<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: csense</title><link>https://news.ycombinator.com/user?id=csense</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 08 Apr 2026 23:50:35 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=csense" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by csense in "Antimatter has been transported for the first time"]]></title><description><![CDATA[
<p>From a layman's point of view antimatter seems like an ideal spacecraft fuel.  It's as energy dense as E = mc^2 allows, and if you have infrastructure to make it, the only input you need to produce it is electricity.<p>Being able to transport it seems like an important piece of that puzzle.<p>Production and storage would need to be scaled by many orders of magnitude, but that's merely an engineering problem...right?</p>
]]></description><pubDate>Wed, 25 Mar 2026 16:31:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47519618</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47519618</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47519618</guid></item><item><title><![CDATA[New comment by csense in "Jury finds Meta liable in case over child sexual exploitation on its platforms"]]></title><description><![CDATA[
<p>We used to believe in freedom of speech and freedom of association.<p>Since the dawn of the Internet era, we've had a legal principle that platforms are relatively shielded from liability for what their users do.<p>It's the Internet.  There's sexual content and sketchy characters on it.  Occasionally people will encounter them -- even if they're under 18.<p>Anyone who grew up in the mid-1990s or later, think back to your own Internet usage when you were under 18.  You probably found something NSFW or NSFL, dealt with it, and came out basically OK after applying your common sense.  Maybe it was shocking and mildly traumatizing -- <i>but having negative experience is how we grow</i>.  Part of growing up is honing one's sense of "that link is staying blue" or "I'm not comfortable with this, it's time to GTFO".  And it seems a lot safer if you encounter the sketchy side of humanity from the other side of a screen.  Think about how a young person's exposure to the underbelly of humanity might have gone in pre-Internet times:  Get invited to a party, find out it's in the bad part of town and there are a bunch of sketchy people there -- well, you're exposed to all kinds of physical risks.  You can't leave the party as easily as you can put your phone down.<p>I stopped logging onto Facebook regularly around 2009; I only log in a couple times a year.  I hate what Facebook has become in the past decade and a half.<p>But giving a site with millions of users a multi-hundred-million-dollar fine because some of those users behave badly seems...asinine.<p>If your kid is old enough and responsible enough to be given unsupervised Internet access, you'd better teach them how to deal with the skeevy stuff they might encounter.</p>
]]></description><pubDate>Wed, 25 Mar 2026 13:49:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47517333</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47517333</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47517333</guid></item><item><title><![CDATA[New comment by csense in "Generating All 32-Bit Primes (Part I)"]]></title><description><![CDATA[
<p>I'm pretty sure you can get rid of the 0xFFFFFFFF / p and get some more speedup by manually implementing the bitarray ops.  You can get another boost by using BSF instruction [1] to quickly scan for the next set bit.  And you really only need to store odd numbers; storing the even numbers is just wasteful.<p>You can get even more speedup by taking into account cache effects.  When you cross out all the multiples of 3 you use 512MB of bandwidth.  Then when you cross out all multiples of 5 you use 512MB more.  Then 512MB again when you cross out all multiples of 7.  The fundamental problem is that you have many partially generated cache-sized chunks and you cycle through them in order with each prime.  I'm pretty sure it's faster if you instead fully generate each chunk and then never access it again.  So e.g. if your cache is 128k you create a 128k chunk and cross out multiples of 3, 5, 7, etc. <i>for that 128k chunk</i>.  Then you do the next 128k chunk again crossing out multiples of 3, 5, 7, etc.  That way you only use ~512MB of memory bandwidth <i>in total</i> instead of 512MB <i>per prime number</i>.  (Actually it's only really that high for small primes, it starts becoming less once your primes get bigger than the number of bits in a cache line.)<p>[1] <a href="https://en.wikipedia.org/wiki/Find_first_set" rel="nofollow">https://en.wikipedia.org/wiki/Find_first_set</a></p>
]]></description><pubDate>Sun, 15 Mar 2026 20:12:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47391363</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47391363</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47391363</guid></item><item><title><![CDATA[New comment by csense in "California's Digital Age Assurance Act, and FOSS"]]></title><description><![CDATA[
<p>Just in case your answers to the parent post's three questions were "Yes, yes and yes" here are some additional questions:<p>- Have you ever uploaded a container to Dockerhub or Quay.io?<p>- Does that container have an OS inside it that has user accounts?<p>- Before you answered parent post's questions, did it occur to you that you might have to update your Docker images to comply?<p>- Did you remember on your own that you also have to delete or update older Docker images to comply, or did you not think of that until you read this question?<p>After you've answered these questions, please re-answer the parent post's questions.</p>
]]></description><pubDate>Wed, 04 Mar 2026 08:36:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47244719</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47244719</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47244719</guid></item><item><title><![CDATA[New comment by csense in "California's Digital Age Assurance Act, and FOSS"]]></title><description><![CDATA[
<p>A lot of people people contributing to FOSS are volunteers.  The calculus of working on stuff for free involves an assumption that your worst-case outcome is you make $0.  This act's punitive fines change the worst-case outcome to somewhere around -$9999999 or more.<p>If you work on any programming project at all in any capacity:<p>- Are you confident your work doesn't fall afoul of this?<p>- Are you confident they won't decide to come after you anyway for insane political, bureaucratic or "seeing-like-a-state" dysfunctions?<p>- Are you willing to bet millions of dollars in potential fines that your answers to the previous two questions are correct?</p>
]]></description><pubDate>Wed, 04 Mar 2026 08:32:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47244695</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47244695</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47244695</guid></item><item><title><![CDATA[New comment by csense in "Ubuntu Planning Mandatory Age Verification"]]></title><description><![CDATA[
<p>Here's my suggestion for an implementation strategy:<p>- Keep the "Next" button greyed out until you add three forms of identification.<p>- Ask the user to take photos of their 3 forms of ID with a webcam.  Ask the user to hold them in increasingly bizarre poses -- left hand, right hand, woven between your fingers, behind your ear, between your toes.<p>- Add an "accessibility" button.  This button pops up a text box that advises you if you can't comply because you don't have hands, ears, feet or whatever (hey, some people don't and that's perfectly fine!) you can just use a picture of somebody else's body parts, and helpfully provides a menu of AI-generated pictures of human ears, hands, etc. for you to copy-paste.<p>- To preserve privacy, send the actual photos to /dev/null.<p>- The "verify the photo of my ID" button should check whether random.random() > 0.8.  On average the user will require 5 tries per photo, or 15 tries total.<p>- Add a checkbox that says "I am not in the state of California".  Upon clicking this checkbox the "Next" button becomes not grayed out and you can proceed without completing the identity checking process.<p>- If the user does not seem to have a webcam installed, all UI elements are grayed out except the "I am not in the state of California" checkbox.<p>- If the user is installing via command line, say "Are you in the state of California [y/n]?"  If the answer does not start with 'N' or 'n', it will simply repeat the question.<p>- The list of acceptable identification shall be:  Driver's license, learner's permit, Social Security card, library card, school identification, Boy / Girl Scout membership card, school yearbook photo, Burger King Kid's Club membership card, utility bill, ISP bill, Burger King receipt, Mahalo Rewards card, any receipt paid via credit card, birthday card, a photo of a printout of any email from OnlyFans, a photo of a DNS TXT record containing the string "CALIFORNIA", a photo of your X account with a blue check mark.</p>
]]></description><pubDate>Wed, 04 Mar 2026 00:03:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=47241024</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47241024</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47241024</guid></item><item><title><![CDATA[New comment by csense in "When AI writes the software, who verifies it?"]]></title><description><![CDATA[
<p>It seems like sound testing methodology to identify important theorems related to the code, prove them, and then verify the proof.<p>Verification gets sold as "bulletproof" but I'm skeptical for a couple reasons:<p>- How do you establish the relationship between the code and the theorem?  Lean theorem can be applied to zlib implemented in Lean, what if you want to check zlib implemented in a normal programming language like C, JS, Zig, or whatever?<p>- How do you know the key properties mean what you think they mean?  E.g. the theorem says "ZlibDecode.decompressSingle (ZlibEncode.compress data level) = .ok data" but it feels like it would be very easy to accidentally prove ∃ x s.t. decompress(compress(x)) == x while thinking you proved ∀ x, decompress(compress(x)) == x.<p>I've tried Lean and Coq and...I don't really like them.  The proofs use specialized programming languages.  And they seem deliberately designed to require you to use a context explorer to have any hope of understanding the proof at all.  OTOH a normal unit test is written in a general purpose programming language (usually the same one as the program being tested), I'm much more comfortable checking that a Claude-written unit test does what I think it's doing than a Claude-written Lean proof of correctness.</p>
]]></description><pubDate>Tue, 03 Mar 2026 23:51:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=47240909</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47240909</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47240909</guid></item><item><title><![CDATA[New comment by csense in "The Currency War: Why Washington's Policies Look Chaotic (But Aren't) [video]"]]></title><description><![CDATA[
<p>This video has an interesting visualization of macroeconomic factors affecting US trade and foreign policy.</p>
]]></description><pubDate>Mon, 02 Mar 2026 20:16:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47223477</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47223477</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47223477</guid></item><item><title><![CDATA[The Currency War: Why Washington's Policies Look Chaotic (But Aren't) [video]]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.youtube.com/watch?v=TfYB3LZf0mQ">https://www.youtube.com/watch?v=TfYB3LZf0mQ</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47223476">https://news.ycombinator.com/item?id=47223476</a></p>
<p>Points: 3</p>
<p># Comments: 1</p>
]]></description><pubDate>Mon, 02 Mar 2026 20:16:12 +0000</pubDate><link>https://www.youtube.com/watch?v=TfYB3LZf0mQ</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47223476</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47223476</guid></item><item><title><![CDATA[New comment by csense in "Show HN: I'm 15. I mass published 134K lines to hold AI agents accountable"]]></title><description><![CDATA[
<p>An AI agent is doing some actions.  Those actions must comply with "controls" like 'ALLOW transfer ON treasury WHERE amount <= 10000 AND currency = "USDC"' and provide public, auditable proof that actions complied with the spec.  The action log seems to be verifiable via ZK proofs.<p>What's the application here?  If you want to enforce that an agent's blockchain transactions follow some deterministic conditions, why not just give it access to a command-line tool (MCP / skill / whatever) that enforces your conditions?<p>If you want auditing of the agent's blockchain actions to be public, why not just make all your agent's actions go through an ordinary smart contract?<p>I don't mean to kill your enthusiasm for programming or AI.  But this project...I'm sorry, but this project just isn't good.  It's an over-engineered, vibe-coded "solution" in search of a problem.<p>This project is about a month old.  I highly doubt one person produced 134 kloc in that time.  I'm pretty sure a lot of it is vendorized dependencies and AI-generated code that's had minimal human review.  Much of the documentation appears to be AI-generated as well.</p>
]]></description><pubDate>Sun, 01 Mar 2026 23:13:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47211811</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47211811</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47211811</guid></item><item><title><![CDATA[New comment by csense in "'Can't sell house' searches are higher now than during the 2008 housing crisis"]]></title><description><![CDATA[
<p>I don't understand how house prices are set.  When I see a house that's $X I often think "$X seems reasonable" immediately followed by "$X/2 seems reasonable" and "$2X seems reasonable".<p>How does anyone ever set prices for real estate?  Why do sellers have such a hard time cutting price 10% or 30% when the whole concept of "value of real estate" seems very nebulous and made-up, and each property is a completely unique combination of age, footage, state of repairs, location etc.?</p>
]]></description><pubDate>Sun, 01 Mar 2026 19:54:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47210055</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47210055</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47210055</guid></item><item><title><![CDATA[New comment by csense in "A new Polymarket account made over $500k betting on the U.S. strike against Iran"]]></title><description><![CDATA[
<p>> prediction markets should not exist<p>If you don't like prediction markets, you don't have to use them.<p>Why do you think other people shouldn't be allowed to use prediction markets if they want to?</p>
]]></description><pubDate>Sun, 01 Mar 2026 19:45:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47209978</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47209978</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47209978</guid></item><item><title><![CDATA[New comment by csense in "The United States and Israel have launched a major attack on Iran"]]></title><description><![CDATA[
<p>Israel and the US told Iran "Don't try to develop nukes or else."  Iran tried to develop nukes and got bombed.  Then Iran tried to develop nukes again.<p>PotUS told Iran "Don't shoot the protestors or else."  Iran shot the protestors.<p>Iran chose to FAFO; "Or else" has now arrived.<p>I don't like Trump and based on past bad experiences I'm not sure it's wise for the US to start a war in the Middle East.<p>I feel sorry for the civilians caught in the middle, e.g. the ~50 Iranian schoolkids that ate a wayward bomb.  People can legitimately criticize the US and Israel for that mistake, but if they do they need to also criticize Iran ~200 times harder for killing tens of thousands of protestors on purpose.<p>I don't agree with people who think this war is illegitimate or Iran isn't the bad guy here.</p>
]]></description><pubDate>Sat, 28 Feb 2026 22:58:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47201327</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47201327</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47201327</guid></item><item><title><![CDATA[New comment by csense in "A Chinese official’s use of ChatGPT revealed an intimidation operation"]]></title><description><![CDATA[
<p>> intimidating Chinese dissidents abroad, including by impersonating US immigration officials<p>I hope those victims of immigration impersonation don't have family within China's borders.  AI-enabled impersonation and intimidation are far from the worst of China's crimes [1] against its overseas critics.<p>China likes to make you an offer you can't refuse [2] [3]:  You're saying stuff the Chinese government doesn't like, but you live outside its borders and the secret police can't get at you?  You need to come to China and be jailed (or worse).  If you don't, your family will be the ones who are jailed (or worse).  Or you can unalive yourself, and save the glorious Chinese Communist Party the expense of a bullet.<p>[1] China would say "the government punishes a criminal's family" is not a crime, it's a perfectly legal implementation of government policy under Chinese law.  I respond that the death camps were perfectly legal implementation of government policy under Nazi law, but were still crimes against humanity -- China's actions fall in this category of crimes.<p>As I understand it:  Western societies have a very individualistic view of responsibility.  If you didn't commit a crime, you're innocent.  Punishing the innocent family members of a criminal is morally abominable.<p>In the Chinese Communist Party's view, criminal responsibility is collectivist.  By their definition, the family members of a criminal share responsibility for the crime regardless of their participation in the criminal acts.  "Innocent family members of a criminal" is a logically inconsistent concept in their world view.  The family of a criminal is guilty by definition -- <i>being related to a criminal is itself a crime</i>.<p>This is sickening to me.<p>[2] <a href="https://en.wikipedia.org/wiki/Operation_Fox_Hunt" rel="nofollow">https://en.wikipedia.org/wiki/Operation_Fox_Hunt</a><p>[3] <a href="https://www.abc.net.au/news/2020-07-08/fbi-chief-says-china-uses-threats-to-coerce-overseas-critics/12433208" rel="nofollow">https://www.abc.net.au/news/2020-07-08/fbi-chief-says-china-...</a></p>
]]></description><pubDate>Sat, 28 Feb 2026 07:42:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=47191813</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47191813</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47191813</guid></item><item><title><![CDATA[New comment by csense in "A new California law says all operating systems need to have age verification"]]></title><description><![CDATA[
<p>I've taken trips to California in the past for both personal and professional reasons.  I'm seriously reconsidering whether I'll do that again in the future.<p>What happens if I bring a laptop with an "illegal" OS without this unwanted "feature" into the state?  Will I be denied access to public wifi in hotels and restaurants?  Or will it grant me access, but snitch on me -- make a call to the state police to come deal with someone with an illegal laptop?  Will I be forced to install a different OS while a police officer watches?  Will my laptop be confiscated and destroyed as contraband?  Will I be thrown in a California prison?<p>I don't want to take a risk and find out.</p>
]]></description><pubDate>Sat, 28 Feb 2026 06:52:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47191379</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47191379</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47191379</guid></item><item><title><![CDATA[New comment by csense in "Tell HN: YC companies scrape GitHub activity, send spam emails to users"]]></title><description><![CDATA[
<p>I find it interesting that a substantial number of people seem to think it's wrong or unethical to cold-email someone about a potential recruitment or business opportunity if they post their email in a public place, such as commits in a public Github repo.<p>I feel like if you don't want companies to cold-email you, you shouldn't make your email public.  Github provides noreply email addresses for this purpose.</p>
]]></description><pubDate>Thu, 26 Feb 2026 21:19:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47172133</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47172133</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47172133</guid></item><item><title><![CDATA[New comment by csense in "Confusables.txt and NFKC disagree on 31 characters"]]></title><description><![CDATA[
<p>My theory:  The "long S" in "Congreſs" is an f.  They used f instead of s because without modern dental care, a lot of people in the 1600's and 1700's were miffing teeth and fpoke with a lifp.</p>
]]></description><pubDate>Wed, 25 Feb 2026 15:30:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47152868</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47152868</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47152868</guid></item><item><title><![CDATA[New comment by csense in "Trump's global tariffs struck down by US Supreme Court"]]></title><description><![CDATA[
<p>I don't think tariffs should be imposed capriciously at the President's whim.<p>But I do think tariffs are an appropriate policy tool that should be used to protect US companies against overseas competitors that get government subsidies or other unfair advantages:  Low wages, safety regulations, worker protection, environmental rules, etc.</p>
]]></description><pubDate>Fri, 20 Feb 2026 16:11:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=47089875</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47089875</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47089875</guid></item><item><title><![CDATA[New comment by csense in "Trump's global tariffs struck down by US Supreme Court"]]></title><description><![CDATA[
<p>Trump said "Don't shoot the protestors or else."  Iran shot the protestors.  US military assets were out of position dealing with Venezuela.  Now the assets are in position, the administration now feels obligated to impose "or else."<p>I doubt Trump's seriously seeking a nuclear deal as he (in)famously withdrew from the deal established by the Obama administration [1].<p>[1] <a href="https://en.wikipedia.org/wiki/United_States_withdrawal_from_the_Joint_Comprehensive_Plan_of_Action" rel="nofollow">https://en.wikipedia.org/wiki/United_States_withdrawal_from_...</a></p>
]]></description><pubDate>Fri, 20 Feb 2026 15:54:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47089622</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47089622</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47089622</guid></item><item><title><![CDATA[New comment by csense in "DNS-Persist-01: A New Model for DNS-Based Challenge Validation"]]></title><description><![CDATA[
<p>To get a Let's Encrypt wildcard cert, I ended up running my own DNS server with dnsmasq and delegating the _acme-challenge subdomain to it.<p>Pasting a challenge string once and letting its continued presence prove continued ownership of a domain is a great step forward.  But I agree with others that there is <i>absolutely no reason</i> to expose account numbers; it should be a random ID associated with the account in Let's Encrypt's database.<p>As a workaround, you should probably make a new account for each domain.</p>
]]></description><pubDate>Wed, 18 Feb 2026 20:18:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47065810</link><dc:creator>csense</dc:creator><comments>https://news.ycombinator.com/item?id=47065810</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47065810</guid></item></channel></rss>