<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: i2km</title><link>https://news.ycombinator.com/user?id=i2km</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 18 Apr 2026 10:34:29 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=i2km" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by i2km in "Spending 3 months coding by hand"]]></title><description><![CDATA[
<p>Please keep this slop off HN</p>
]]></description><pubDate>Sat, 18 Apr 2026 00:30:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47812078</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=47812078</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47812078</guid></item><item><title><![CDATA[New comment by i2km in "Quantum computing bombshells that are not April Fools"]]></title><description><![CDATA[
<p>It’s turning into a bit of a grift now. So many crypto agility “consultants “ popping up with their slop graphics. Never mind the fact that even if a relevant quantum computer is built it will still cost the user millions of dollars to break each RSA key pair…</p>
]]></description><pubDate>Thu, 02 Apr 2026 11:19:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47612874</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=47612874</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47612874</guid></item><item><title><![CDATA[New comment by i2km in "Surely the crash of the US economy has to be soon"]]></title><description><![CDATA[
<p>> but the Chinese play long games<p>And yet they got themselves into a demographic death spiral</p>
]]></description><pubDate>Sat, 31 Jan 2026 13:59:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=46836769</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=46836769</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46836769</guid></item><item><title><![CDATA[New comment by i2km in "AI’s impact on engineering jobs may be different than expected"]]></title><description><![CDATA[
<p>Re displacing freelance translation, yes - it can displace the 95% of cases where 95% accuracy is enough. Like you mention though, for diplomatic translations, court proceedings, pacemaker manuals etc you're still going to need a human at least checking every line since the cost of any mistake is so high</p>
]]></description><pubDate>Fri, 30 Jan 2026 03:36:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=46820260</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=46820260</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46820260</guid></item><item><title><![CDATA[New comment by i2km in "Prism"]]></title><description><![CDATA[
<p>This is going to be the concrete block which finally breaks the back of the academic peer review system, i.e. it's going to be a DDoS attack on a system which didn't even handle the load before LLMs.<p>Maybe we'll need to go back to some sort of proof-of-work system, i.e. only accepting physical mailed copies of manuscripts, possibly hand-written...</p>
]]></description><pubDate>Wed, 28 Jan 2026 06:32:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=46791799</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=46791799</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46791799</guid></item><item><title><![CDATA[New comment by i2km in "Prism"]]></title><description><![CDATA[
<p>LaTeX was one of the last bastions against AI slop. Sadly it's now fallen too. Is there any standardised non-AI disclaimer format which is gaining use?</p>
]]></description><pubDate>Wed, 28 Jan 2026 06:25:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=46791773</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=46791773</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46791773</guid></item><item><title><![CDATA[New comment by i2km in "The Great Code Decoupling – The Coming AI Bifurcation in Software Quality"]]></title><description><![CDATA[
<p>A blog post looking at developments in the translation market and projecting them onto the future of software engineering. TLDR: software is already bifurcating into low-grade consumer slop where AI lowers expectations, but serious B2B and enterprise software is diverging and (should be) getting better as a result of AI use</p>
]]></description><pubDate>Tue, 27 Jan 2026 14:51:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=46780727</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=46780727</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46780727</guid></item><item><title><![CDATA[The Great Code Decoupling – The Coming AI Bifurcation in Software Quality]]></title><description><![CDATA[
<p>Article URL: <a href="https://i2km.com/bifurcation.html">https://i2km.com/bifurcation.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46780726">https://news.ycombinator.com/item?id=46780726</a></p>
<p>Points: 2</p>
<p># Comments: 1</p>
]]></description><pubDate>Tue, 27 Jan 2026 14:51:48 +0000</pubDate><link>https://i2km.com/bifurcation.html</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=46780726</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46780726</guid></item><item><title><![CDATA[New comment by i2km in "Constant-Time Code: The Pessimist Case [pdf]"]]></title><description><![CDATA[
<p>One whole technique not mentioned in the paper or comments is bitslicing. For non-branching code (e.g. symmetric ciphers) it's guaranteed constant-time and it would be a remarkable compiler indeed which could introduce optimizations and timing variations to bit-sliced code...</p>
]]></description><pubDate>Wed, 12 Mar 2025 19:55:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=43347029</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=43347029</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43347029</guid></item><item><title><![CDATA[New comment by i2km in "Constant-Time Code: The Pessimist Case [pdf]"]]></title><description><![CDATA[
<p>Actually, the link you provide seems to support the parent comment's suggestion, rather than detract from it.<p>The previous comment was suggesting making sure that every code path takes the same amount of time, not adding a random delay (which doesn't work).<p>And while I agree that power-analysis attacks etc. are still going to apply, the over-arching context here is just timing-analysis</p>
]]></description><pubDate>Wed, 12 Mar 2025 19:52:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=43347007</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=43347007</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43347007</guid></item><item><title><![CDATA[New comment by i2km in "Apple pulls data protection tool after UK government security row"]]></title><description><![CDATA[
<p>1984 could only ever have been written by an Englishman</p>
]]></description><pubDate>Fri, 21 Feb 2025 18:46:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=43131319</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=43131319</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43131319</guid></item><item><title><![CDATA[New comment by i2km in "Apple pulls data protection tool after UK government security row"]]></title><description><![CDATA[
<p>You get the hell out and emigrate. I did so last year. It's not going to get better chap</p>
]]></description><pubDate>Fri, 21 Feb 2025 18:07:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=43130835</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=43130835</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43130835</guid></item><item><title><![CDATA[New comment by i2km in "Chinese Break RSA"]]></title><description><![CDATA[
<p>A quick rule-of-thumb: if 'military-grade encryption' is mentioned, the author likely has no domain knowledge.<p>Further the article claims that SPNs are used in RSA... which is completely wrong and indicates no domain knowledge.<p>The article has completely mis-interpreted the paper. The paper is written in Chinese but with an English abstract - the article seems to have just pulled keywords out.<p>I wonder whether a LLM hallucination is at play somewhere???<p>The article does not mention AES</p>
]]></description><pubDate>Tue, 15 Oct 2024 14:20:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=41848913</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=41848913</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41848913</guid></item><item><title><![CDATA[New comment by i2km in "Hezbollah pager explosions kill several people in Lebanon"]]></title><description><![CDATA[
<p>So, if the method was to substitute the batteries for ones containing explosives, then how were they triggered simultaneously?<p>Wouldn't this also require some additional HW/SW in the pagers to trigger the devices? Otherwise, if it was just battery terminals connecting to the battery, how would a remote signal trigger them?<p>Or maybe it's as simple as the adulterated batteries containing timers and thus not needing external triggering?</p>
]]></description><pubDate>Tue, 17 Sep 2024 17:28:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=41570253</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=41570253</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41570253</guid></item><item><title><![CDATA[New comment by i2km in "The Generational Transition to Programmable Cryptography"]]></title><description><![CDATA[
<p>Also curious that any mention of confidential computing is avoided throughout the piece</p>
]]></description><pubDate>Sat, 31 Aug 2024 09:59:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=41407688</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=41407688</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41407688</guid></item><item><title><![CDATA[New comment by i2km in "The Generational Transition to Programmable Cryptography"]]></title><description><![CDATA[
<p>The adoption of advanced cryptography has struggled for decades. It’s a long-running cause of frustration to cryptographers, i.e. “why do we keep on developing more and more advanced schemes yet the real world doesn’t use them?”<p>This sentiment runs through this piece as an undercurrent.<p>Part of the frustration comes from the fact, which is emphasised throughout the piece, that all these things are possible in real life. The utopia of autonomous MPC and ZK agents running obfuscated programs to prove identity attributes, vote, etc is all possible, if only we rewrite the entire internet.<p>The stumbling block, as ever, is human nature. This utopia would decay in just the same way that the bitcoin utopia did, moving from a perfect libertarian idea for an incorruptible currency to a cesspit of fraud, manipulation and speculation.<p>In Moxie Marlinspike’s article on web 3, he makes the case that the decentralisation promises of web 3 will inevitably decay and be reshaped as a new form of centralisation, leaving us in a potentially worse place than before. Pretty much the same arguments apply here.<p>Nonetheless, it’s an interesting read. But it would be fascinating to see this approached from a human perspective, I.e. “what are the compelling adoption vectors?” and “how can we avoid re-centralisation?”</p>
]]></description><pubDate>Sat, 31 Aug 2024 09:52:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=41407662</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=41407662</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41407662</guid></item><item><title><![CDATA[New comment by i2km in "The UK can go back to being the richest country in the world"]]></title><description><![CDATA[
<p>Simple answer: no. The economy of SE England is largely comprised of:<p>1. Shuffling money around
2. Socialist-level ponzi government spending
3. A combination of property flipping and high-end property overseas sales used for tax evasion<p>Innovation-wise, always looking for the easy wins without the hard work, unlike the US.<p>As a Brit and former resident, happy to have emigrated and escaped the >50% (soon to be increased) tax rates.</p>
]]></description><pubDate>Wed, 10 Jul 2024 04:32:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=40923729</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=40923729</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40923729</guid></item><item><title><![CDATA[New comment by i2km in "The end of cool small cars"]]></title><description><![CDATA[
<p>As my modest contribution to the battle against SUVs/crossovers/other bloat, I am attempting to popularise the term ‘bimbo box’ - the credit of which belongs to Neal Stephenson’s Snow Crash</p>
]]></description><pubDate>Wed, 30 Aug 2023 17:10:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=37325350</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=37325350</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37325350</guid></item><item><title><![CDATA[New comment by i2km in "Use Gröbner bases to solve polynomial equations"]]></title><description><![CDATA[
<p>Gröbner bases are powerful but do not scale.<p>In doctoral school I spent some time applying the state-of-the-art methods to trying to break lightweight symmetric ciphers. The idea was that the system of polynomials generated from a number of plaintext/ciphertext pairs might be solvable via Gröbner bases methods if the number of rounds of the cipher was low enough.<p>Quickly ran out of steam after a couple of rounds and ~200 polynomials or thereabouts (doubly exponential)</p>
]]></description><pubDate>Wed, 26 Apr 2023 07:10:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=35710416</link><dc:creator>i2km</dc:creator><comments>https://news.ycombinator.com/item?id=35710416</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35710416</guid></item></channel></rss>