<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: danscan</title><link>https://news.ycombinator.com/user?id=danscan</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 18 May 2026 10:20:09 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=danscan" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by danscan in "Show HN: Mochi.js: bun-native high-fidelity browser automation library"]]></title><description><![CDATA[
<p>I think this is saying it's:
1) A JS chromium browser automation API targeting Bun (uses Bun.* or "bun:*" apis)
2) Engineered to interact with webpages in a way that evades bot detection</p>
]]></description><pubDate>Sat, 09 May 2026 22:04:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=48078712</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=48078712</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48078712</guid></item><item><title><![CDATA[New comment by danscan in "How David Sacks crashed and burned in the White House"]]></title><description><![CDATA[
<p>> I've never even heard of Sacks until now<p>Bless your soul</p>
]]></description><pubDate>Wed, 06 May 2026 23:58:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=48043571</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=48043571</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48043571</guid></item><item><title><![CDATA[New comment by danscan in "OpenAI's response to the Axios developer tool compromise"]]></title><description><![CDATA[
<p>Axios, like Express, is something I'm shocked to see used in any modern codebase. I loved both in the 2010s. In JS/TS-land there are much simpler and better options these days. Depending on Axios suggests the devs don't know how to use fetch. I can't think of another reason it would be a necessary dependency</p>
]]></description><pubDate>Thu, 23 Apr 2026 03:17:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47871942</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=47871942</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47871942</guid></item><item><title><![CDATA[New comment by danscan in "Physics Girl: Super-Kamiokande – Imaging the sun by detecting neutrinos [video]"]]></title><description><![CDATA[
<p>TIL nobody can spell phyzix</p>
]]></description><pubDate>Tue, 03 Mar 2026 16:57:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=47235256</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=47235256</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47235256</guid></item><item><title><![CDATA[Show HN: GithubDownfall – Track GitHub incidents and downtime]]></title><description><![CDATA[
<p>Hey HN,<p>I made a Github incident tracker in the style of Github's contribution graph.<p>We're all feeling Github's increasing issues lately, so I quickly threw this together today. It includes incidents since Jan 2025, trends, and current status.<p>Hosted on Fly, made with Astro, bun, bun:sqlite.</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46950356">https://news.ycombinator.com/item?id=46950356</a></p>
<p>Points: 4</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 09 Feb 2026 20:05:01 +0000</pubDate><link>https://githubdownfall.com</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=46950356</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46950356</guid></item><item><title><![CDATA[New comment by danscan in "Legitimizing Personal Software"]]></title><description><![CDATA[
<p>It’s not about doing discovery _from_ personal apps, but the inverse: doing discovery _of_ personal apps.<p>For example, an app that uses an AI chat API can discover and route requests to your preferred provider (ollama, etc)</p>
]]></description><pubDate>Wed, 03 Sep 2025 20:00:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=45119827</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=45119827</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45119827</guid></item><item><title><![CDATA[New comment by danscan in "Legitimizing Personal Software"]]></title><description><![CDATA[
<p>Fair that this post lacks background.<p>I’d say I have the opposite of a narrow view of software one can write, having written everything from typical web/mobile apps to DBs, network protocols and VMs :)<p>My initial explorations were focused on the web, but the network-level scheme I landed on does indeed do discovery on the backend.<p>Appreciate this feedback. I’ve been in the weeds of this stuff for some time, so it helps to see the rubber meet the road so I know what I missed.</p>
]]></description><pubDate>Wed, 03 Sep 2025 15:56:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=45117248</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=45117248</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45117248</guid></item><item><title><![CDATA[Legitimizing Personal Software]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.selfref.com/personal-software">https://www.selfref.com/personal-software</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45116171">https://news.ycombinator.com/item?id=45116171</a></p>
<p>Points: 3</p>
<p># Comments: 4</p>
]]></description><pubDate>Wed, 03 Sep 2025 14:23:34 +0000</pubDate><link>https://www.selfref.com/personal-software</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=45116171</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45116171</guid></item><item><title><![CDATA[New comment by danscan in "Self-Signed JWTs"]]></title><description><![CDATA[
<p>Ah, and just the subtle crypto API to generate keys? Or are you not generating them on the client?</p>
]]></description><pubDate>Sat, 02 Aug 2025 05:22:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=44765073</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=44765073</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44765073</guid></item><item><title><![CDATA[New comment by danscan in "Self-Signed JWTs"]]></title><description><![CDATA[
<p>Easy to imagine that haha. That’s part of the reason I’d lean on a standard like JOSE and make signing happen automatically for users who prefer to use an SDK</p>
]]></description><pubDate>Sat, 02 Aug 2025 03:49:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=44764764</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=44764764</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44764764</guid></item><item><title><![CDATA[New comment by danscan in "Self-Signed JWTs"]]></title><description><![CDATA[
<p>Fair. I assume you mean asymmetric key cryptography and not JWKs in particular? JOSE is a pretty good library if you need the latter and you’re already working in JS</p>
]]></description><pubDate>Sat, 02 Aug 2025 03:44:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=44764744</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=44764744</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44764744</guid></item><item><title><![CDATA[New comment by danscan in "Self-Signed JWTs"]]></title><description><![CDATA[
<p>IMO this is a tooling issue. You can make your SDK generate keys and even base64 encode them so they appear opaque to the uninitiated (like an API key)</p>
]]></description><pubDate>Sat, 02 Aug 2025 03:41:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=44764734</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=44764734</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44764734</guid></item><item><title><![CDATA[New comment by danscan in "Self-Signed JWTs"]]></title><description><![CDATA[
<p>Valid</p>
]]></description><pubDate>Sat, 02 Aug 2025 00:17:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=44763837</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=44763837</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44763837</guid></item><item><title><![CDATA[New comment by danscan in "Self-Signed JWTs"]]></title><description><![CDATA[
<p>Ah, yes I agree</p>
]]></description><pubDate>Fri, 01 Aug 2025 23:41:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=44763616</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=44763616</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44763616</guid></item><item><title><![CDATA[New comment by danscan in "Self-Signed JWTs"]]></title><description><![CDATA[
<p>It's interesting to imagine taking the pubkey as identity concept to its full extents in situations like this, for example if you could create a cloud account, spin up resources, and authorize payment for them all programmatically without having to enter payment details on a form (because your keypair can authorize payment with the whatever payment method you use)</p>
]]></description><pubDate>Fri, 01 Aug 2025 23:40:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=44763612</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=44763612</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44763612</guid></item><item><title><![CDATA[New comment by danscan in "Self-Signed JWTs"]]></title><description><![CDATA[
<p>Not sure which way of constraint you're referring to, but WebAuthn credentials are bound to a domain via Relying Party ID.<p>There's a proposal for cross-domain usage via Related Origins, but that scheme depends on the authority of the relying party, meaning you can't say "I'd like to be represented by the same keypair across this set of unrelated domains"</p>
]]></description><pubDate>Fri, 01 Aug 2025 23:34:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=44763573</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=44763573</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44763573</guid></item><item><title><![CDATA[New comment by danscan in "Self-Signed JWTs"]]></title><description><![CDATA[
<p>Yeah, I am sort of a fan of Passkeys in principal, but they are domain bound (you can't use them across domains).<p>I wish there were something built into browsers that offered a scheme where your pubkey = your identity, but in short there are a lot of issues with that</p>
]]></description><pubDate>Fri, 01 Aug 2025 23:16:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=44763489</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=44763489</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44763489</guid></item><item><title><![CDATA[New comment by danscan in "Self-Signed JWTs"]]></title><description><![CDATA[
<p>For sure. Would likely need to be combined with another mechanism like IP rate limits</p>
]]></description><pubDate>Fri, 01 Aug 2025 22:21:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=44763097</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=44763097</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44763097</guid></item><item><title><![CDATA[New comment by danscan in "Self-Signed JWTs"]]></title><description><![CDATA[
<p>The key distinction I am getting at is: self-signed as in “signed with a self-issued key pair”, as opposed to using an API key/credential that has been issued to you</p>
]]></description><pubDate>Fri, 01 Aug 2025 22:07:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=44762991</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=44762991</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44762991</guid></item><item><title><![CDATA[New comment by danscan in "Self-Signed JWTs"]]></title><description><![CDATA[
<p>The things that change are:<p>1. With self-signed JWTs, you could start consuming APIs with free tiers immediately, without first visiting a site and signing up. (I could see this pattern getting traction as it helps remove friction, especially if you want to be able to ask an LLM to use some API).<p>2. Compare this scheme to something like the Firebase SDK, where there's a separate server-side "admin" sdk. With self-signed JWTs, you just move privileged op invocations to claims – consuming the API is identical whether from the client or server.<p>3. The authority model is flexible. As long as the logical owner of the resource being accessed is the one signing JWTs, you're good. A database service I'm working on embeds playgrounds into the docs site that use client-generated JWKs to access client-owned DB instances.</p>
]]></description><pubDate>Fri, 01 Aug 2025 21:56:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=44762905</link><dc:creator>danscan</dc:creator><comments>https://news.ycombinator.com/item?id=44762905</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44762905</guid></item></channel></rss>