<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: hellojesus</title><link>https://news.ycombinator.com/user?id=hellojesus</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 13 Apr 2026 07:44:06 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=hellojesus" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by hellojesus in "TSA lines are so out of control that travelers are hiring line-sitters"]]></title><description><![CDATA[
<p>Thanks for the explanation. It sounds like a neat system.</p>
]]></description><pubDate>Mon, 30 Mar 2026 12:06:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47573198</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47573198</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47573198</guid></item><item><title><![CDATA[New comment by hellojesus in "TSA lines are so out of control that travelers are hiring line-sitters"]]></title><description><![CDATA[
<p>Fascinating. Is there something specific about those temples that draws the crowds, like something akin to a famous cathedral? Must worship take place in a temple? I don't know how the religion works but did get to visit a local temple once with some coworkers and enjoyed the atmosphere.</p>
]]></description><pubDate>Sun, 29 Mar 2026 15:16:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47563881</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47563881</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47563881</guid></item><item><title><![CDATA[New comment by hellojesus in "The Oxford Comma – Why and Why Not (2024)"]]></title><description><![CDATA[
<p>Or just switch the order if Betty is the maid and you don't want to provide additional context:<p>```
They went to Oregon with a cook and Betty, a maid.
```</p>
]]></description><pubDate>Thu, 26 Mar 2026 21:50:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47536265</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47536265</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47536265</guid></item><item><title><![CDATA[New comment by hellojesus in "4Chan mocks £520k fine for UK online safety breaches"]]></title><description><![CDATA[
<p>There are quite explicit constitutional limits to his ability to be elected to a third term. Short of a mitary-style takeover, there is nothing he can do to change that (discounting the scenario of constitutional amendment).</p>
]]></description><pubDate>Fri, 20 Mar 2026 16:35:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47457006</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47457006</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47457006</guid></item><item><title><![CDATA[New comment by hellojesus in "Google details new 24-hour process to sideload unverified Android apps"]]></title><description><![CDATA[
<p>Isn't that more reason to go to your bank's website: to download the apk and then verify the hash of the downloaded apk before installing it? That would make me way more comfortable than the current system of "pray this app on the play store is actually my bank's".</p>
]]></description><pubDate>Fri, 20 Mar 2026 13:15:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47454072</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47454072</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47454072</guid></item><item><title><![CDATA[New comment by hellojesus in "Hisense TVs add unskippable startup ads before live TV"]]></title><description><![CDATA[
<p>What happens when they move from default dns to ech with pinned dns servers? I was reading about ech a bit yesterday so I could keep up with apps trying to circumvent dns filtering on my kids' devices.<p>Usually I require a root cert so devices can have their traffic inspected or be isolated into an unsafe network where most nonessential traffic is blocked by default. I suppose letting an iot device connect will become more risky in the future when I can't control the dns resolver or can't confidently block requests through dns alone.</p>
]]></description><pubDate>Tue, 10 Mar 2026 15:22:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=47324509</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47324509</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47324509</guid></item><item><title><![CDATA[New comment by hellojesus in "Hisense TVs add unskippable startup ads before live TV"]]></title><description><![CDATA[
<p>It's either because the non-ad-driven tvs cost more, resulting in too few sales to sustain (because no lifetime revenue from data sales) or the lifetime revenue from data sales is so profitable that companies take the risk on being undercut by a market entrant that will sell dumb tvs.<p>My guess is that the vast majority of people will trade data for a cheaper price point every time (my wife is certainly one of these people), so the market just can't support the volume of sales necessary to make the price point of dumb tvs competitive.</p>
]]></description><pubDate>Tue, 10 Mar 2026 15:05:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47324274</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47324274</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47324274</guid></item><item><title><![CDATA[New comment by hellojesus in "Online age-verification tools for child safety are surveilling adults"]]></title><description><![CDATA[
<p>Doesn't the act of notifying >16 today and >18 tomorrow leak birthdates?</p>
]]></description><pubDate>Tue, 10 Mar 2026 14:37:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47323892</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47323892</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47323892</guid></item><item><title><![CDATA[New comment by hellojesus in "System76 on Age Verification Laws"]]></title><description><![CDATA[
<p>You'll just get the proliferation of the scammy "free proxies" that claim to host virtual vms for you that are actual vms that just log all your data.</p>
]]></description><pubDate>Mon, 09 Mar 2026 18:29:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47313246</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47313246</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47313246</guid></item><item><title><![CDATA[New comment by hellojesus in "System76 on Age Verification Laws"]]></title><description><![CDATA[
<p>Yes, and the next battle is ech-pinned params in apps. The browser can at least single that ech isn't supported. For apps, you'll just have to strip the ech and downgrade the connection and live with the server dropping you. But that's fine. My kids don't need tiktok if I, the parent, can't decrypt the info.</p>
]]></description><pubDate>Mon, 09 Mar 2026 17:52:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47312636</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47312636</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47312636</guid></item><item><title><![CDATA[New comment by hellojesus in "System76 on Age Verification Laws"]]></title><description><![CDATA[
<p>I am a parent. The devices my child uses have root certs that allow me to decrypt traffic that must pass through my proxy to be relayed to the internet. Voila. Problem solved with current tech.</p>
]]></description><pubDate>Fri, 06 Mar 2026 18:47:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47279293</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47279293</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47279293</guid></item><item><title><![CDATA[New comment by hellojesus in "System76 on Age Verification Laws"]]></title><description><![CDATA[
<p>But what happens when a nefarious actor fills the void and publishes a root-kited VM and marks it as safe for children? These restrictions breed black markets that usually cause even more harm.</p>
]]></description><pubDate>Fri, 06 Mar 2026 18:46:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47279271</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47279271</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47279271</guid></item><item><title><![CDATA[New comment by hellojesus in "System76 on Age Verification Laws"]]></title><description><![CDATA[
<p>Agreed. Which is why I think the OS level is dumb. Kids can just live boot or launch a vm or keylog their parents' account.<p>If it's windows, they can just live boot into the OS and get access to pretty much all the files anyway, if the parent didn't encrypt things.<p>My point is, if the implementation is trivial to bypass, why do we need this legislation? Just let the parents use the existing tools we have and parent.</p>
]]></description><pubDate>Fri, 06 Mar 2026 18:44:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47279241</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47279241</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47279241</guid></item><item><title><![CDATA[New comment by hellojesus in "System76 on Age Verification Laws"]]></title><description><![CDATA[
<p>Lol I remember back in the day when we used to replace the windows logo during boot with our own bitmaps (if I can appropriately remember the file format) at school. We showed kids and suddenly every computer was booting with unexpected media. Admins were not pleased.<p>But the real fun began when we showed people how to set bios passwords and that cascaded into kids rendering an entire classroom of computers unbootable.<p>And then there was the time I thought I was really clever because I realized I could open arbitrary files in notepad, so I attempted to edit save files for a learn-to-type program by replacing the score with my own. It seemed to work so I told my friends and then they started copying the same save file into their program files. I don't remember exactly what happened, but I do know the UI update did not propagate to the actual scores and also it introduced a bug into the prodgram which would cause it to crash at distant future epochs, so we destroyed the program for everyone, not just our user profiles. There was an investigation and I think they gave up because the same bad file somehow was on everyone's computer and everyone just told them they got the file from someone else and there was no root of the chain.<p>This is all to say, any bypass will be identified and implemented at the speed of virality.</p>
]]></description><pubDate>Fri, 06 Mar 2026 18:42:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47279215</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47279215</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47279215</guid></item><item><title><![CDATA[New comment by hellojesus in "System76 on Age Verification Laws"]]></title><description><![CDATA[
<p>This is where parents come into play...</p>
]]></description><pubDate>Fri, 06 Mar 2026 18:06:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47278685</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47278685</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47278685</guid></item><item><title><![CDATA[New comment by hellojesus in "System76 on Age Verification Laws"]]></title><description><![CDATA[
<p>The law necessarily exists for parents that aren't tech literate, since we already have the ability to monitor and lock kids out from adult content.<p>Do we really think parents will notice that a kid has installed a specific executable? The purpose of this law is to allow parents to outsource caring out which executables are safe, so there is no reason they would check.<p>Plus a kid can just live boot from a USB if the parent doesn't lock the bios, which would give them an ephemeral session to do whatever they want without the parent knowing unless caught-in-the-act.</p>
]]></description><pubDate>Fri, 06 Mar 2026 17:58:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47278594</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47278594</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47278594</guid></item><item><title><![CDATA[New comment by hellojesus in "System76 on Age Verification Laws"]]></title><description><![CDATA[
<p>And some adults will lie too, assuming they don't need adult content, to avoid being tracked for advertisements, if laws exist that prevent ad targetting on some demo, say <13 year Olds.</p>
]]></description><pubDate>Fri, 06 Mar 2026 17:53:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=47278523</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47278523</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47278523</guid></item><item><title><![CDATA[New comment by hellojesus in "System76 on Age Verification Laws"]]></title><description><![CDATA[
<p>Wait until they learn about live booting, VMs, keyloggers, etc. The goal of this bill is to set precedent that this can be regulated by the gov. Five years down the line they will complain it's not working and move to require tpm-based remote attlestation to prove the software isn't altered in order the authenticate with an isp.</p>
]]></description><pubDate>Fri, 06 Mar 2026 17:51:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47278508</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47278508</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47278508</guid></item><item><title><![CDATA[New comment by hellojesus in "System76 on Age Verification Laws"]]></title><description><![CDATA[
<p>I agree with you, but then the implication becomes, "any platform that allows user content must scan all content posted or uploaded by the user to determine if any of it suggests they are a minor".<p>I adds a bit of burden to all sites under the threat of civil penalties. Say I own a site that allows user posts like HN. If someone mentions they're in grade school in any post and later starts receiving links to adult sites in their DMs, now I'm liable.</p>
]]></description><pubDate>Fri, 06 Mar 2026 17:47:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47278434</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47278434</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47278434</guid></item><item><title><![CDATA[New comment by hellojesus in "System76 on Age Verification Laws"]]></title><description><![CDATA[
<p>But why do we need it at the os level? Couldn't a parent just set a header in the browser for their kid and be done with it?</p>
]]></description><pubDate>Fri, 06 Mar 2026 17:41:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47278333</link><dc:creator>hellojesus</dc:creator><comments>https://news.ycombinator.com/item?id=47278333</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47278333</guid></item></channel></rss>