<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: fulafel</title><link>https://news.ycombinator.com/user?id=fulafel</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 18 Apr 2026 14:10:47 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=fulafel" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by fulafel in "All 12 moonwalkers had "lunar hay fever" from dust smelling like gunpowder (2018)"]]></title><description><![CDATA[
<p>I'm not a Mars colonisation advocate, but sounds like exposure to that may be manageable:<p>"Perchlorate is toxic to people only in the sense that it can disrupt the production of thyroid hormone, an important growth hormone needed by babies in the womb for normal development." (from <a href="https://www.scientificamerican.com/article/perchlorate-life-mars-phoenix/" rel="nofollow">https://www.scientificamerican.com/article/perchlorate-life-...</a>)<p>Lots of people have this condition without perchlorate after all and it's just simple meds to fix it.</p>
]]></description><pubDate>Sat, 18 Apr 2026 03:01:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47812796</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47812796</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47812796</guid></item><item><title><![CDATA[New comment by fulafel in "A simplified model of Fil-C"]]></title><description><![CDATA[
<p>A lot of the frameworks do it. There's RC in GNOME/GTK, C++ stdlib, and built into Objective-C.<p>And of course it's easy to think of lots of apps that heavily use those or another form of GC.</p>
]]></description><pubDate>Sat, 18 Apr 2026 02:48:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47812731</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47812731</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47812731</guid></item><item><title><![CDATA[New comment by fulafel in "The Orange Pi 6 Plus"]]></title><description><![CDATA[
<p>On the other hand RPi doesn't support suspend. So which wins depends if your application is always-on.</p>
]]></description><pubDate>Wed, 15 Apr 2026 05:17:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47774954</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47774954</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47774954</guid></item><item><title><![CDATA[New comment by fulafel in "Small models also found the vulnerabilities that Mythos found"]]></title><description><![CDATA[
<p>Aisle said they pointed it at the function, not the file. So, the nr of LLM turns would be something like nr of functions * nr of possible hints * nr of repos.<p>Could indeed be a useful exercise to benchmark the cost.<p>This would still be more limied, since many vulnerabilities are apparent only when you consider more context than one function to discover the vulnerability. I think there were those kinds of vulnerabilities in the published materials. So maybe the Aisle case is also picking the low hanging fruit in this respect.</p>
]]></description><pubDate>Sun, 12 Apr 2026 08:35:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47737362</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47737362</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47737362</guid></item><item><title><![CDATA[New comment by fulafel in "Intel 486 CPU announced April 10, 1989"]]></title><description><![CDATA[
<p>It was architecturally a 16-bit CPU so a flat 32-bit address space would be a non sequitur. If you wanted flat 32-bit addressing, there was a contemporary chip that could do it with virtual memory: Motorola 68010 + the optional external MMU. (Or if you were willing to do some hoops, even a 68000.. see the Sun-1)</p>
]]></description><pubDate>Fri, 10 Apr 2026 19:18:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47722438</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47722438</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47722438</guid></item><item><title><![CDATA[New comment by fulafel in "Intel 486 CPU announced April 10, 1989"]]></title><description><![CDATA[
<p>Several operating systems on 286 (eg Xenix, Coherent, OS/2) used its MMU for multitasking and memory protection. See <a href="https://en.wikipedia.org/wiki/Intel_80286#Protected_mode" rel="nofollow">https://en.wikipedia.org/wiki/Intel_80286#Protected_mode</a></p>
]]></description><pubDate>Fri, 10 Apr 2026 16:19:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=47720378</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47720378</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47720378</guid></item><item><title><![CDATA[New comment by fulafel in "IPv6 is the only way forward"]]></title><description><![CDATA[
<p>RFC 7368 is a 2014 "informational" (no ietf standing) doc so it's not a source for current IETF advice. Also it was part of the since closed "homenet" working group initiative trying to define some new stuff that did not get vendor uptake.<p>But in substance, if you have several subnets,  then using ULA may make sense depending on what you're trying to do. However most home networks don't subnet.</p>
]]></description><pubDate>Wed, 08 Apr 2026 18:42:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47694448</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47694448</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47694448</guid></item><item><title><![CDATA[New comment by fulafel in "IPv6 is the only way forward"]]></title><description><![CDATA[
<p>> mDNS operates at the link-local scope (link-local addresses)<p>This is not the case for the addresses returned. See eg <a href="https://www.rfc-editor.org/rfc/rfc6762" rel="nofollow">https://www.rfc-editor.org/rfc/rfc6762</a><p>6.2.  Responding to Address Queries<p><pre><code>   When a Multicast DNS responder sends a Multicast DNS response message
   containing its own address records, it MUST include all addresses
   that are valid on the interface on which it is sending the message,
   and MUST NOT include addresses that are not valid on that interface
   (such as addresses that may be configured on the host's other
   interfaces).  For example, if an interface has both an IPv6 link-
   local and an IPv6 routable address, both should be included in the
   response message so that queriers receive both and can make their own
   choice about which to use.  This allows a querier that only has an
   IPv6 link-local address to connect to the link-local address, and a
   different querier that has an IPv6 routable address to connect to the
   IPv6 routable address instead.
</code></pre>
So instead of using static ULA addresses, you can use the the routable address returned by mDNS. It can often replace the ULA address use case.</p>
]]></description><pubDate>Wed, 08 Apr 2026 18:33:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47694345</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47694345</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47694345</guid></item><item><title><![CDATA[New comment by fulafel in "IPv6 is the only way forward"]]></title><description><![CDATA[
<p>You also get this if you use mDNS, but without the ULA hassle and you get to use DNS names instead of hardcoding IP addresses.</p>
]]></description><pubDate>Wed, 08 Apr 2026 15:20:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47691450</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47691450</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47691450</guid></item><item><title><![CDATA[New comment by fulafel in "IPv6 is the only way forward"]]></title><description><![CDATA[
<p>If you want to have an airgapped network, sure. For most people it doesn't make sense. You'll just get the worst of of both worlds.</p>
]]></description><pubDate>Wed, 08 Apr 2026 14:09:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47690474</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47690474</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47690474</guid></item><item><title><![CDATA[New comment by fulafel in "Project Glasswing: Securing critical software for the AI era"]]></title><description><![CDATA[
<p>People have, of course, been looking. Linux has been the #1 corpus for the methods for ages.</p>
]]></description><pubDate>Wed, 08 Apr 2026 10:07:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47687987</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47687987</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47687987</guid></item><item><title><![CDATA[New comment by fulafel in "IPv6 is the only way forward"]]></title><description><![CDATA[
<p>Indeed, the tragedy of the IPv4+NAT stockholm syndrome is that people view having to use ambiguous addresses as access control and can't distinguish reachability vs addressing.</p>
]]></description><pubDate>Wed, 08 Apr 2026 04:57:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47685466</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47685466</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47685466</guid></item><item><title><![CDATA[New comment by fulafel in "The Cathedral, the Bazaar, and the Winchester Mystery House"]]></title><description><![CDATA[
<p>Mapped to modern concepts I'd say it was about iterating from a MVP.<p>"Gabriel argued that early Unix and C, developed by Bell Labs, are examples of the worse-is-better design approach." Whereas vibe-coding is not reviewing what code goes in, just judging it by whether it seems to work or not. I guess a common factor would be willingness to compromise on soundness.</p>
]]></description><pubDate>Mon, 06 Apr 2026 09:32:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47658702</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47658702</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47658702</guid></item><item><title><![CDATA[New comment by fulafel in "Claude Code Found a Linux Vulnerability Hidden for 23 Years"]]></title><description><![CDATA[
<p>People pass around stickers (or at least used to) in hacker events saying that so there has to be something to it, right?<p>Protesting the term is, I'd wager, motivated by something like: it sounds innocuous to nontechnical people and obscures what's really going on.</p>
]]></description><pubDate>Sun, 05 Apr 2026 06:43:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47646770</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47646770</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47646770</guid></item><item><title><![CDATA[New comment by fulafel in "Show HN: M. C. Escher spiral in WebGL inspired by 3Blue1Brown"]]></title><description><![CDATA[
<p>You can implement the graphics part of it using WebGL. It's strictly a graphics API for drawing to the screen. But there are specific libraries for eg physics that you can use in your WebGL 2 app, or entire 3D engines (like those you mentioned) targeting WebGL around. Or you can DIY.<p>> is open gl the non web version of web gl? or are they completely different?<p>The current version of WebGL, WebGL 2, is like OpenGL ES 3.0.</p>
]]></description><pubDate>Sun, 05 Apr 2026 06:19:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=47646607</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47646607</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47646607</guid></item><item><title><![CDATA[New comment by fulafel in "The Cathedral, the Bazaar, and the Winchester Mystery House"]]></title><description><![CDATA[
<p>Most of free software (incl the BSD stuff) was like that. The bazaar was an attempt to characterise the new linux style way of doing it.</p>
]]></description><pubDate>Sat, 04 Apr 2026 13:05:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47638739</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47638739</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47638739</guid></item><item><title><![CDATA[New comment by fulafel in "Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised"]]></title><description><![CDATA[
<p>> In such an environment the container would crash, we see the violations, delete it and dont' have to worry about it.<p>This is the interesting part. What kind of UI or other mechanisms would help here? There's no silver bullet for detecting and crashing on "something bad". The adversary can test against your sandbox as well.</p>
]]></description><pubDate>Tue, 24 Mar 2026 17:15:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47506004</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47506004</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47506004</guid></item><item><title><![CDATA[New comment by fulafel in "Local Stack Archived their GitHub repo and requires an account to run"]]></title><description><![CDATA[
<p>Seems it's the other way around: the README cites the months older sunset announcement as the motivation.</p>
]]></description><pubDate>Tue, 24 Mar 2026 05:52:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47499015</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47499015</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47499015</guid></item><item><title><![CDATA[New comment by fulafel in "Ubuntu 26.04 Ends 46 Years of Silent sudo Passwords"]]></title><description><![CDATA[
<p>Haven't seen this - shouldn't this always work on unixy platforms? If using readline/editline it works, and if built without it also works.</p>
]]></description><pubDate>Sun, 22 Mar 2026 07:41:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47475316</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47475316</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47475316</guid></item><item><title><![CDATA[New comment by fulafel in "Wayland set the Linux Desktop back by 10 years?"]]></title><description><![CDATA[
<p>Gamescope is custom sw built by Valve, and all the games run under X (via Xwayland). I'd suspect you could build similar functionality without Wayland (for example a custom X server talking to directly to the kernel DRM).<p>I'd wager in a alternate universe where Wayland didn't have all the mindshare, Steam Deck would still be a product (unless some butterfly effect nixed it).</p>
]]></description><pubDate>Sat, 21 Mar 2026 06:30:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47464506</link><dc:creator>fulafel</dc:creator><comments>https://news.ycombinator.com/item?id=47464506</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47464506</guid></item></channel></rss>