Show HN: fftool – A Terminal UI for FFmpeg – Shows Command Before It Runs"]]></title><description><![CDATA[
<p>There are definitely some warning signs that OP could be a bot:<p>- They "no longer use Github" but their Github account was only created on March 1st.<p>- Their blog domain was registered on March 1st according to whois.<p>- They have sixteen (!!) blog posts dated March 10th.<p>- This is the kind of project you could vibe code: "read the ffmpeg manual and convert all of its flags into a TUI." No shade on the value of the project, just that it's a good one for LLMs.</p>
]]></description><pubDate>Fri, 13 Mar 2026 15:31:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47365818</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=47365818</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47365818</guid></item><item><title><![CDATA[New comment by cbarrick in "Sneak Peek at the Redesigned Stack Overflow"]]></title><description><![CDATA[
<p>Looks like Reddit. Ruins the clear separation between answers and comments. Terrible information density. This sucks.</p>
]]></description><pubDate>Fri, 27 Feb 2026 19:16:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47184374</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=47184374</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47184374</guid></item><item><title><![CDATA[New comment by cbarrick in "Gentoo on Codeberg"]]></title><description><![CDATA[
<p>I was familiar with the Gerrit workflow, but not the AGit workflow.<p>The original AGit blog post is no longer available, but it is archived: <a href="https://web.archive.org/web/20260114065059/https://git-repo.info/en/2020/03/agit-flow-and-git-repo/" rel="nofollow">https://web.archive.org/web/20260114065059/https://git-repo....</a><p>From there, I found a dedicated Git subcommand for this workflow: <a href="https://github.com/alibaba/git-repo-go" rel="nofollow">https://github.com/alibaba/git-repo-go</a><p>I really like what I've read about AGit as a slightly improved version of the Gerrit workflow. In particular, I like that you can just use a self-defined session ID rather than relying on a commit hook to generate a Gerrit ChangeId. I would love to see Gerrit support this session token in place of ChangeIds.</p>
]]></description><pubDate>Tue, 17 Feb 2026 19:31:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47051951</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=47051951</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47051951</guid></item><item><title><![CDATA[New comment by cbarrick in "Modern CSS Code Snippets: Stop writing CSS like it's 2015"]]></title><description><![CDATA[
<p>- M for Model: your data model.
- V for View: views of your data.
- C for Controller: does stuff with your data.</p>
]]></description><pubDate>Sun, 15 Feb 2026 21:53:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47028004</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=47028004</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47028004</guid></item><item><title><![CDATA[New comment by cbarrick in "Instagram's URL Blackhole"]]></title><description><![CDATA[
<p>Quite an unhinged take.<p>The claim that malware "makes a ton of money" for Apple definitely needs a citation. I certainly don't believe it.<p>Obviously, Apple understands that the reputational damage from malware is more costly than any cut they might get from the miniscule sales of it. Apple might be evil (for some definition of "evil"), but they're not dumb.<p>Occam's Razor and Halon's Razor are aligned here. Apple would prefer this app not exist, but somehow it slipped through the review.</p>
]]></description><pubDate>Sun, 15 Feb 2026 19:18:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=47026534</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=47026534</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47026534</guid></item><item><title><![CDATA[New comment by cbarrick in "Reports of Telnet's death have been greatly exaggerated"]]></title><description><![CDATA[
<p>It's not though.<p>I thought it was, and posted this same comment on the other telnet article. But I was informed that it is back! And I was able to confirm it myself.<p>I don't have a telnet client on my Mac, but I was able to confirm with nc.<p><pre><code>    nc towel.blinkenlights.nl 23</code></pre></p>
]]></description><pubDate>Thu, 12 Feb 2026 12:37:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=46988060</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=46988060</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46988060</guid></item><item><title><![CDATA[New comment by cbarrick in "The Day the Telnet Died"]]></title><description><![CDATA[
<p>~~IIRC the blinkenlights telnet movies have been offline for a few years already.~~</p>
]]></description><pubDate>Wed, 11 Feb 2026 02:05:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=46969862</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=46969862</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46969862</guid></item><item><title><![CDATA[New comment by cbarrick in "Lennart Poettering, Christian Brauner founded a new company"]]></title><description><![CDATA[
<p>Do you want the control systems of the subway to get modified by a malicious actor? What about damn releases? Heat pumps in apartment buildings? Robotaxis? Payroll systems? Banks?<p>Amutability is a huge security feature, with tons of real world applications for good.<p>The fact that mega corps can abuse consumers is a separate issue. We should solve that with regulation. Don't forsake all the good that this tech can do just because Asus or Google want to infringe on your software freedoms. Frankly, these mega corps are going to infringe on your rights regardlessly, whether or not Amutable exists as a business.<p>Don't throw the baby out with the bath water.</p>
]]></description><pubDate>Thu, 29 Jan 2026 16:36:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=46812523</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=46812523</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46812523</guid></item><item><title><![CDATA[New comment by cbarrick in "Lennart Poettering, Christian Brauner founded a new company"]]></title><description><![CDATA[
<p>That's like saying we shouldn't build anything that can be used for good if it can also be used for evil.<p>By that logic, we should just turn off the internet. Too much potential for evil there.<p>More seriously, the argument being presented seems to just be "attestation tech has been used for evil in the past, therefore all attestation tech is bad," which is obviously an unsound argument. A sound argument would have to show that attestation tech is _inherently_ bad, and I've already provided examples that I think effectively counter that. I can provide more if needed.<p>I get that we want to prevent attestation tech from being used for evil, but that's a regulatory problem, not a technical one. You make this point by framing the evil parties as "corporate and government interests."<p>Don't get me wrong, I am fully against anything that limits the freedoms of the person that owns the device. I just don't see how any of this is a valid argument that Amutable's mission is bad/immoral/invalid.<p>Or maybe another argument that's perhaps more aligned with the FOSS ideology: if I want e2e attestation of the software stack on my own devices, isn't this a good thing for me?</p>
]]></description><pubDate>Wed, 28 Jan 2026 20:15:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=46800930</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=46800930</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46800930</guid></item><item><title><![CDATA[New comment by cbarrick in "Lennart Poettering, Christian Brauner founded a new company"]]></title><description><![CDATA[
<p>> [T]he war on general computing and computer ownership [...] It is exhausting to see the hatred some have for people just owning their hardware.<p>The integrity of a system being verified/verifiable doesn't imply that the owner of the system doesn't get to control it.<p>This sort of e2e attestation seems really useful for enterprise or public infrastructure. Like, it'd be great to know that the ATMs or transit systems in my city had this level of system integrity.<p>You argument correctly points out that attestation tech can be used to restrict software freedom, but it also assumes that this company is actively pursuing those use cases. I don't think that is a given.<p>At the end of the day, as long as the owner of the hardware gets to control the keys, this seems like fantastic tech.</p>
]]></description><pubDate>Wed, 28 Jan 2026 17:53:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=46798963</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=46798963</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46798963</guid></item><item><title><![CDATA[New comment by cbarrick in "Claude Cowork exfiltrates files"]]></title><description><![CDATA[
<p>I don't think it's functionally different if you write sudo on the command line or if the installer uses sudo in the script.<p>As you said, most installers need to place binaries in privileged locations anyway.</p>
]]></description><pubDate>Fri, 16 Jan 2026 17:14:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=46648888</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=46648888</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46648888</guid></item><item><title><![CDATA[New comment by cbarrick in "My Gripes with Prolog"]]></title><description><![CDATA[
<p>> Please just let me end rules with a trailing comma instead of a period, I'm begging you.<p>The reason Prolog doesn't support trailing commas is exactly the same reason JSON doesn't support trailing commas: the language is designed to be parsed by an operator precedence parser, and the comma is an infix operator.<p>The fact that Prolog is a purely operator precedence syntax, with a dynamic operator table, allows you to build DSLs embedded in Prolog. CLP(FD) uses this to create the #= operator.</p>
]]></description><pubDate>Fri, 16 Jan 2026 17:07:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=46648806</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=46648806</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46648806</guid></item><item><title><![CDATA[New comment by cbarrick in "JuiceFS is a distributed POSIX file system built on top of Redis and S3"]]></title><description><![CDATA[
<p>As I understand it, if the metadata is lost then the whole filesystem is lost.<p>I think this is a common failure mode in filesystems. For example, in ZFS, if you store your metadata on a separate device and that device is destroyed, the whole pool is useless.</p>
]]></description><pubDate>Thu, 15 Jan 2026 21:51:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=46639848</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=46639848</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46639848</guid></item><item><title><![CDATA[New comment by cbarrick in "Claude Cowork exfiltrates files"]]></title><description><![CDATA[
<p>It's not really different than downloading a .msi or .exe installer on Windows and running it. Or downloading a .pkg installer on macOS and running it (or running a program supplied in a .dmg). Or downloading a .deb or .rpm on Linux and running it.<p>It's all whether or not you trust the entity supplying the installer, be it your package manager or a third party.<p>At least with shell scripts, you have the opportunity to read it first if you want to.</p>
]]></description><pubDate>Thu, 15 Jan 2026 15:30:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=46633904</link><dc:creator>cbarrick</dc:creator><comments>https://news.ycombinator.com/item?id=46633904</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46633904</guid></item></channel></rss>