<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: emidln</title><link>https://news.ycombinator.com/user?id=emidln</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 07 Apr 2026 07:49:01 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=emidln" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by emidln in "Tell HN: Anthropic no longer allowing Claude Code subscriptions to use OpenClaw"]]></title><description><![CDATA[
<p>At least on a personal max account, I can't max every window. There is also weekly limit. If I max every window, I run out of tokens halfway through the week.</p>
]]></description><pubDate>Sat, 04 Apr 2026 12:39:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47638546</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=47638546</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47638546</guid></item><item><title><![CDATA[New comment by emidln in "Is Rust faster than C?"]]></title><description><![CDATA[
<p>I probably enjoy ELF hacking more than most, but patching an ELF binary via LD_PRELOAD, linker hacks, or even manual or assisted relinking tricks are just tools in the bag of performant C/C++ (and probably Rust too, but I don't get paid to make that fast). If you care about perf and for whatever reason are using someone else's code, you should be intimately familiar with your linker, binary format, ABI, and OS in addition to your hardware. It's all bytes in the end, and these abstractions are pliable with standard tooling.<p>I'd usually rather have a nice language-level interface for customizing implementation, but ELF and Linux scripting is typically good enough. Binary patching is in a much easier to use place these days with good free tooling and plenty of (admittedly exploit-oriented) tutorials to extrapolate from as examples.</p>
]]></description><pubDate>Wed, 14 Jan 2026 13:42:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=46615973</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=46615973</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46615973</guid></item><item><title><![CDATA[New comment by emidln in "Using Python for Scripting"]]></title><description><![CDATA[
<p>I wish env -S was more portable. It's a newer feature of the coreutils env implementation and isn't supported elsewhere afaik.</p>
]]></description><pubDate>Fri, 12 Dec 2025 18:10:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=46246836</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=46246836</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46246836</guid></item><item><title><![CDATA[New comment by emidln in "Amazon EC2 M9g Instances"]]></title><description><![CDATA[
<p>How: You've ran the test on a bunch of hosts and create a spec from ranges.<p>Why: you might be concerned with network connectivity (you don't get to choose which data center you launch in and it might not be exactly equal), noisy neighbors on shared hosts, etc. if you're measuring for networking, you probably are spinning ups separate accounts/using a bank of accounts and something in every az until you find what you're looking for.</p>
]]></description><pubDate>Thu, 11 Dec 2025 16:05:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=46233109</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=46233109</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46233109</guid></item><item><title><![CDATA[New comment by emidln in "Stop Hacklore – An Open Letter"]]></title><description><![CDATA[
<p>I'm not a CISO just a random dog on the internet, but this open letter seems to assume that privacy is not a part of your security posture and that spear phishing isn't common these days. (Is 'spear phishing' still the term for targeted electronic scams to steal credentials/access?)<p>I realize not everyone is using a physically stripped burner, a graphene os install, etc and not everyone works at a high value financial, govt, or infra target but for those of us who need to deal with opsec or are commonly targeted by spear phishing this advice seems abysmal.<p>In the current political climate of the US, if you are living or traveling here and the current party isn't cheering for you personally, you really should be considering both state-sponsored attacks and no longer have the luxury of assuming good faith by the state. Telling people to enable cheap drive by attacks that are in active use by certain government agencies is irresponsible malpractice at best and actively evil at worst.<p>Source: I've worked at analytics companies that actively deanonymized users using cookies when available. We used wifi and Bluetooth details when available. We built "multi channel marketing" which was just taking any information we could scrape from the user to fingerprint them and cross reference and deanonymize them so we could sell interactions to businesses like geofenced price discrimination, value of users, and could offer cross website information on shopping habits/financial profile. The shit I did 15 years ago didn't go away and no matter how much I wish I didn't write that, it was the tip of the iceberg and relatively benign.</p>
]]></description><pubDate>Sun, 30 Nov 2025 22:59:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=46101323</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=46101323</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46101323</guid></item><item><title><![CDATA[New comment by emidln in "Modern cars are spying on you. Here's what you can do about it"]]></title><description><![CDATA[
<p>> Forward collision warning has misfired on 2 occasions on me in the last 3 years<p>My Lexus is afraid of a bush behind my garage in the alley. It's on a neighbors property and not really overgrown, but my car refuses to get within about 5 ft of it. Makes backing out a nightmare. I haven't figured out a way to disable it, and have considered just selling this 2025 NX.</p>
]]></description><pubDate>Sun, 30 Nov 2025 22:07:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=46100914</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=46100914</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46100914</guid></item><item><title><![CDATA[New comment by emidln in "Modern cars are spying on you. Here's what you can do about it"]]></title><description><![CDATA[
<p>If you can be prosecuted for guessing urls you can be prosecuted for sending garbage data in a way you know will be uploaded to a remote system.</p>
]]></description><pubDate>Sun, 30 Nov 2025 18:45:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=46099218</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=46099218</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46099218</guid></item><item><title><![CDATA[New comment by emidln in "Modern cars are spying on you. Here's what you can do about it"]]></title><description><![CDATA[
<p>I suspect this data is made "anonymous" and sold to insurance companies and misc data brokers. If it's linked to my insurance company, I don't want to jack my rates. Further, I've thus far avoided a CFAA conviction and I'd like to keep it that way.</p>
]]></description><pubDate>Sun, 30 Nov 2025 17:14:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=46098466</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=46098466</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46098466</guid></item><item><title><![CDATA[New comment by emidln in "Modern cars are spying on you. Here's what you can do about it"]]></title><description><![CDATA[
<p>My 2025 Mazda Miata has a CAN connected Telematics Control Unit that sends a bunch of data to Mazda on ignition off. Among this data is acceleration and velocity data along with coordinates sampled for where you were. It is also used as a gateway for the Mazda app to start your car, query your vehicle's tire pressure, etc. It is claimed that you can opt out of this by calling Mazda and being persistent.<p>The CAN traffic is unencrypted. It was pretty easy to MITM this module with a cheap arm Linux board and a can transceiver to enable writing a two way filter capable of blocking the traffic that didn't raise any DTCs (that I observed) and could be turned on/off by the user. I preferred this approach to complete disconnection of the module (which is noticeable via errors at the diagnostic port) or trying to faraday cage or disable the antennae on the TCU so it can't remotely send/receive. I can also turn off my module or completely remove it before I sell it.<p>I fear the next version of Miata will be an encrypted CAN like most other cars have moved to and even with my expertise I won't be able to access the latest safety features from new cars without surrendering what little privacy I've been able to claw back.</p>
]]></description><pubDate>Sun, 30 Nov 2025 16:37:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=46098081</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=46098081</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46098081</guid></item><item><title><![CDATA[New comment by emidln in "The Journey Before main()"]]></title><description><![CDATA[
<p>.interp to a glibc/libc you ship or static linking. These days it’s probably faster (in dev time) to just run a container than setting up a bespoke interp and a parallel set of libraries (and the associated toolchain changes or binary patching needed to support it).</p>
]]></description><pubDate>Sun, 26 Oct 2025 05:10:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=45709317</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=45709317</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45709317</guid></item><item><title><![CDATA[New comment by emidln in "Bzip2 crate switches from C to 100% Rust"]]></title><description><![CDATA[
<p>Static linking doesn't produce smaller binaries. You are literally adding the symbols from a library into your executable rather than simply mentioning them and letting the dynamic linker figure out how to map those symbols at runtime.<p>The sum size of a dynamic binary plus the dynamic libraries may be larger than one static linked binary, but whether that holds for more static binaries (2, 3, or 100s) depends on the surface area your application uses of those libraries. It's relatively common to see certain large libraries only dynamically linked, with the build going to great lengths to build certain libraries as shared objects with the executables linking them using a location-relative RPATH (using the $ORIGIN feature) to avoid the extra binary size bloat over large sets of binaries.</p>
]]></description><pubDate>Wed, 18 Jun 2025 06:12:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=44307074</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=44307074</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44307074</guid></item><item><title><![CDATA[New comment by emidln in "Root shell on a credit card terminal"]]></title><description><![CDATA[
<p>If the integrity protection is like any of the TPM implementations I've seen, it often doesn't apply once the thing is already in memory, just that when it first loads that it (and everything before it) was attested. This matters a lot once you get into the userland, esp with an older system, since any random off the shelf exploit can be chained into modifying kernel memory with the intention of modifying the binfmt loader for loadercode (or anything else). Of course, if the loadercode is just a thin shim to prod the secure firmware and that's what has the tamper mode rather than being two separate firmwares for controlling the display, you probably can't progress very far.<p>I'm essentially skeptical that if you have the ability to control the linux root filesystem for a very old linux distro that any other security measures for the linux binaries themselves matter.</p>
]]></description><pubDate>Mon, 02 Jun 2025 06:02:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=44156147</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=44156147</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44156147</guid></item><item><title><![CDATA[New comment by emidln in "Root shell on a credit card terminal"]]></title><description><![CDATA[
<p>If you take a look at the binary that decides whether to boot the secure firmware or the tamper screen, it's probably trivial to patch to get the secure firmware running for more inspection. If the point of the linux system is networking and updates, that implies a method for updating the firmware of the secure portion which isn't ideal. If their check for whether it's tampered or not is in the linux userland, I'd be awfully suspect of their firmware update.</p>
]]></description><pubDate>Mon, 02 Jun 2025 04:55:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=44155915</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=44155915</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44155915</guid></item><item><title><![CDATA[New comment by emidln in "Blue95: a desktop for your childhood home's computer room"]]></title><description><![CDATA[
<p>This looks neat. I remember the various fvwm95 and icewm themes doing a similar number in the late 90s and early 2000s.<p>It would be fun to pair this with Gambas[0], a free VB6 clone that works with GTK.<p>[0] <a href="https://gambaswiki.org/website/en/main.html" rel="nofollow">https://gambaswiki.org/website/en/main.html</a></p>
]]></description><pubDate>Sun, 30 Mar 2025 16:22:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=43525303</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=43525303</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43525303</guid></item><item><title><![CDATA[New comment by emidln in "From Languages to Language Sets"]]></title><description><![CDATA[
<p>This is one of the reasons I like Clojure. There are very useful dialects with broad overlap between:<p>Browser / JavaScript environments -> ClojureScript<p>General Purpose (JVM) -> Clojure<p>Fast Scripting -> Babashka (although I've used ClojureScript for this in the past)<p>C/C++ Interop (LLVM-based) -> Jank (new, but progressing rapidly and already useful)<p>I can largely write the same expressive code in each environment, playing to the platform strengths as needed. I can combine these languages inside the same project, and have libraries that have unified APIs across implementation. I can generally print and read EDN across implementations, provided I register the right tag handlers for custom types (this is one area jank still has to catch up). Reader conditionals allow implementation-specific code as needed.<p>I'm really excited about Jank giving me a good alternative to JNI/JNA/Panama when I need my Clojure to touch OS parts the JVM hasn't wrapped.</p>
]]></description><pubDate>Mon, 17 Mar 2025 02:59:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=43384779</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=43384779</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43384779</guid></item><item><title><![CDATA[New comment by emidln in "Why does Mill use Scala?"]]></title><description><![CDATA[
<p>> No they don’t. Just like everyone doesn’t know Cobol, Fortran, Scala etc.<p>Sure somebody might not have Python experience, but it's pretty easy to just not hire someone who says they don't know Python and isn't willing to learn for the role. I don't know that you'd filter out many candidates out of any random 100 devs.</p>
]]></description><pubDate>Thu, 13 Feb 2025 22:41:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=43042396</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=43042396</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43042396</guid></item><item><title><![CDATA[New comment by emidln in "Python 3.14 Getting New Interpreter"]]></title><description><![CDATA[
<p>I'd recommend nanobind over pybind11 at this point. Similar api, from the same author, but under active development and support.</p>
]]></description><pubDate>Wed, 12 Feb 2025 11:54:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=43024428</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=43024428</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43024428</guid></item><item><title><![CDATA[New comment by emidln in "First live birth using Fertilo procedure that matures eggs outside the body"]]></title><description><![CDATA[
<p>Not the universal usage of a euphoria-inducing, pacifying drug covering large-scale psychological manipulation and inudstrialist domination of society? Brave New World is a dystopia because it shows a fully satiated and socially occupied doesn't care that it is being manipulated and repressed. You don't care about your caste,or the atrocities committed to others, or learning to better yourself because you take another hit of Soma and join an orgy.<p>Did we read the same book?</p>
]]></description><pubDate>Tue, 07 Jan 2025 13:13:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=42621984</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=42621984</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42621984</guid></item><item><title><![CDATA[New comment by emidln in "Faster CI with Selective Testing"]]></title><description><![CDATA[
<p>It worked well enough for my last company. It does require a team to teach it and to do the heavy lifting on custom rules and tooling. I'd rather do that than worry about whether my c++ that was exposing me to millions/billions of risk might have skipped some tests in our haste for an intraday release.</p>
]]></description><pubDate>Mon, 30 Dec 2024 08:17:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=42547507</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=42547507</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42547507</guid></item><item><title><![CDATA[New comment by emidln in "Faster CI with Selective Testing"]]></title><description><![CDATA[
<p>It's possible to use bazel to do this. You need to be very explicit (The Bazel Way(tm)), but in exchange, you can ask the graph for everything that is an rdep of a given file. This isn't always necessary in bazel (if you avoid weird integration targets, deploy targets, etc) where `bazel test //...` generally does this by default anyway. It's sometimes necessary to manually express due to incomplete graphs, tests that are not executed every time (for non-determinism, execution cost, etc), and a few other reasons but at least it's possible.</p>
]]></description><pubDate>Mon, 30 Dec 2024 04:36:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=42546517</link><dc:creator>emidln</dc:creator><comments>https://news.ycombinator.com/item?id=42546517</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42546517</guid></item></channel></rss>