<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: dicethrowaway1</title><link>https://news.ycombinator.com/user?id=dicethrowaway1</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 24 Apr 2026 19:52:36 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=dicethrowaway1" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by dicethrowaway1 in "An update on recent Claude Code quality reports"]]></title><description><![CDATA[
<p>jetbalsa said that the cache is on Anthropic's server, so the encryption and decryption would be server-side. You'd never see the encryption key, Anthropic would just give you an encrypted dump of the cache that would otherwise live on its server, and then decrypt with their own key when you replay the copy.</p>
]]></description><pubDate>Thu, 23 Apr 2026 22:36:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47883105</link><dc:creator>dicethrowaway1</dc:creator><comments>https://news.ycombinator.com/item?id=47883105</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47883105</guid></item><item><title><![CDATA[New comment by dicethrowaway1 in "An update on recent Claude Code quality reports"]]></title><description><![CDATA[
<p>Maybe they could let users store an encrypted copy of the cache? Since the users wouldn't have Anthropic's keys, it wouldn't leak any information about the model (beyond perhaps its number of parameters judging by the size).</p>
]]></description><pubDate>Thu, 23 Apr 2026 20:04:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47881029</link><dc:creator>dicethrowaway1</dc:creator><comments>https://news.ycombinator.com/item?id=47881029</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47881029</guid></item><item><title><![CDATA[New comment by dicethrowaway1 in "The fuck off contact page"]]></title><description><![CDATA[
<p>For email, I've had some luck just modifying the page with JS that's either indirect or obfuscated enough that the address can't be pulled directly from it - e.g. "var email" is the address encrypted with a fixed key, the JS decrypts it and then alters the HTML.<p>It can obviously be bypassed by using a JS runner, but it seems to be enough of a hurdle that few spammers bother. "You don't have to outrun the bear", as it were.</p>
]]></description><pubDate>Mon, 08 Dec 2025 13:23:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=46191927</link><dc:creator>dicethrowaway1</dc:creator><comments>https://news.ycombinator.com/item?id=46191927</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46191927</guid></item><item><title><![CDATA[New comment by dicethrowaway1 in "I used o3 to profile myself from my saved Pocket links"]]></title><description><![CDATA[
<p>FWIW, o3 seems to get to the point more quickly than most of the other LLMs. So much so that, if you're asking about a broad topic, it may abbreviate a lot and make it difficult to parse just what it's saying.</p>
]]></description><pubDate>Tue, 08 Jul 2025 11:42:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=44499091</link><dc:creator>dicethrowaway1</dc:creator><comments>https://news.ycombinator.com/item?id=44499091</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44499091</guid></item><item><title><![CDATA[New comment by dicethrowaway1 in "Google Co-Scientist AI fed previous paper with the answer in it"]]></title><description><![CDATA[
<p>This is a deepity.<p>The trivial interpretation is: every word written can be constructed by optimizing a prediction based on current state, what has been written so far, and a sufficiently complex model. This is true of anything computable: just make the method implicitly contain the program by assigning a high probability to any token that is consistent with running the computation one more step. It's also true of anything expressible: just brute force a solution that can be expressed in n words, then assign a high probability to the first word of these n words.<p>The profound but wrong interpretation is that intelligence is just statistical prediction according to some general-purpose algorithm, and that this algorithm is tractable. Consider something like solving a SAT problem. You're going to have a hard time using any tractable general-purpose algorithm to predict whether x_2 is true for the satisfying solution based on some long CNF statement plus "x_1 is false".<p>Now, what you _can_ do is augment your model so that if the previous tokens constitute a CNF-SAT instance plus a partial answer, then you cart these off to a SAT solver and output its next token. But the more you do this, the less force the "mere statistical prediction" part holds. The "next-token predictor" is just an interface to an assembly of different approaches; and often, these approaches (like the SAT solver) will output the whole solution all at once for free.</p>
]]></description><pubDate>Tue, 25 Feb 2025 12:53:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=43171242</link><dc:creator>dicethrowaway1</dc:creator><comments>https://news.ycombinator.com/item?id=43171242</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43171242</guid></item><item><title><![CDATA[New comment by dicethrowaway1 in "Why are online recipes so long-winded?"]]></title><description><![CDATA[
<p>That's awfully specific, I'm guessing it was preprompted.</p>
]]></description><pubDate>Wed, 01 Feb 2023 16:41:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=34613124</link><dc:creator>dicethrowaway1</dc:creator><comments>https://news.ycombinator.com/item?id=34613124</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34613124</guid></item><item><title><![CDATA[New comment by dicethrowaway1 in "The Right to Be Lazy (1883)"]]></title><description><![CDATA[
<p>A good elaboration of this point is Greg Dow's "Governing the Firm" and "The Labor-Managed Firm".<p>In short, worker-owned businesses are rare because individual workers are poor (relative to the capital that's needed) and they can't get external funding because the investors want control in return, which labor management can't provide.<p>That's why most large-scale worker-owned businesses are part of a federation supported by a bank - e.g. Mondragon's Caja Laboral. Institutional design indeed does matter.</p>
]]></description><pubDate>Sat, 10 Dec 2022 15:59:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=33933672</link><dc:creator>dicethrowaway1</dc:creator><comments>https://news.ycombinator.com/item?id=33933672</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33933672</guid></item><item><title><![CDATA[New comment by dicethrowaway1 in "UA Gotta Be Kidding"]]></title><description><![CDATA[
<p>Since the generic fingerprint is associated with Tor, you get a lot more captchas. And JS that shows event times based on your clock (say a schedule) will think your time zone is UTC.</p>
]]></description><pubDate>Tue, 03 May 2022 13:35:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=31248111</link><dc:creator>dicethrowaway1</dc:creator><comments>https://news.ycombinator.com/item?id=31248111</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31248111</guid></item><item><title><![CDATA[New comment by dicethrowaway1 in "Tox: Decentralized and Encrypted Instant Messaging"]]></title><description><![CDATA[
<p>See also <a href="https://en.wikipedia.org/wiki/Real_freedom" rel="nofollow">https://en.wikipedia.org/wiki/Real_freedom</a>.</p>
]]></description><pubDate>Tue, 05 Oct 2021 18:44:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=28763770</link><dc:creator>dicethrowaway1</dc:creator><comments>https://news.ycombinator.com/item?id=28763770</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28763770</guid></item><item><title><![CDATA[New comment by dicethrowaway1 in "Web3 – A Vision for a Decentralized Web"]]></title><description><![CDATA[
<p>>The problem with bittorrent is that no one has come up with a good way to monetize it.<p>That decentralized software aligns much easier with commons than with markets is something that I would consider a feature, not a bug.</p>
]]></description><pubDate>Fri, 01 Oct 2021 16:05:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=28720204</link><dc:creator>dicethrowaway1</dc:creator><comments>https://news.ycombinator.com/item?id=28720204</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28720204</guid></item></channel></rss>