<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: ceteia</title><link>https://news.ycombinator.com/user?id=ceteia</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 16 Apr 2026 19:34:42 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=ceteia" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by ceteia in "US plans online portal to bypass content bans in Europe and elsewhere"]]></title><description><![CDATA[
<p>But can't you then set up a system such that if a person only picks one source or a few sources, and that turns out to be bad, that it primarily impacts negatively only themselves? Letting it be their own responsibility?</p>
]]></description><pubDate>Fri, 20 Feb 2026 06:36:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47084516</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47084516</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47084516</guid></item><item><title><![CDATA[New comment by ceteia in "Show HN: A small, simple music theory library in C99"]]></title><description><![CDATA[
<p>Nitpicking:<p><a href="https://github.com/thelowsunoverthemoon/mahler.c/blob/4ebfe8b5704eb1b546a6e8e3dd1748d7e279a880/src/note/note.h#L31" rel="nofollow">https://github.com/thelowsunoverthemoon/mahler.c/blob/4ebfe8...</a><p>Should that type have been mah_acci instead of int? mah_acci doesn't seem to be used anywhere.<p>Also, have you considered using (edit) designated initializer syntax for some of the function calls that take in structs as arguments?<p><a href="https://cppreference.com/w/c/language/struct_initialization.html" rel="nofollow">https://cppreference.com/w/c/language/struct_initialization....</a><p><pre><code>    struct mah_scale scale = mah_get_scale(
        (struct mah_note) {
            .tone=MAH_C,
            .acci=MAH_NATURAL,
            .pitch=4
        },
        &MAH_BLUES_SCALE, notes,
        MAH_ASCEND,
        NULL
    );</code></pre></p>
]]></description><pubDate>Fri, 20 Feb 2026 05:19:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47084085</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47084085</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47084085</guid></item><item><title><![CDATA[New comment by ceteia in "US plans online portal to bypass content bans in Europe and elsewhere"]]></title><description><![CDATA[
<p>Would educating people instead and giving them more options for information, not be better than banning access to information?</p>
]]></description><pubDate>Fri, 20 Feb 2026 03:21:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=47083263</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47083263</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47083263</guid></item><item><title><![CDATA[New comment by ceteia in "Farewell, Rust for web"]]></title><description><![CDATA[
<p>Enum matching is one of the better aspects of Rust.</p>
]]></description><pubDate>Fri, 20 Feb 2026 00:54:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=47082214</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47082214</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47082214</guid></item><item><title><![CDATA[New comment by ceteia in "Farewell, Rust for web"]]></title><description><![CDATA[
<p>> When I update the rust compiler, I do so with very little fear. My code will still work. The rust stdlib backwards compatible story has been very solid.<p>This is not always true, as seen with rustc 1.80 and the time crate. While it only changed type inference, that still caused some projects like Nix a lot of trouble.</p>
]]></description><pubDate>Fri, 20 Feb 2026 00:38:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47082065</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47082065</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47082065</guid></item><item><title><![CDATA[New comment by ceteia in "Zero-day CSS: CVE-2026-2441 exists in the wild"]]></title><description><![CDATA[
<p>Indeed, unsafe Rust is overall more difficult than C++, like one speaker at a Rust conference claimed: <a href="https://lucumr.pocoo.org/2022/1/30/unsafe-rust/" rel="nofollow">https://lucumr.pocoo.org/2022/1/30/unsafe-rust/</a><p>And you are not being honest nor accurate here.</p>
]]></description><pubDate>Thu, 19 Feb 2026 22:01:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47080177</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47080177</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47080177</guid></item><item><title><![CDATA[New comment by ceteia in "Zero-day CSS: CVE-2026-2441 exists in the wild"]]></title><description><![CDATA[
<p>Not Firefox, but Servo has quite a lot of unsafe, even though some of the results are false positives.<p><a href="https://grep.app/search?f.repo=servo%2Fservo&f.repo.pattern=servo&q=unsafe" rel="nofollow">https://grep.app/search?f.repo=servo%2Fservo&f.repo.pattern=...</a><p>So Servo at the very least cannot be said to be 'safe'. And I believe the Rust code in Firefox is similar.</p>
]]></description><pubDate>Thu, 19 Feb 2026 15:29:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=47074850</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47074850</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47074850</guid></item><item><title><![CDATA[New comment by ceteia in "Zero-day CSS: CVE-2026-2441 exists in the wild"]]></title><description><![CDATA[
<p>Wasn't the F-35 budget "explosion", or overruns, caused in general by mismanagement? But I will not argue that C++ is perfect. Instead, the ttps://en.wikipedia.org/wiki/Ariane_flight_V88 , where US$370 million was lost, with code written in Ada, is an example where Ada was presented as a safer language and even mandated in the military industry, but where it turned out less well in practice. Even proclaimed "safer" languages can have catastrophic failures, and one can suspect that they might even be less safe in practice, especially if they need mandates to be picked. Instead of Ada companies or other organizations lobbying to force industry to use their language, maybe it is better if there is free competition, and then the onus is on the software development companies to deliver high quality. Ada has improved since the 1990s, perhaps because it has been forced to compete fairly with C, C++ and other languages. Following that thinking, increased, not decreased, competition should be encouraged.<p>Your lucky soul analogy argument doesn't make any sense.</p>
]]></description><pubDate>Thu, 19 Feb 2026 11:47:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=47072809</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47072809</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47072809</guid></item><item><title><![CDATA[New comment by ceteia in "Zero-day CSS: CVE-2026-2441 exists in the wild"]]></title><description><![CDATA[
<p>People made similar arguments regarding C++ versus Ada. The US military and defense industry even got something like a mandate in the 1990s to only write in Ada.<p>And then there was <a href="https://en.wikipedia.org/wiki/Ariane_flight_V88" rel="nofollow">https://en.wikipedia.org/wiki/Ariane_flight_V88</a> , where US$370 million was lost. The code was written in Ada.<p>And using seat belts and wearing helmets do not help in those cases where 'unsafe' is used to take the seat belts and helmets off. And that is needed in Rust in a number of types of cases, such as some types of performance-sensitive code.</p>
]]></description><pubDate>Thu, 19 Feb 2026 09:27:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47071795</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47071795</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47071795</guid></item><item><title><![CDATA[New comment by ceteia in "Zero-day CSS: CVE-2026-2441 exists in the wild"]]></title><description><![CDATA[
<p>How can you be sure? When I looked at for instance sudo-rs, it proclaimed loudly that it is memory safe, but its code has lots of unsafe.<p><a href="https://github.com/trifectatechfoundation/sudo-rs" rel="nofollow">https://github.com/trifectatechfoundation/sudo-rs</a><p><a href="https://grep.app/search?f.repo=trifectatechfoundation%2Fsudo-rs&f.repo.pattern=sudo&q=unsafe" rel="nofollow">https://grep.app/search?f.repo=trifectatechfoundation%2Fsudo...</a><p>And Miri is very popular in Rust. Even if a Rust project doesn't have unsafe, sometimes people still run Miri with it, since dependencies might have messed up their unsafe usage.</p>
]]></description><pubDate>Thu, 19 Feb 2026 07:19:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47070889</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47070889</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47070889</guid></item><item><title><![CDATA[New comment by ceteia in "Zero-day CSS: CVE-2026-2441 exists in the wild"]]></title><description><![CDATA[
<p>> No, we don't. All of the ones we have are heavily leveraged in Chromium or were outright developed at Google for similar projects. 10s of billions are spent to try to get Chromium to not have these vulnerabilities, using those tools. And here we are.<p>Chromium is filled with sloppy and old code. Some of the source code (at least if dependencies are included) is more than 20 years old, and a lot of focus has been on performance, not security.<p>Using Rust does not necessarily solve this. First, performance-sensitive code can require 'unsafe', and unsafe allows for memory unsafety, thus going back to square one, or further back. And second, memory safety isn't the only source of vulnerabilities. Rust's tagged unions and pattern matching help a lot with general program correctness, however, and C++ is lagging behind there.</p>
]]></description><pubDate>Thu, 19 Feb 2026 07:06:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47070815</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47070815</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47070815</guid></item><item><title><![CDATA[New comment by ceteia in "Zero-day CSS: CVE-2026-2441 exists in the wild"]]></title><description><![CDATA[
<p><a href="https://materialize.com/blog/rust-concurrency-bug-unbounded-channels/" rel="nofollow">https://materialize.com/blog/rust-concurrency-bug-unbounded-...</a><p>Edit: Replying to ghusbands:<p>'unsafe' is a core part of Rust itself, not a separate language. And it occurs often in some types of Rust projects or their dependencies. For instance, to avoid bounds checking and not rely on compiler optimizations, some Rust projects use vec::get_unchecked, which is unsafe. One occurrence in code is here:<p><a href="https://grep.app/pola-rs/polars/main/crates/polars-io/src/csv/read/parser.rs?q=.get_unchecked#L278" rel="nofollow">https://grep.app/pola-rs/polars/main/crates/polars-io/src/cs...</a><p>And there are other reasons than performance to use unsafe, like FFI.<p>Edit2: ghusbands had a different reply when I wrote the above reply, but edited it since.<p>Edit3: Ycombinator prevents posting relatively many new comments in a short time span. And ghusbands is also wrong about his answer not being edited without him making that clear.</p>
]]></description><pubDate>Thu, 19 Feb 2026 06:54:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47070746</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47070746</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47070746</guid></item><item><title><![CDATA[New comment by ceteia in "Zero-day CSS: CVE-2026-2441 exists in the wild"]]></title><description><![CDATA[
<p>People also write Rust code that is not memory-safe.<p><a href="https://materialize.com/blog/rust-concurrency-bug-unbounded-channels/" rel="nofollow">https://materialize.com/blog/rust-concurrency-bug-unbounded-...</a></p>
]]></description><pubDate>Thu, 19 Feb 2026 06:23:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47070527</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47070527</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47070527</guid></item><item><title><![CDATA[New comment by ceteia in "Zero-day CSS: CVE-2026-2441 exists in the wild"]]></title><description><![CDATA[
<p>Does the Rust implementation not use any unsafe and does not use libraries using unsafe?</p>
]]></description><pubDate>Thu, 19 Feb 2026 05:58:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47070391</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47070391</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47070391</guid></item><item><title><![CDATA[New comment by ceteia in "Zig – io_uring and Grand Central Dispatch std.Io implementations landed"]]></title><description><![CDATA[
<p>Are you really OK with runtime "expression patterns"?<p><pre><code>    match (0, 1, 2) {
      case (F(), 0, G()) => ...
    }
</code></pre>
> Here (F(), 0, G()) is not an expression, but three separate expressions in a tuple pattern. As a result, this code will call F() but not G(), because the mismatch between the middle tuple elements will cause pattern matching to fail before reaching G(). Other than this short-circuiting behavior, a tuple pattern of expression patterns behaves the same as if it were a single expression pattern.<p>How would that work with exhaustiveness checking? As far as I can tell, they themselves believe that Carbon's exhaustiveness checking will be very poor.<p>And OK with implicit conversions? Especially when combined with their way of handling templates for pattern matching?</p>
]]></description><pubDate>Sat, 14 Feb 2026 20:04:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47017846</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47017846</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47017846</guid></item><item><title><![CDATA[New comment by ceteia in "Zig – io_uring and Grand Central Dispatch std.Io implementations landed"]]></title><description><![CDATA[
<p>Do you know of a good way to measure market share? I know of GitHub's and StackOverflow's surveys, but I'm not sure how well they reflect reality. There is also Redmonk.<p>GitHub's survey did not say much about Rust I think, despite Rust projects often having lots of starring. Rust projects might have a greater ratio of stars-to-popularity than projects in other languages, though.<p>StackOverflow's survey was much more optimistic or indicated popularity for Rust.<p>Redmonk places Rust at place 19th.</p>
]]></description><pubDate>Sat, 14 Feb 2026 19:12:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=47017349</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47017349</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47017349</guid></item><item><title><![CDATA[New comment by ceteia in "Zig – io_uring and Grand Central Dispatch std.Io implementations landed"]]></title><description><![CDATA[
<p>What concerns me is that the design of Carbon in aspects seem to have serious issues already now.<p>In case that you are well familiar with for instance pattern matching, might you have any opinions on the pattern matching that is currently proposed for Carbon?<p><a href="https://docs.carbon-lang.dev/docs/design/pattern_matching.html" rel="nofollow">https://docs.carbon-lang.dev/docs/design/pattern_matching.ht...</a></p>
]]></description><pubDate>Sat, 14 Feb 2026 19:01:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47017256</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47017256</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47017256</guid></item><item><title><![CDATA[New comment by ceteia in "Zig – io_uring and Grand Central Dispatch std.Io implementations landed"]]></title><description><![CDATA[
<p>Rust projects generally use licenses like MIT instead of GPL, and thus some major corporations support Rust a lot, and thus Rust will continue getting popular.</p>
]]></description><pubDate>Sat, 14 Feb 2026 17:49:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47016578</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47016578</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47016578</guid></item><item><title><![CDATA[New comment by ceteia in "Zig – io_uring and Grand Central Dispatch std.Io implementations landed"]]></title><description><![CDATA[
<p>The GitHub project has some activity at least, and they might be coming with some announcement later this year.<p><a href="https://github.com/carbon-language/carbon-lang/" rel="nofollow">https://github.com/carbon-language/carbon-lang/</a></p>
]]></description><pubDate>Sat, 14 Feb 2026 16:05:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=47015554</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47015554</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47015554</guid></item><item><title><![CDATA[New comment by ceteia in "Zig – io_uring and Grand Central Dispatch std.Io implementations landed"]]></title><description><![CDATA[
<p>I am not sure how Carbon will go. The Carbon compiler is not ready to be used yet by the public as I understand it, and the roadmap has not been updated for some time now, it seems.<p><a href="https://docs.carbon-lang.dev/docs/project/roadmap.html" rel="nofollow">https://docs.carbon-lang.dev/docs/project/roadmap.html</a></p>
]]></description><pubDate>Sat, 14 Feb 2026 16:03:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47015536</link><dc:creator>ceteia</dc:creator><comments>https://news.ycombinator.com/item?id=47015536</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47015536</guid></item></channel></rss>