<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: gwittel</title><link>https://news.ycombinator.com/user?id=gwittel</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 29 Apr 2026 20:21:00 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=gwittel" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by gwittel in "Ghostty is leaving GitHub"]]></title><description><![CDATA[
<p>> "GitHub only gets better if people who give a shit stick around to make it better"<p>At a basic level I appreciate this sentiment.  However, the common dysfunction I see in large corporation is its not the lack of people who give a shit.  Its lacking a sufficient number of people in positions of power that give a shit -- such that they can actually make change happen.<p>All too often competing pressures (features, profit, delivery speed, politics) take precedence; not leaving time for things that would really move the needle.  In essence, too many leaders are happy to ship garbage; they don't care (or don't know).<p>If Github were to put out a statement saying "service quality is our priority", it is fairly meaningless.  If they added "here's how we'll get there", maybe it helps some.   Moreso -- "from now on executive compensation is tied to these SLOs", then maybe something would actually happen.</p>
]]></description><pubDate>Wed, 29 Apr 2026 00:00:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47942500</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=47942500</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47942500</guid></item><item><title><![CDATA[New comment by gwittel in "2,100 Swiss municipalities showing which provider handles their official email"]]></title><description><![CDATA[
<p>Yes. In the past I helped sort out tooling like this for competitive analysts.  There are a few ways this is done:<p>1) Check the businesses’ MX record.  Often this points to a third party provider like Microsoft or Google.
2) Connect to the mail server identified in the MX record. Sometimes these have banners that identify the vendor (vs something generic like sendmail)
3) Email headers from messages sent to users in the company (or sometimes a bounce). Often these have headers from one or more providers.  You’ll have to sort out the path to understand which bits were added by the sender/recipient path though.<p>These days often companies have multiple providers (security) so they might have one at the edge (mx) and more internal hops.  You can usually see these in the headers.</p>
]]></description><pubDate>Mon, 20 Apr 2026 19:38:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47839478</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=47839478</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47839478</guid></item><item><title><![CDATA[New comment by gwittel in "Modern SID chip substitutes [video]"]]></title><description><![CDATA[
<p>Yes.  I remember listening to it on the radio.  The DJ used the handle Hard Hat Mack.  It was pretty awesome to hear SID music over the radio.<p>I found this archive that has some of the shows recorded, and set playlists (I'm giving two links as the site is using frames so the top level page requires you navigate the menus to get to these):<p><pre><code>  - Recordings: https://www.transbyte.org/SID/KDVS.html
  - Playlists: https://www.transbyte.org/SID/6581.html
</code></pre>
The set playlists (using HVSC) works.  For actual recordings they're 404 from this site -- arnold.c64.org is gone.   But there are a few archives of the arnold.c64.org site!  This should help re-construct the original links from the above page:<p><pre><code>  - https://www.mmnt.net/db/0/0/arnold.c64.org/pub/sidmusic/lala/ra
  - https://archive.org/download/arnold.c64.org  (download the whole thing and dig into pub/sidmusic/lala/ra)
</code></pre>
Due to the era, most of the files are in RealAudio format; with a few MP3s as well.  Wonder if this could all be re-posted somewhere in modern formats to make it more accessible.<p>Its possible the authors are still around and have more copies;  doubtful KDVS has archives, maybe tapes buried in the library.<p>Anyway, hope this helps!  Its a cool piece of history and brings back a few memories.</p>
]]></description><pubDate>Thu, 18 Dec 2025 17:39:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=46315933</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=46315933</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46315933</guid></item><item><title><![CDATA[New comment by gwittel in "Craft Chrome Devtools Protocol (CDP) commands with new command editor"]]></title><description><![CDATA[
<p>Tools like Playwright and Puppeteer are abstractions on top of CDP. The other use case is when these frameworks don’t expose or don’t use a CDP command you need (often they hide some parameters for cross browser compatibility).<p>Webdriver BiDi is a future cross browser replacement:<p><a href="https://www.w3.org/TR/webdriver-bidi/" rel="nofollow">https://www.w3.org/TR/webdriver-bidi/</a></p>
]]></description><pubDate>Mon, 17 Nov 2025 16:17:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=45954988</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=45954988</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45954988</guid></item><item><title><![CDATA[New comment by gwittel in "When UPS charged me a $684 tariff on $355 of vintage computer parts"]]></title><description><![CDATA[
<p>I’ve had a similar thing happen to me recently.  500$ tariff on $130 of stuff.  The tariff should have been like $20. UPS has been completely non responsive and still won’t show me the customs forms.  Total scam.</p>
]]></description><pubDate>Sun, 16 Nov 2025 05:02:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=45942898</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=45942898</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45942898</guid></item><item><title><![CDATA[New comment by gwittel in "Trapping misbehaving bots in an AI Labyrinth"]]></title><description><![CDATA[
<p>I work a product that involves a security crawler (phish, malware detection, etc). It’s just a new arms race.  Crawlers will adapt.<p>Cloudflare is already heavily abused by threat actors to host, and gate their malicious content.  This means our crawler has to handle anti-bot and CAPTCHAs.  It’s a pain.  Cloudflare is no help.<p>They have a “verified bot” program but it’s a joke for security.  You must register a unique, identifiable user agent, and come from a set of self declared IPs.  Cloudflare users can check a box to filter these bots out.  And now you're easily fingerprintable so the bad guys can just filter you even without Cloudflare’s help.<p>So now we have a choice.  Operate above board and miss security threats. Or operate outside the rules (as opaquely defined by Cloudflare), and do right by our customers.<p>All of this on CFs side is to solve a real problem. Unfortunately by not working with the industry in a productive manner, Cloudflare is just creating new problems for everyone else.</p>
]]></description><pubDate>Sun, 23 Mar 2025 16:28:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=43453935</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=43453935</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43453935</guid></item><item><title><![CDATA[New comment by gwittel in "Trapping misbehaving bots in an AI Labyrinth"]]></title><description><![CDATA[
<p>Oh fun. I can’t wait. Now phishing sites will be protected with Turnstile and this garbage.</p>
]]></description><pubDate>Fri, 21 Mar 2025 23:02:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=43441634</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=43441634</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43441634</guid></item><item><title><![CDATA[New comment by gwittel in "Show HN: Lightpanda, an open-source headless browser in Zig"]]></title><description><![CDATA[
<p>Interesting.  Looks really neat!  How do you deal with anti bot stuff like Fingerprintjs, Cloudflare turnstile, etc? Maybe you’re new enough to not get flagged but I find this (and CDP) a challenge at times with these anti-bot systems.</p>
]]></description><pubDate>Fri, 24 Jan 2025 20:28:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=42816607</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=42816607</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42816607</guid></item><item><title><![CDATA[New comment by gwittel in "The deterioration of Google"]]></title><description><![CDATA[
<p>Google search results are full of garbage pages populated with LLM generated content (the pages exist solely to serve ads and capture search results).<p>Search spam is not new, but the use of LLMs simplifies the ability to make pages that look like legit content (increasing the likelihood they’ll show up in search results).</p>
]]></description><pubDate>Sun, 01 Dec 2024 18:55:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=42289952</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=42289952</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42289952</guid></item><item><title><![CDATA[New comment by gwittel in "A good day to trie-hard: saving compute 1% at a time"]]></title><description><![CDATA[
<p>Neat optimization! Would it have been feasible to spend a bit of cpu/memory and tag headers as internal upon the request construction?  That way filtering on output is trivial.</p>
]]></description><pubDate>Tue, 10 Sep 2024 23:38:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=41506754</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=41506754</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41506754</guid></item><item><title><![CDATA[New comment by gwittel in "So you want to scrape like the big boys (2021)"]]></title><description><![CDATA[
<p>They could police their content. Or if they don’t want to, they could meaningfully partner with the security industry - create a “security bots” program, respond to takedown requests in days not months, etc.</p>
]]></description><pubDate>Sun, 28 Apr 2024 14:45:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=40188975</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=40188975</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40188975</guid></item><item><title><![CDATA[New comment by gwittel in "So you want to scrape like the big boys (2021)"]]></title><description><![CDATA[
<p>You can. Sort of.  The good bots list is basically driven by a fixed user agent.  And customers can set their preference to not allow “good bots”.<p>Not so good for security work.<p>It’s similar to their abuse reporting.  They give your info to the site owner.  Gee thanks, that’s just what I want to do.</p>
]]></description><pubDate>Sun, 28 Apr 2024 01:46:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=40185293</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=40185293</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40185293</guid></item><item><title><![CDATA[New comment by gwittel in "So you want to scrape like the big boys (2021)"]]></title><description><![CDATA[
<p>I’m really mixed on this. Anti bot stuff is increasingly a pain point for security research.  Working in this space, I have to work against these systems.<p>Threat actors use Cloudflare and other services to gate their payloads.  That’s a problem for our customers who are trying to find/detect things like brand impersonation and credential phish. Cloudflare has been completely unhelpful.  They just don’t care.</p>
]]></description><pubDate>Sat, 27 Apr 2024 15:50:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=40180879</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=40180879</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40180879</guid></item><item><title><![CDATA[New comment by gwittel in "Show HN: Faking SIMD to Search and Sort Strings 5x Faster"]]></title><description><![CDATA[
<p>Cool library.  This sounds like SWAR (simd within a register).  I’ve seen these techniques give a nice speed up especially when SIMD isn’t available or a pain (eg in Java pre-Panama).<p>One random sample:<p><a href="https://lemire.me/blog/2022/01/21/swar-explained-parsing-eight-digits/?amp" rel="nofollow noreferrer">https://lemire.me/blog/2022/01/21/swar-explained-parsing-eig...</a></p>
]]></description><pubDate>Sat, 26 Aug 2023 22:27:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=37277475</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=37277475</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37277475</guid></item><item><title><![CDATA[New comment by gwittel in "Rapid Covid tests miss 90% of asymptomatic cases"]]></title><description><![CDATA[
<p>I was looking at [1] recently to understand omicron variant positivity length and they cite a few other papers. The article [1] is publicly available. I haven’t checked if all of the others are.<p>* Routsias  JG , Mavrouli  M , Tsoplou  P , Dioikitopoulou  K , Tsakris  A .  Diagnostic performance of rapid antigen tests (RATs) for SARS-CoV-2 and their efficacy in monitoring the infectiousness of COVID-19 patients.    Sci Rep. 2021;11(1):22863. doi:10.1038/s41598-021-02197-z<p>* Currie  DW , Shah  MM , Salvatore  PP ,  et al; CDC COVID-19 Response Epidemiology Field Studies Team.  Relationship of SARS-CoV-2 antigen and reverse transcription PCR positivity for viral cultures.    Emerg Infect Dis. 2022;28(3):717-720. doi:10.3201/eid2803.211747<p>* Korenkov  M , Poopalasingam  N , Madler  M ,  et al.  Evaluation of a rapid antigen test to detect SARS-CoV-2 infection and identify potentially infectious individuals.    J Clin Microbiol. 2021;59(9):e0089621. doi:10.1128/JCM.00896-21<p>* Killingley  B , Mann  A , Kalinova  M ,  et al. Safety, tolerability and viral kinetics during SARS-CoV-2 human challenge in young adults. Nat Med. 2022;28:1031-1041. doi:10.1038/s41591-022-01780-9<p>[1] COVID-19 Symptoms and Duration of Rapid Antigen Test Positivity at a Community Testing and Surveillance Site During Pre-Delta, Delta, and Omicron BA.1 Periods. <a href="https://jamanetwork.com/journals/jamanetworkopen/fullarticle/2797070" rel="nofollow noreferrer">https://jamanetwork.com/journals/jamanetworkopen/fullarticle...</a></p>
]]></description><pubDate>Thu, 13 Jul 2023 13:54:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=36709181</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=36709181</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36709181</guid></item><item><title><![CDATA[New comment by gwittel in "Barebones project to get an Inkplate 10 using WiFi, HTTPS using the Arduino IDE"]]></title><description><![CDATA[
<p>The Inkplate 10 is great. I haven’t gotten a lot done other than toy stuff, but so far it’s been a mostly good experience.<p>Another nice entry point is micropython.  Some of the getting started stuff has gaps but overall nice and simple if you’re more comfortable in Python.  Major libraries have ports so it mostly is an easy dive in.</p>
]]></description><pubDate>Sun, 26 Mar 2023 00:23:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=35309138</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=35309138</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35309138</guid></item><item><title><![CDATA[New comment by gwittel in "An aggressive, stealthy web spider operating from Microsoft IP space"]]></title><description><![CDATA[
<p>In a past job I’ve seen crappy crawlers from badly designed security applications do stuff like this. An an example one customer was using Trend CAS to scan all URLs in their inbound email. This causes big bursts of traffic on our systems.<p>The crawls came from Azure and AWS. Forged UAs, repeat hits in the same URL, etc.</p>
]]></description><pubDate>Thu, 19 Jan 2023 05:53:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=34437154</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=34437154</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34437154</guid></item><item><title><![CDATA[New comment by gwittel in "Abuse prevention is tradecraft"]]></title><description><![CDATA[
<p>Having worked in anti-abuse for nearly 20 years this is spot on.  Even if it were possible, publishing “the algorithm” isn’t going to solve anything. It’s not like it can be published in secret or avoid being instantly obsolete.<p>All of this is an exercise balancing information asymmetry and cost asymmetry.  We don’t want to add more friction than necessary to end users, but somehow must impose enough cost to abusers in order to keep abuse levels low.<p>Unfortunately for us, it generally costs far less for attackers to bypass systems than defenders to sustain a block.<p>As defenders we work to exploit things in our favor - signals and scale.  Signals drive our systems be it ML, heuristics, signatures (or more likely a combination).  Scale lets us spot larger patterns in space or time.  At a cost.  99%+ effective systems are great, but at scale 99% is still not good enough.  Errors in either direction will slip by in the noise; especially targeted attacks.<p>As a secondary step, some systems can provide recourse for errors.  Examples might include temporary or shadow bans, rate limiting, error reporting, etc.  Unfortunately, cost asymmetry comes into play again.  It is far more costly to effectively remediate a mistake than it is to report one.  We’re back to cost asymmetry.<p>All of this is suboptimal. If we had a better solution, it would be in place.  Building and maintaining these systems is expensive and won’t go away unless something better comes along.<p>tl;dr version: assholes ruin it for everyone.</p>
]]></description><pubDate>Wed, 19 Oct 2022 03:19:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=33257182</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=33257182</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33257182</guid></item><item><title><![CDATA[New comment by gwittel in "The Twitter whistleblower story is worse than you think"]]></title><description><![CDATA[
<p>Definitely.  Twitter seems to have not been doing a lot of standard best practices for a company of their size.<p>My intent was pointing out that engineers with high level access to their dev machines is pretty common in tech.  Not that other controls like policy enforcement are also often absent in tech (esp in larger companies).  Hard to know how common that is -- seems unusual at least in big tech.</p>
]]></description><pubDate>Thu, 01 Sep 2022 23:49:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=32684878</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=32684878</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32684878</guid></item><item><title><![CDATA[New comment by gwittel in "The Twitter whistleblower story is worse than you think"]]></title><description><![CDATA[
<p>In reading Mudges' complaint, it really paints the Twitter leadership (esp. Agrawal) as simply not caring about security enough to do anything about it.   Instead you had an org with massive amounts of technical and operational debt, and leadership not willing to invest in it.  There are always tradeoffs between fixing technical debt and building new features.  Twitter leadership chose to ignore (and to some extent, hide) the problem rather than invest.  They certainly aren't unique in having a security plan that is built around hope.<p>Engineers having full control over their dev machines up to and including preventing system updates is not ideal; but not out of the norm for tech.  Poor data access controls, and out of date server fleets (where I'd expect updates to be pretty automated) are far more worrying to me.</p>
]]></description><pubDate>Thu, 01 Sep 2022 20:49:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=32682974</link><dc:creator>gwittel</dc:creator><comments>https://news.ycombinator.com/item?id=32682974</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32682974</guid></item></channel></rss>