<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: devttyeu</title><link>https://news.ycombinator.com/user?id=devttyeu</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 13 May 2026 17:14:09 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=devttyeu" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by devttyeu in "Postmortem: TanStack npm supply-chain compromise"]]></title><description><![CDATA[
<p>For the stuff in more sensitive deployments it's really quite simple, just setup CORS etc properly and don't do anything overly fancy on the frontend. Worst case the user may force some internal function to eval some JS by pasting scripts into the browsers debug console.<p>Critical severity vulnerabilities are only critical when they are reachable, but are completely meaningless if your application doesn't touch that code at all. It's objectively more risky to "patch" those by updating dependencies than just let them be there.</p>
]]></description><pubDate>Tue, 12 May 2026 01:30:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=48103102</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=48103102</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48103102</guid></item><item><title><![CDATA[New comment by devttyeu in "TanStack NPM Packages Compromised"]]></title><description><![CDATA[
<p>If it runs in a harness that will alert me when something dodgy is detected I'm fine to stay at that level.<p>I don't read it in detail because reading in detail is precisely what I delegate to the harness. The alternative is that I delegate all this trust to package managers and the maintainers which quite clearly is a bad idea.<p>Whether the $$ pricetag is worth it is.. relative. Also in Go you don't update all that often, really when something either breaks or there is a legitimate security reason to do so, which in deep systems software is quite infrequent.<p>Funnily enough for frontend NPM code our policy was to never ever upgrade and run with locked dependencies, running few years old JS deps. For internal dashboards it was perfectly fine, never missed a feature and never had a supply chain close call.</p>
]]></description><pubDate>Mon, 11 May 2026 22:35:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=48101634</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=48101634</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48101634</guid></item><item><title><![CDATA[New comment by devttyeu in "Postmortem: TanStack npm supply-chain compromise"]]></title><description><![CDATA[
<p>Cargo is spiritually based on NPM so it's not much better.<p>Go Get is closer to always locking dependencies unless you explicitly upgrade them with a go get, so it's much much better in my view.<p>Yes, you can lock deps in NPM/Cargo/etc. but that's not the default. It is the default in Go.<p>In Go projects my policy for upgrading dependencies includes running full AI audit of all code changed across all dependencies, comes out to ~$200 in tokens every time but it gives those warm 'not likely to get pwned' vibes. And it comes with a nice report of likely breaking changes etc.</p>
]]></description><pubDate>Mon, 11 May 2026 22:03:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=48101259</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=48101259</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48101259</guid></item><item><title><![CDATA[New comment by devttyeu in "245TB Micron 6600 ION Data Center SSD Now Shipping"]]></title><description><![CDATA[
<p>Enterprise NVMe on the high end is now starting to ship batches at $1000/TB with existing stock around $500/TB. No consumer is going to pay that.<p>But if you're buying a $500k GPU server putting 100TB of nvme in there for $50-100k is justifiable.</p>
]]></description><pubDate>Wed, 06 May 2026 10:49:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=48034730</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=48034730</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48034730</guid></item><item><title><![CDATA[New comment by devttyeu in "$1,605: average annual ad value of a U.S. Google user"]]></title><description><![CDATA[
<p>403 B is the revenues - <a href="https://www.sec.gov/Archives/edgar/data/1652044/000165204426000012/googexhibit991q42025.htm" rel="nofollow">https://www.sec.gov/Archives/edgar/data/1652044/000165204426...</a></p>
]]></description><pubDate>Tue, 28 Apr 2026 10:18:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47932502</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=47932502</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47932502</guid></item><item><title><![CDATA[New comment by devttyeu in "Tell HN: Claude Is Down"]]></title><description><![CDATA[
<p>Also not able to access Gemini API.<p>At least our local GPU server still serves Kimi K2.5 to my team just fine.</p>
]]></description><pubDate>Mon, 02 Mar 2026 12:43:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=47217303</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=47217303</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47217303</guid></item><item><title><![CDATA[New comment by devttyeu in "Qwen3-TTS family is now open sourced: Voice design, clone, and generation"]]></title><description><![CDATA[
<p>Also like some popular youtubers and popular speakers.</p>
]]></description><pubDate>Thu, 22 Jan 2026 15:47:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=46720826</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=46720826</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46720826</guid></item><item><title><![CDATA[Show HN: A task-based workflow manager for bspwm – tasks as desktops]]></title><description><![CDATA[
<p>My current role requires me to do insane amounts of context-switching, with many of them being fairly long-running or requiring quite a bit of back-and-forth. This is a quick vibe-coded project which adds a new mode for managing "tasks" (as-in todo-list tasks) as dedicated desktops - the idea is that in times of less focus (e.g. boring meetings) I can do discovery/setup phase of a bunch of things, then later can, much more efficiently execute things which need slightly more focus (think like pulling input docs / conversations first to then write an email; Finding relevant dashboards and user reports to later debug some complex issue).<p>In principle this model should also work much better with desktop AI agents, but that is not a problem I need to solve now.</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46571726">https://news.ycombinator.com/item?id=46571726</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Sun, 11 Jan 2026 01:07:09 +0000</pubDate><link>https://github.com/magik6k/taskwm</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=46571726</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46571726</guid></item><item><title><![CDATA[New comment by devttyeu in "Get an AI code review in 10 seconds"]]></title><description><![CDATA[
<p>Funny you mention that, I have very recently just came back from a one-shot prompt which fixed a rather complex template instantiation issue in a relatively big very convoluted low-level codebase (lots of asm, SPDK / userspace nvme, unholy shuffling of data between numa domains into shared l3/l2 caches). That codebase maybe isn't in millions of lines of code but definitely is complex enough to need a month of onboarding time. Or you know, just give Claude Opus 4.5 a lldb backtrace with 70% symbols missing due to unholy linker gymnastics and get a working fix in 10 mins.<p>And those are the worst models we will have used from now on.</p>
]]></description><pubDate>Sun, 21 Dec 2025 21:36:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=46348760</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=46348760</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46348760</guid></item><item><title><![CDATA[New comment by devttyeu in "Gemini 3 Pro: the frontier of vision AI"]]></title><description><![CDATA[
<p>Visual puzzle solving is a pretty easily trainable problem due to it being simple to verify, so that skill getting really good is just a matter of time</p>
]]></description><pubDate>Sat, 06 Dec 2025 11:26:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=46172482</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=46172482</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46172482</guid></item><item><title><![CDATA[New comment by devttyeu in "Shai-Hulud Returns: Over 300 NPM Packages Infected"]]></title><description><![CDATA[
<p>In Go you know exactly what code you’re building thanks to gosum, and it’s much easier to audit changed code after upgrading - just create vendor dirs before and after updating packages and diff them; send to AI for basic screening if the diff is >100k loc and/or review manually. My projects are massive codebases with 1000s of deps and >200MB stripped binaries of literally just code, and this is perfectly feasible. (And yes I do catch stuff occasionally, tho nothing actively adversarial so far)<p>I don’t believe I can do the same with Rust.</p>
]]></description><pubDate>Mon, 24 Nov 2025 13:06:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=46033689</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=46033689</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46033689</guid></item><item><title><![CDATA[New comment by devttyeu in "A cryptography research body held an election and they can't decrypt the results"]]></title><description><![CDATA[
<p>Cryptography is the science of turning any problem into a key management problem</p>
]]></description><pubDate>Sun, 23 Nov 2025 12:47:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=46023153</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=46023153</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46023153</guid></item><item><title><![CDATA[New comment by devttyeu in "Ask HN: How to get funding for your product?"]]></title><description><![CDATA[
<p>If you have Pro users why not leverage with debt without giving up equity for no good reason?<p>Maybe the value prop is not clear, the website talks a bunch about AI agent integrations, that sounds like a completely different product to a parser library, which however advanced it may be, investors will likely see as tangential bit of IP that a senior engineer can build for $10-20k in a few days.</p>
]]></description><pubDate>Thu, 20 Nov 2025 11:57:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=45991724</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=45991724</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45991724</guid></item><item><title><![CDATA[New comment by devttyeu in "IKEA launches new smart home range with 21 Matter-compatible products"]]></title><description><![CDATA[
<p>It does address quite a few reliability issues - you can have multiple gateways into the thread network so it is actually highly available.<p>It’s definitely complicated, but it’s a kind of usb-c of smart home - you only worry about the complex part when building a product. Just wish there was a better device reset/portability story.</p>
]]></description><pubDate>Thu, 06 Nov 2025 15:21:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=45836231</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=45836231</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45836231</guid></item><item><title><![CDATA[New comment by devttyeu in "IKEA launches new smart home range with 21 Matter-compatible products"]]></title><description><![CDATA[
<p>Both use 802.15.4 but iiuc zigbee does that with some incompatibilities.</p>
]]></description><pubDate>Thu, 06 Nov 2025 15:15:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=45836166</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=45836166</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45836166</guid></item><item><title><![CDATA[New comment by devttyeu in "A P2P Vision for QUIC (2024)"]]></title><description><![CDATA[
<p>It is halfway there arguably, and libp2p does make use of it - <a href="https://docs.libp2p.io/concepts/transports/webtransport/" rel="nofollow">https://docs.libp2p.io/concepts/transports/webtransport/</a><p>Unlike websockets you can supply "cert hash" which makes it possible for the browser to establish a TLS connection with a client that doesn't have a certificate signed by a traditional PKI provider or even have a domain name. This property is immensely useful because it makes it possible for browsers to establish connections to any known non-browser node on the internet, including from secure contexts (i.e. from an https page where e.g. you can't establish a ws:// connection, only wss:// is allowed but you need a 'real' tls cert for that)</p>
]]></description><pubDate>Wed, 05 Nov 2025 19:20:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=45826735</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=45826735</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45826735</guid></item><item><title><![CDATA[New comment by devttyeu in "WebDAV isn't dead yet"]]></title><description><![CDATA[
<p>NFS is much slower, maybe unless you deploy it which RDMA. I believe even 4.2 doesn’t really support asynchronous calls or has some significant limitations around them - I’ve commonly seen a single large write of a few gigs starve all other operations including lstat for minutes.<p>Also it’s borderline impossible to tune nfs to go above 30gbps or so consistently, with WebDAV it’s a matter of adding a bunch more streams and you’re past 200gbps pretty easily.</p>
]]></description><pubDate>Sun, 26 Oct 2025 07:20:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=45709760</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=45709760</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45709760</guid></item><item><title><![CDATA[New comment by devttyeu in "AWS multiple services outage in us-east-1"]]></title><description><![CDATA[
<p>Can't update my selfhosted HomeAssistant because HAOS depends on dockerhub which seems to be still down.</p>
]]></description><pubDate>Mon, 20 Oct 2025 09:09:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=45641648</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=45641648</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45641648</guid></item><item><title><![CDATA[New comment by devttyeu in "Modern iOS Security Features – A Deep Dive into SPTM, TXM, and Exclaves"]]></title><description><![CDATA[
<p>And after all that hardcore engineering work is done, iMessage still has code paths leading to dubious code running in the kernel, enabling 0-click exploits to still be a thing.</p>
]]></description><pubDate>Tue, 14 Oct 2025 09:23:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=45577921</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=45577921</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45577921</guid></item><item><title><![CDATA[New comment by devttyeu in "High-power microwave defeats drone swarm"]]></title><description><![CDATA[
<p>Put sensitive electronics in a metal box, comms over a fiber (already common), and you’re good to go.<p>Only tricky thing is if currents induced in motors are too hard to reject in driver circuitry, tho even at the extreme this should be possible to insulate with capacitors (or worse/heavier with transformers)</p>
]]></description><pubDate>Sun, 28 Sep 2025 07:35:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=45402457</link><dc:creator>devttyeu</dc:creator><comments>https://news.ycombinator.com/item?id=45402457</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45402457</guid></item></channel></rss>