<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: ericlevine</title><link>https://news.ycombinator.com/user?id=ericlevine</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 25 Apr 2026 08:53:03 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=ericlevine" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by ericlevine in "Push events into a running session with channels"]]></title><description><![CDATA[
<p>This is fantastic. There are a ton of use cases where you'd want to be able to build an integration that hooks back to your running agent session. OpenClaw has this today, but it's pretty janky. Hopefully this is coming to Claude Cowork as well.<p>My use case is that I have a separate system that provides human approvals for what my agent can do. Right now, I've had to resort to long-polling to give a halfway decent user experience. But webhooks are clearly the right solution. Curious to see how it ends up being exposed outside of these initial integrations.</p>
]]></description><pubDate>Fri, 20 Mar 2026 04:31:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47450517</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=47450517</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47450517</guid></item><item><title><![CDATA[New comment by ericlevine in "Show HN: Klaus – OpenClaw on a VM, batteries included"]]></title><description><![CDATA[
<p>Totally fair feedback, and it’s true, many of these are synthetic evals with a few that were still synthetically produced but guided. At this point, because it’s all self-hosted, I only have my own data set. The places where it fails (for me) today are due to feature gaps rather than LLM mistakes. This is a new project that has not been widely announced, so my user base today is small but growing. If you give it a whirl and find it making mistakes, please send them my way! :)</p>
]]></description><pubDate>Thu, 12 Mar 2026 06:13:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47347099</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=47347099</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47347099</guid></item><item><title><![CDATA[New comment by ericlevine in "Show HN: Klaus – OpenClaw on a VM, batteries included"]]></title><description><![CDATA[
<p>Absolutely. You can see the evals here:<p><a href="https://github.com/clawvisor/clawvisor/blob/main/internal/intent/testdata/eval_cases.json" rel="nofollow">https://github.com/clawvisor/clawvisor/blob/main/internal/in...</a><p>And the results here:
<a href="https://github.com/clawvisor/clawvisor/blob/main/internal/intent/testdata/eval_results.json" rel="nofollow">https://github.com/clawvisor/clawvisor/blob/main/internal/in...</a></p>
]]></description><pubDate>Thu, 12 Mar 2026 00:39:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47344699</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=47344699</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47344699</guid></item><item><title><![CDATA[New comment by ericlevine in "Show HN: Klaus – OpenClaw on a VM, batteries included"]]></title><description><![CDATA[
<p>> Connecting your email is still a risk.<p>> If you’ve built something agents want, please let us know. Comments welcome!<p>I'll bite! I've built a self-hosted open source tool that's intended to solve this problem specifically. It allows you to approve an agent purpose rather than specific scopes. An LLM then makes sure that all requests fit that purpose, and only inject the credentials if they're in line with the approved purpose. I (and my early users) have found substantially reduces the likelihood of agent drift or injection attacks.<p><a href="https://github.com/clawvisor/clawvisor" rel="nofollow">https://github.com/clawvisor/clawvisor</a></p>
]]></description><pubDate>Wed, 11 Mar 2026 20:39:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47341297</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=47341297</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47341297</guid></item><item><title><![CDATA[New comment by ericlevine in "Agent Safehouse – macOS-native sandboxing for local agents"]]></title><description><![CDATA[
<p>Completely agree. As soon as I had OpenClaw working, I realized actually giving it access to anything was a complete nonstarter after all of the stories about going off the rails due to context limitations [1]. I've been building a self-hosted open sourced tool to try to address this by using an LLM to police the activity of the agent. Having the inmates run the asylum (by having an LLM police the other LLM) seemed like an odd idea, but I've been surprised how effective it's been. You can check it out here if you're curious: <a href="https://github.com/clawvisor/clawvisor" rel="nofollow">https://github.com/clawvisor/clawvisor</a> clawvisor.com<p>[1] <a href="https://www.tomshardware.com/tech-industry/artificial-intelligence/openclaw-wipes-inbox-of-meta-ai-alignment-director-executive-finds-out-the-hard-way-how-spectacularly-efficient-ai-tool-is-at-maintaining-her-inbox" rel="nofollow">https://www.tomshardware.com/tech-industry/artificial-intell...</a></p>
]]></description><pubDate>Mon, 09 Mar 2026 00:28:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47303275</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=47303275</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47303275</guid></item><item><title><![CDATA[OAuth Is Broken for AI Agents]]></title><description><![CDATA[
<p>Article URL: <a href="https://levine.tech/blog/oauth-is-broken">https://levine.tech/blog/oauth-is-broken</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47275987">https://news.ycombinator.com/item?id=47275987</a></p>
<p>Points: 4</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 06 Mar 2026 15:19:28 +0000</pubDate><link>https://levine.tech/blog/oauth-is-broken</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=47275987</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47275987</guid></item><item><title><![CDATA[Porting barcode scanning library ZXing to Go with Claude Code]]></title><description><![CDATA[
<p>Article URL: <a href="https://levine.tech/blog/porting-zxing">https://levine.tech/blog/porting-zxing</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47076003">https://news.ycombinator.com/item?id=47076003</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 19 Feb 2026 17:00:51 +0000</pubDate><link>https://levine.tech/blog/porting-zxing</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=47076003</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47076003</guid></item><item><title><![CDATA[New comment by ericlevine in "Dvorak vs Colemak (2010-2020)"]]></title><description><![CDATA[
<p>I have to agree with the other poster. My typing speed was in the 70+ WPM on qwerty prior to learning dvorak, and now I'm a glorified hunt-and-pecker on qwerty keyboards.<p>The only exception to this is typing on my mobile device, which is configured to qwerty.</p>
]]></description><pubDate>Tue, 13 Apr 2021 15:58:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=26794177</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=26794177</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26794177</guid></item><item><title><![CDATA[New comment by ericlevine in "Y Combinator Failed Startups"]]></title><description><![CDATA[
<p>Quick note: you got the pronoun wrong for the founder of The Buttermilk Company when referencing her Medium post.</p>
]]></description><pubDate>Fri, 09 Oct 2020 21:31:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=24734662</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=24734662</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24734662</guid></item><item><title><![CDATA[New comment by ericlevine in "Ask HN: Who is hiring? (December 2019)"]]></title><description><![CDATA[
<p>Berbix | Full-stack software engineer | Full Time | Onsite | San Francisco, CA
Our stack: Go, React, Typescript, iOS, Android, Google Cloud<p>We're an Initialized Capital-backed, YC startup (S18) making it easy for companies to collect and instantly verify photo IDs online. We use ML and computer vision techniques to effectively extract and validate the IDs in our system without any human intervention. This is a game changer for companies that require age verification, fraud deterrence or KYC. We are growing quickly and have new customers coming on board weekly.<p>Our founding team led the Trust & Safety team at Airbnb for several years. We implemented the initial versions of the Airbnb's Verified ID product and saw many of the problems with the existing solutions.<p>We have a modern stack and a ton of interesting problems to solve. We're a SaaS, API-first company building a best-in-class solution for identity verification.<p>My email address is eric [at] [company-name] .com<p>(<a href="https://angel.co/company/berbix/jobs" rel="nofollow">https://angel.co/company/berbix/jobs</a>)</p>
]]></description><pubDate>Mon, 02 Dec 2019 20:33:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=21686561</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=21686561</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21686561</guid></item><item><title><![CDATA[New comment by ericlevine in "Launch HN: Berbix (YC S18) – Instant ID checks to fight fraud and stay compliant"]]></title><description><![CDATA[
<p>Absolutely understand where you’re coming from. It can be jarring to be asked to go through those steps by a set of companies with whom you have no direct relationship. That said, data access requests can contain some extremely sensitive information and it’s important companies responding to such requests don't share information with the wrong person.<p>Regarding your question on data deletion; we abide by the retention policies chosen by our customers, which are typically much shorter than 3 years. For Sift specifically, the retention policy is indeed 14 days, after which point we automatically delete all the personally identifiable information we've collected on Sift's behalf. We'll be taking in your feedback, however, as this could be made clearer in both our privacy policy and our product.</p>
]]></description><pubDate>Thu, 21 Nov 2019 22:37:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=21600507</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=21600507</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21600507</guid></item><item><title><![CDATA[New comment by ericlevine in "Launch HN: Berbix (YC S18) – Instant ID checks to fight fraud and stay compliant"]]></title><description><![CDATA[
<p>Completely understand and sympathize with that. We absolutely can (and will) do a better job of conveying the intent of the different checks here. The pose change requested is randomized, but I get that this can be frustrating.<p>I know you already get this, but for posterity, the idea here is to make sure the person submitting their ID is actually in front of the computer (and can react to a prompt). Attempting to use a still photo is a common way a bad actor may try to circumvent these protections. Obviously correctly identifying someone in the case you described is extremely important given the sensitivity of some of these data access requests.<p>Orwellian isn’t exactly the vibe we’re looking for, though, so we can do better here.</p>
]]></description><pubDate>Thu, 21 Nov 2019 22:14:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=21600300</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=21600300</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21600300</guid></item><item><title><![CDATA[New comment by ericlevine in "Launch HN: Berbix (YC S18) – Instant ID checks to fight fraud and stay compliant"]]></title><description><![CDATA[
<p>Appreciate the thoughtful questions.<p>On the point of why images leave our system at all, we provide a way to show our work to our customers — they won’t trust our results if they can’t see that they’re accurate. When they access information on our dashboard, if we render the images, they’ve left our systems. To be clear, we’re not syndicating this information to any third parties, just showing this information directly to our customer (who is the owner and controller of this data).<p>As for what procedures we put in place, we enforce short retention periods for the data we store in our systems for precisely the reason you are worried about. At the expiration of that period, the data is permanently deleted. Furthermore, in the event of a change of control, the contracts we’ve put in place with our existing customers govern how the information can be used. This is super important to us as we personally take privacy extremely seriously.<p>The aggressive watermarking is important for several reasons. First, in the worst case scenario, we can trace how a breach happened and when. Second, it is watermarked in such a way that the images become much less functional than they would be otherwise — the intent is to ensure that the images cannot be used to verify an identity on any other service. We take security very seriously — we’ve already secured SOC 2 certification and continue to invest heavily in security using industry best practices.</p>
]]></description><pubDate>Thu, 21 Nov 2019 21:24:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=21599800</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=21599800</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21599800</guid></item><item><title><![CDATA[New comment by ericlevine in "Launch HN: Berbix (YC S18) – Instant ID checks to fight fraud and stay compliant"]]></title><description><![CDATA[
<p>Thank you! And yes, this space is definitely becoming increasingly important. Our focus has been to provide a lightweight, low-friction means by which to confidently check IDs. While we have been primarily serving North America-based customers, our product can work well for any US or Canadian IDs or ICAO compliant travel documents (which includes many European IDs).</p>
]]></description><pubDate>Thu, 21 Nov 2019 21:00:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=21599556</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=21599556</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21599556</guid></item><item><title><![CDATA[New comment by ericlevine in "Launch HN: Berbix (YC S18) – Instant ID checks to fight fraud and stay compliant"]]></title><description><![CDATA[
<p>Many of the existing KYC providers for fintech startups rely on credit reports to perform identity checks. Our perspective is that relying on credit reports alone is becoming increasingly problematic given the widespread data breaches which expose the underlying data. Bad actors have access to full name, date of birth, address history, and social security numbers for countless individuals.<p>We believe that going forward, fintech startups are going to have to have to have increasingly robust KYC programs, which will include an ID checks. Berbix is an effective tool to collect and check IDs instantly as part of a robust KYC program. To that end, we’re currently serving multiple customers in the fintech space with such programs.</p>
]]></description><pubDate>Thu, 21 Nov 2019 20:14:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=21599016</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=21599016</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21599016</guid></item><item><title><![CDATA[New comment by ericlevine in "Launch HN: Berbix (YC S18) – Instant ID checks to fight fraud and stay compliant"]]></title><description><![CDATA[
<p>Thank you! Super excited to show what we’re working on. Yes, our product is fully automated - our customers can choose to review items that we’ve flagged as problematic, but they can also choose to reject them outright. As for the pricing, we’ve found that our price is competitive in this space, and we can provide significant volume discounts.<p>Drop me a line at (my first name) @berbix.com and I’ll shoot over a demo link so you can try it!</p>
]]></description><pubDate>Thu, 21 Nov 2019 19:32:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=21598450</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=21598450</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21598450</guid></item><item><title><![CDATA[New comment by ericlevine in "Launch HN: Berbix (YC S18) – Instant ID checks to fight fraud and stay compliant"]]></title><description><![CDATA[
<p>Our customers typically integrate with us using one of our client-side SDKs (<a href="https://docs.berbix.com/docs/client-sdks" rel="nofollow">https://docs.berbix.com/docs/client-sdks</a>). Our web SDKs embed an iframe into your website (or spawn a modal) that will take the end user through the image collection flow. Our mobile SDKs get baked into mobile apps so that there’s no additional app to download to complete the end user flow. In either case, as soon as the end user finishes the flow, you can fetch the data about the transaction via our API (or using our backend SDKs).</p>
]]></description><pubDate>Thu, 21 Nov 2019 19:19:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=21598271</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=21598271</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21598271</guid></item><item><title><![CDATA[Launch HN: Berbix (YC S18) – Instant ID checks to fight fraud and stay compliant]]></title><description><![CDATA[
<p>Hi everyone!<p>We’re Steve and Eric, the founders of Berbix (<a href="https://www.berbix.com" rel="nofollow">https://www.berbix.com</a>). We make it easy to instantly verify photo IDs. Our goal is to empower platforms to accurately identify their users while being responsible stewards of sensitive information.<p>Today, we’re launching our self-service ID checks (<a href="https://www.berbix.com/pricing" rel="nofollow">https://www.berbix.com/pricing</a>) to organizations of any size that need to answer the question: Are you who you say you are?<p>We’re taking a privacy-first approach to identity verification. Your government-issued photo ID is one of the most sensitive pieces of information you own, and sharing it with a company online can be scary. We’ve invested significant effort to try to do this the right way from a security perspective, ensuring all images that ever leave our system are aggressively watermarked, and enforcing short retention policies to automatically purge data. We aren’t—nor do we ever intend to be—in the business of selling personal data.<p>Unless you’re a credit card processor, everyone knows that you’d be crazy to collect credit card numbers directly without using a system like Stripe because of PCI compliance. But there’s no equivalent standard for identity documents. It’s still the wild west when it comes to best practices around this extremely sensitive data. Companies inevitably will need to collect this data, whether to comply with regulations to verify age, confirm the identity of a GDPR or CCPA request, or deter fraud on a marketplace.  It may come across as self serving, but we’d rather have a privacy-oriented company collect that data on their behalf.<p>We were the product and engineering leaders of the Trust & Safety team at Airbnb for several years where we were tasked with stopping all bad things from happening on Airbnb—both online and offline. This was a challenging problem as it included your typical online fraud like chargebacks, account takeovers, and wire scams in addition to much more novel offline risks like property damage and personal safety issues.<p>We learned to distinguish between “premeditated” bad actors who come to a platform with the intent to cause harm and “opportunistic” bad actors who would swipe a $20 bill on a nightstand, as an example. Some techniques work well against one group, but not the other. One effective means to fight both is to check a government-issued photo ID. Premeditated bad actors will often leave to find another platform with fewer protections, and opportunistic bad actors will think twice before doing something malicious in the moment when they know their ID has been checked.<p>Historically, checking IDs online has been hard. It required a 5-figure contract with a legacy ID verification provider, would take minutes or more, and the quality of the data returned left a lot to be desired. We knew there had to be a better way, and so we started Berbix. Our product returns a result in 2 seconds or less and leverages the machine- and human-readable components of a photo ID to maximize accuracy.<p>We’ve designed Berbix in a way that we, as developers, would want to use it (<a href="https://docs.berbix.com" rel="nofollow">https://docs.berbix.com</a>), with backend API libraries that make an integration simple and intuitive. We offer client-side SDKs for a number of platforms including React, iOS, Android and more (<a href="https://github.com/berbix" rel="nofollow">https://github.com/berbix</a>). We make integration simple enough to be completed in a matter of minutes, while also providing flexibility to offer custom configurations if desired. Using our API, you can request the information you need to verify your users, while isolating your servers from ever handling the sensitive user-submitted ID images directly.<p>We’d love feedback from the HN community. Looking forward to hearing your thoughts!</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=21597169">https://news.ycombinator.com/item?id=21597169</a></p>
<p>Points: 106</p>
<p># Comments: 51</p>
]]></description><pubDate>Thu, 21 Nov 2019 18:00:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=21597169</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=21597169</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21597169</guid></item><item><title><![CDATA[New comment by ericlevine in "Ask HN: Who is hiring? (October 2019)"]]></title><description><![CDATA[
<p>Berbix | Full-stack software engineer | Full Time | Onsite | San Francisco, CA<p>Our stack: Go, React, Typescript, iOS, Android, Google Cloud<p>We're an Initialized Capital-backed, YC startup (S18) making it easy for companies to collect and instantly verify photo IDs online. We use ML and computer vision techniques to effectively extract and validate the IDs in our system without any human intervention. This is a game changer for companies that require age verification, fraud deterrence or KYC. We are growing quickly and have new customers coming on board weekly.<p>Our founding team led the Trust & Safety team at Airbnb for several years. We implemented the initial versions of the Airbnb's Verified ID product and saw many of the problems with the existing solutions.<p>We have a modern stack and a ton of interesting problems to solve.  We're a SaaS, API-first company building a best-in-class solution for identity verification.<p>(<a href="https://angel.co/company/berbix/jobs" rel="nofollow">https://angel.co/company/berbix/jobs</a>)</p>
]]></description><pubDate>Tue, 01 Oct 2019 21:54:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=21131136</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=21131136</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21131136</guid></item><item><title><![CDATA[New comment by ericlevine in "The latest chapter for the self-driving car: mastering city street driving"]]></title><description><![CDATA[
<p>Of course I'm way late to the game here, but thought I'd add one more voice of dissent:<p>The real estate costs can be extremely low for self-driving cars. Imagine a tower of, say, 10 cars stacked vertically with an elevator mechanism to bring them to and from ground-level. Since each autonomous car is interchangeable, you can just treat the vertical parking lot as a stack. When demand is high, pop off the stack. When demand is low, push back onto the stack. No need for ramps or anything else that existing parking garages use. And just to be totally clear, humans don't interact with this tower, it's just a storage mechanism for empty cars after they've unloaded passengers.</p>
]]></description><pubDate>Tue, 29 Apr 2014 07:20:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=7665481</link><dc:creator>ericlevine</dc:creator><comments>https://news.ycombinator.com/item?id=7665481</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7665481</guid></item></channel></rss>