<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: dragochat</title><link>https://news.ycombinator.com/user?id=dragochat</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 27 Apr 2026 18:43:33 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=dragochat" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by dragochat in "AI should elevate your thinking, not replace it"]]></title><description><![CDATA[
<p>bc software engineering learning is 99% BOTTOM-UP...<p>and that's bc SE education FAILED BADLY... almost nothing of what's useful is thought in schools and nothing of what's thought is useful<p>instead of FIXING education and theory, software engineering marched on forcefully without it<p>now we need to go back and properly fix education, because an intern should absolutely be required to have the "advanced" skills that we imagine in our deluded minds that only "10+ ys of industry experience" should confer, and that are absolutely required to be even a junior AI-augmented SE<p>SE/CS education should be rethought from scratch to distill, purify, and teach in 3ys max the concepts that used to be acquired through 10-30ys of experience - it 100% CAN be done, and we should wake tf up and DO IT instead of complaining about it - "advanced enterprise systems" architecture require nothing more than mid-highschool math and can be thought on symulated systems in sem 1 of year 1, it's just some of the "teachers" would have to actually put in the 80hrs-weeks of work to do it in due time</p>
]]></description><pubDate>Mon, 27 Apr 2026 13:38:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47921416</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=47921416</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47921416</guid></item><item><title><![CDATA[New comment by dragochat in "How to be anti-social – a guide to incoherent and isolating social experiences"]]></title><description><![CDATA[
<p>> going into every interaction thinking about which parts of oneself to dial down<p>what if (a) I hate leading questions, (b) by default only smile when bad/tragic things happen (eg "train crash leaves 100 dead and maimed"), (c) I'm quite bad at listening bc if you don't say interesting things often/densely enough my mind adhd-s away, and (d) interrupting is second-nature to me?<p>...advice may be good, but for some of us it's like 99% of ourselves that we need to dial down in order to carry on a successful interaction - it works, but takes a hell lot of energy</p>
]]></description><pubDate>Fri, 24 Apr 2026 14:00:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47890448</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=47890448</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47890448</guid></item><item><title><![CDATA[New comment by dragochat in "How to be anti-social – a guide to incoherent and isolating social experiences"]]></title><description><![CDATA[
<p>one interaction? some of us spent half our lives having 99% of interactions be like that - we've grown out it one way or another, but for many ppl "doing people" is HAAAAAARD ...just as for some differential equations are. we're just build veeeery differently. for many "the social world" is a hostile jungle, and we ca face it all right, but with a strong suit of mechanized armour and fully loaded weapons strapped to it.</p>
]]></description><pubDate>Fri, 24 Apr 2026 13:57:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=47890386</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=47890386</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47890386</guid></item><item><title><![CDATA[New comment by dragochat in "How to be anti-social – a guide to incoherent and isolating social experiences"]]></title><description><![CDATA[
<p>some of these _are_ true _good_ advice for most ppl, beginner level as they may be, as by default they have been trained to be waaaaay too agreeable</p>
]]></description><pubDate>Fri, 24 Apr 2026 13:52:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47890336</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=47890336</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47890336</guid></item><item><title><![CDATA[New comment by dragochat in "When moving fast, talking is the first thing to break"]]></title><description><![CDATA[
<p>ffs sake, u get the point... "under threat models x, z & q that are considered for scenarios ..."<p>anything deployed is hackable ofc, question is just the profit/risk ratio a business tolerates/prefers, and what backup plans exist to "reboot" after fatal incidents<p>nothing's perfect in the real world but most things are survivable<p>reducing all risk is the same as reducing all opportunity for profit - and in a much truer sense than it seems ...as you also reduce adversary's risk to profit form you, so essentially pursuing too low risk you head towards negative sum (as security has costs) games that on average we all loose from playing</p>
]]></description><pubDate>Fri, 24 Apr 2026 13:48:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=47890268</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=47890268</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47890268</guid></item><item><title><![CDATA[New comment by dragochat in "When moving fast, talking is the first thing to break"]]></title><description><![CDATA[
<p>you got everything I said wrong: I'm familiar with security and infrastructure best practice and I'm confident I/we can securely deploy almost any vibe-coded crap someone can throw at us - we understand security, we understand defense-in-depth, we understand the subtle trade offs of why security by obscurity is usually a bad idea (and when it does help) etc.<p>sure, if the vibe-coded sloptopus does bank transfers and stuff, properly carving out these pieces out of it might require actual engineering work before containerizing it - but someone is willing to pay for it it can be done<p>some "toy" example: take a crappy app that stores llm keys in config files that the llm agents themselves can edit - after isolating it up, but an llm proxy in front of it and have those keys be short lived proxy-keys with aggressive rate limits and monitoring etc etc<p>isolation, injecting proper monitoring into code of apps, putting proxies between app and apis, and layers between app and infra it runs on or touches etc<p>and these things now can be mostly cookbook-ified / automated 90% of the way too<p>as long as you can shop things into little ppl and ensure short-lived and granular access to valuable data you can 100% run totally unsecure and buggy code reliably and get value from it<p>it's engineering and understanding security from first principles [and a culture arund it - that _is_ the HARD af bit though...] instead of just believing in "secure app best practices" from the "holy scriptures" - secure apps are hackable, and unsecure apps can be unhackable, heck even mil systems run on unpatched old software everywhere, they're just properly insulated, the components are insecure but the system as a whole can be perfectly secure</p>
]]></description><pubDate>Tue, 21 Apr 2026 06:24:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=47845265</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=47845265</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47845265</guid></item><item><title><![CDATA[New comment by dragochat in "When moving fast, talking is the first thing to break"]]></title><description><![CDATA[
<p>100%. I'm willing to prioritize what matters at the right time. if "inner-system security" is not the right priority, and security can be attained at the "outer-system level" better, we should have the balz to say it. fuckitol</p>
]]></description><pubDate>Mon, 20 Apr 2026 07:23:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47831293</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=47831293</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47831293</guid></item><item><title><![CDATA[New comment by dragochat in "When moving fast, talking is the first thing to break"]]></title><description><![CDATA[
<p>we love to say things like these, but... most security issues are in fact BYPASSABLE - virtualization, firewalls, autorollbacks, ro-filesystems and so on are many of the tools we have on our belsts<p>decades of WordPress have taught us that insecure apps can 100% be securely deployed<p>it's a bit of an art, most recently edicated devops/sre ppl suck at it, but it's doable<p>...aeons a go in a former life we ran production apps that got hacked weekly, and nobody batted an eye at it, backups servers recreated from secure ro-images were span up with last-clean-app version, occassionally we had fun disassembling whatever reverse shells and other mallware that got beached on our systems (but couldn't "swim" bc everything we ran was "too exotic" for them to figure out the next steps of a proper attack), development and business continued as usual with zero interruptions etc</p>
]]></description><pubDate>Sun, 19 Apr 2026 20:29:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47827407</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=47827407</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47827407</guid></item><item><title><![CDATA[New comment by dragochat in "When moving fast, talking is the first thing to break"]]></title><description><![CDATA[
<p>by this pov, we're clearly... not moving fast enough</p>
]]></description><pubDate>Sun, 19 Apr 2026 20:23:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47827361</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=47827361</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47827361</guid></item><item><title><![CDATA[New comment by dragochat in "The local LLM ecosystem doesn’t need Ollama"]]></title><description><![CDATA[
<p>how about the others:<p>- vLLM <a href="https://vllm.ai/" rel="nofollow">https://vllm.ai/</a> ?<p>- oMLX <a href="https://github.com/jundot/omlx" rel="nofollow">https://github.com/jundot/omlx</a> ?</p>
]]></description><pubDate>Thu, 16 Apr 2026 08:15:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=47790153</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=47790153</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47790153</guid></item><item><title><![CDATA[New comment by dragochat in "Migrating to the EU"]]></title><description><![CDATA[
<p>...would those "overreach instinct" expand to "handing over access an overreaching and likely corrupt EU or US prosecutor"? (I don't care about 5eyes etc, spyies will spy me, I just don't want stuff to be easily and unexpectedly draggable in a court case, or am email used as bolt-key to access other things to get blocked by a prosecutor's regulation...)</p>
]]></description><pubDate>Mon, 23 Mar 2026 11:59:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47488254</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=47488254</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47488254</guid></item><item><title><![CDATA[New comment by dragochat in "Migrating to the EU"]]></title><description><![CDATA[
<p>...also migrating AWAY from Fastmail (Australian) and TO an European provider sounds like a very bad idea - I'd kind of want <i>both</i> the US and the EU legally away from my coms at all costs (!)</p>
]]></description><pubDate>Mon, 23 Mar 2026 11:55:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47488214</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=47488214</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47488214</guid></item><item><title><![CDATA[New comment by dragochat in "Migrating to the EU"]]></title><description><![CDATA[
<p>how about the OPPOSITE problem: _anyone knows of any non-EU AND non-US email providers_? with email accounts as the roots of trust for many things, i'd really wanna know how can I get a trustworthy one not-attached to eithern an unstable system (US), or a very overregulating one like the EU juristictions...<p>and ofc, non-CN too</p>
]]></description><pubDate>Mon, 23 Mar 2026 11:52:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47488190</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=47488190</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47488190</guid></item><item><title><![CDATA[New comment by dragochat in "Mistral AI Releases Forge"]]></title><description><![CDATA[
<p>where sample notebook/script? where github? where signup?<p>...learn a thing or two from NVIDIA or gtfo</p>
]]></description><pubDate>Wed, 18 Mar 2026 11:55:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47424552</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=47424552</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47424552</guid></item><item><title><![CDATA[New comment by dragochat in "Gemini 3.1 Pro"]]></title><description><![CDATA[
<p>...you sound like a typical opus-person :P Just use anthropic's flagships if you want good instruction following, focus in long convos, and proper understanding of guidance-when-wrong.</p>
]]></description><pubDate>Fri, 20 Feb 2026 10:36:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47086211</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=47086211</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47086211</guid></item><item><title><![CDATA[New comment by dragochat in "Gemini 3.1 Pro"]]></title><description><![CDATA[
<p>> feel more work to get actionable insight<p>WHAT?! I find that exactly the nice sharp formatting are what makes it EASIER to get actionable insight from it...<p>(Plus the weird-but-cute unrequested analogies are nice to occassionally elicit a smile and keep you motivated :P)</p>
]]></description><pubDate>Fri, 20 Feb 2026 10:34:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47086195</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=47086195</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47086195</guid></item><item><title><![CDATA[New comment by dragochat in "Introduction to Software Development Tooling (2024)"]]></title><description><![CDATA[
<p>obligatory link to the famous very similar resource - MIT's The Missing Semester <a href="https://missing.csail.mit.edu/" rel="nofollow">https://missing.csail.mit.edu/</a><p>...I'd be curious if anyone has went through _both_, unlikely as that may be, and could give some comparison :P</p>
]]></description><pubDate>Wed, 17 Dec 2025 07:55:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=46299337</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=46299337</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46299337</guid></item><item><title><![CDATA[New comment by dragochat in "Show HN: AlgoDrill – Interactive drills to stop forgetting LeetCode patterns"]]></title><description><![CDATA[
<p>...the f?! why are we interviewing ppl for things like this?!<p>you either:<p>(a) want DEEP understanding of math and proofs behind algorithms etc.<p>(b) can get away with very high level understanding, and refer to documentation and/or use LLMs for implementation details help<p>there is <i>no real world use case for a middle-ground (c) where you want someone with algo implementation details rote-memorized in their brain and without the very deep understanding that would make the rote-memorization unnecessary!</i></p>
]]></description><pubDate>Tue, 09 Dec 2025 12:08:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46204035</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=46204035</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46204035</guid></item><item><title><![CDATA[New comment by dragochat in "Supercookie: Browser Fingerprinting via Favicon (2021)"]]></title><description><![CDATA[
<p>Well, we'd probably agree on most things... and re the photography example, afaik model release forms work similarly in the EU and US, right?<p>Now website code does typically run on your device, but I'd say that once you're a paid logged in user you clearly accepted to run it, under the conditions of it staying in its browser sandbox so... if you think it's "malware" then just stop being a customer. Otherwise software has a right to monitor its own operation.<p>...but yeah, maybe I missed the context a bit, a tracking pixel style tool will likely be used to track not customers but leads, so I do get your point, it gets trickier there and maybe privacy laws have a point there (as long as they <i>stop there</i>... hint: they usually <i>don't!</i>)</p>
]]></description><pubDate>Mon, 17 Nov 2025 15:00:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=45954179</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=45954179</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45954179</guid></item><item><title><![CDATA[New comment by dragochat in "Supercookie: Browser Fingerprinting via Favicon (2021)"]]></title><description><![CDATA[
<p>+ as a bonus we'd also incentivize businesses to <i>internalize</i> their marketing and related tech operations (since sharing data with 3rd parties would not be allowed), same for AI-customizations etc., forcing them to tech-ify and become more tech-savy businesses instead of externalizing all such things to evil big tech (eg. a clothing store chain could compete not only by producing better clothes, but also by developing better monitoring and generative AI for human-in-the-loop hyperpersonalization, spreading tech out... instead of outsourcing these to tech or big-consulting companies as they do now when the too-little-data they so collect anyhow is otherwise easily share-able to third parties)</p>
]]></description><pubDate>Mon, 17 Nov 2025 09:29:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=45952097</link><dc:creator>dragochat</dc:creator><comments>https://news.ycombinator.com/item?id=45952097</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45952097</guid></item></channel></rss>