<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: inkysigma</title><link>https://news.ycombinator.com/user?id=inkysigma</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 02 May 2026 10:28:04 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=inkysigma" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by inkysigma in "China blocks Meta's acquisition of AI startup Manus"]]></title><description><![CDATA[
<p>I'm curious how this view fits in with BERT or the T5 release which prior to the current LLM craze were the de facto language models for use in pretty much any tasks. Was this a position that would've otherwise grown without the llama release?</p>
]]></description><pubDate>Mon, 27 Apr 2026 21:33:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47927603</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47927603</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47927603</guid></item><item><title><![CDATA[New comment by inkysigma in "A Boy That Cried Mythos: Verification Is Collapsing Trust in Anthropic"]]></title><description><![CDATA[
<p>Some of those organizations (Linux and Mozilla) work on open source code for which they are already trained on. For clients like Apple, they almost surely have agreements to not do that.</p>
]]></description><pubDate>Thu, 23 Apr 2026 08:41:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47873494</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47873494</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47873494</guid></item><item><title><![CDATA[New comment by inkysigma in "Google broke its promise to me – now ICE has my data"]]></title><description><![CDATA[
<p>Well it did contain a request to not notify according to that same letter. I suppose that brings up several questions.<p>1. Does that mean the same thing in the ToS?<p>2. How valid are these requests?</p>
]]></description><pubDate>Wed, 15 Apr 2026 23:00:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47786444</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47786444</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47786444</guid></item><item><title><![CDATA[New comment by inkysigma in "Google broke its promise to me – now ICE has my data"]]></title><description><![CDATA[
<p>Depends on how legitimate you consider an administrative warrant and how willingly you think complying with one is.<p>On a more practical level, forcing them to go to court might not be much better. If this went to a FISA court, those are essentially rubber stamps and give nearly 100% approval.</p>
]]></description><pubDate>Wed, 15 Apr 2026 22:40:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47786283</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47786283</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47786283</guid></item><item><title><![CDATA[New comment by inkysigma in "EFF is leaving X"]]></title><description><![CDATA[
<p>His anti censorship stance isn't necessarily born out by the data:<p><a href="https://www.washingtonpost.com/technology/2024/09/25/elon-musk-x-twitter-free-speech-government-requests/" rel="nofollow">https://www.washingtonpost.com/technology/2024/09/25/elon-mu...</a></p>
]]></description><pubDate>Thu, 09 Apr 2026 18:20:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47707432</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47707432</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47707432</guid></item><item><title><![CDATA[New comment by inkysigma in "EFF is leaving X"]]></title><description><![CDATA[
<p>X under Musk has sustained more government takedown requests.<p><a href="https://www.washingtonpost.com/technology/2024/09/25/elon-musk-x-twitter-free-speech-government-requests/" rel="nofollow">https://www.washingtonpost.com/technology/2024/09/25/elon-mu...</a></p>
]]></description><pubDate>Thu, 09 Apr 2026 18:18:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47707404</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47707404</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47707404</guid></item><item><title><![CDATA[New comment by inkysigma in "Epoch confirms GPT5.4 Pro solved a frontier math open problem"]]></title><description><![CDATA[
<p>I think in this context, scaffolds are generally the harness that surrounds the actual model. For example, any tools, ways to lay out tasks, or auto-critiquing methods.<p>I think there's quite a bit of variance in model performance depending on the scaffold so comparisons are always a bit murky.</p>
]]></description><pubDate>Tue, 24 Mar 2026 03:21:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47498270</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47498270</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47498270</guid></item><item><title><![CDATA[New comment by inkysigma in "Illinois Introducing Operating System Account Age Bill"]]></title><description><![CDATA[
<p>Actually given boot chain protection, this will probably get harder as time goes on but even assuming some kids are able to, this is clearly definable as a user error: the fault lies with the kid and as a parent you need to think about your threat model.<p>Right now, it's not even clear how to create parental controls at a reasonable level so there's no clear path for what to do or how to respond.</p>
]]></description><pubDate>Tue, 17 Mar 2026 19:04:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47416789</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47416789</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47416789</guid></item><item><title><![CDATA[New comment by inkysigma in "Illinois Introducing Operating System Account Age Bill"]]></title><description><![CDATA[
<p>Except none of these bills (California or the one in question) as currently written require an ID to actually be verified, merely that the user provide an age. This seems intentional as it's seems to solve the user journey where a parent is able to set a reasonable default by simply setting up an associated account age at account creation. It's effectively just standardizing parental controls.<p>I think this is a reasonable balance without being invasive as there's now a defined path to do reasonable parenting without being a sysadmin and operators cannot claim ignorance because the user input a random birthday. The information leaked is also fairly minimal so even assuming ads are using that as signal, it doesn't add too many bits to tracking compared to everything else. I think the California bill needs a bit of work to clarify what exactly this applies to (e.g. exclude servers) but I also think this is a reasonable framework to satisfy this debate.<p>I've seen the argument that this could lead to actual age verification but I think that's a line that's clearly definable and could be fought separately.</p>
]]></description><pubDate>Tue, 17 Mar 2026 18:54:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47416653</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47416653</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47416653</guid></item><item><title><![CDATA[New comment by inkysigma in "Age Verification Lobbying: Dark Money, Model Legislation, Institutional Capture"]]></title><description><![CDATA[
<p>I think this is the third time this has effectively been posted see:<p><a href="https://news.ycombinator.com/item?id=47362528">https://news.ycombinator.com/item?id=47362528</a><p><a href="https://news.ycombinator.com/item?id=47365597">https://news.ycombinator.com/item?id=47365597</a></p>
]]></description><pubDate>Sat, 14 Mar 2026 09:45:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47374965</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47374965</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47374965</guid></item><item><title><![CDATA[New comment by inkysigma in "Meta Platforms: Lobbying, dark money, and the App Store Accountability Act"]]></title><description><![CDATA[
<p>Some of these are also just like really weak? One of them for example seems to be some random employee at FB donating ~$1k to a politician and calling that a link. The entire "Proven Findings" is all over the place and provides no coherence. I don't think it's a particular secret that Meta would prefer age verification be done at the OS level so I'm not really sure what the added claim here is.<p>> A Meta employee (Jake Levine, Product Manager) contributed $1,175 to ASAA sponsor Matt Ball's campaign apparatus on June 2, 2025. Source: Colorado TRACER bulk data.<p>> No direct Meta PAC contributions to any ASAA sponsor across Utah, Louisiana, Texas, or Colorado. Source: FollowTheMoney.org multi-state search.<p>While it is true that Meta has funded groups that advocate for age verification, a lot of them also appear to have other actors so it's not like this is some pure Meta thing as some of the other commenters are suggesting.</p>
]]></description><pubDate>Fri, 13 Mar 2026 19:14:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47368428</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47368428</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47368428</guid></item><item><title><![CDATA[New comment by inkysigma in "I'm reluctant to verify my identity or age for any online services"]]></title><description><![CDATA[
<p>Depending on the implementation, I could see that having rate limiting effects. There're only finitely many IDs so scaling sockpuppeting will saturate these IDs quickly but it's quite easy to spin up a new anonymous account. For example, I think the EU ID system has an upcoming way to create pseudo anonymous identifiers that can identify a user per website.<p>This presents the problem of governments being able to gatekeep speech which I am quite uncomfortable with but maybe there's some safeguard within the eIDAS proposal that makes this idea incorrect?</p>
]]></description><pubDate>Tue, 03 Mar 2026 20:07:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47238173</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47238173</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47238173</guid></item><item><title><![CDATA[New comment by inkysigma in "I'm losing the SEO battle for my own open source project"]]></title><description><![CDATA[
<p>Just an FYI, but I don't know if being in the website field of GitHub really helps since there's a rel nofollow on the link.</p>
]]></description><pubDate>Tue, 03 Mar 2026 19:22:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47237468</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47237468</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47237468</guid></item><item><title><![CDATA[New comment by inkysigma in "We Will Be Divided"]]></title><description><![CDATA[
<p>I mean in the sense that they seem to literally be random names. I don't even think they're people associated with Palantir in anyway.</p>
]]></description><pubDate>Sat, 28 Feb 2026 10:49:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47193529</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47193529</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47193529</guid></item><item><title><![CDATA[New comment by inkysigma in "We Will Be Divided"]]></title><description><![CDATA[
<p>I'm assuming this is satire but I'm wondering why include names of seemingly random people? Why not leave it empty or make it signed by high level known executives.</p>
]]></description><pubDate>Sat, 28 Feb 2026 10:44:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47193497</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47193497</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47193497</guid></item><item><title><![CDATA[New comment by inkysigma in "The United States and Israel have launched a major attack on Iran"]]></title><description><![CDATA[
<p>Once that side channel was found, it was kind of inevitable it would be plugged. Even under a normal administration, that's an opsec leak.</p>
]]></description><pubDate>Sat, 28 Feb 2026 08:45:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=47192421</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47192421</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47192421</guid></item><item><title><![CDATA[New comment by inkysigma in "Don't use passkeys for encrypting user data"]]></title><description><![CDATA[
<p>Passkeys are an open standard? You might as well argue against SSH keys.</p>
]]></description><pubDate>Sat, 28 Feb 2026 04:07:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47190291</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47190291</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47190291</guid></item><item><title><![CDATA[New comment by inkysigma in "We Will Not Be Divided"]]></title><description><![CDATA[
<p>I'm not completely familiar with bidding procedures but don't bidding procedures usually have requirements? Why not just list a requirement of unrestricted usage? Or state, we require models to be available for AI murder drones or whatever. Anthropic then can't bid and there's no need to designate them a supply chain risk.</p>
]]></description><pubDate>Sat, 28 Feb 2026 02:42:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47189490</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47189490</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47189490</guid></item><item><title><![CDATA[New comment by inkysigma in "We Will Not Be Divided"]]></title><description><![CDATA[
<p>What are you talking about? Google employees and the corporation itself in particular overwhelmingly donated to the Harris campaign.<p><a href="https://www.opensecrets.org/orgs/alphabet-inc/recipients?id=d000067823" rel="nofollow">https://www.opensecrets.org/orgs/alphabet-inc/recipients?id=...</a><p>The corporation gave millions _after_ Trump had already won. If your criticism is that, then that does not apply to the people signing.</p>
]]></description><pubDate>Sat, 28 Feb 2026 02:37:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47189448</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47189448</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47189448</guid></item><item><title><![CDATA[New comment by inkysigma in "We Will Not Be Divided"]]></title><description><![CDATA[
<p>I think the bigger insanity here is the labeling of a supply chain risk. It prohibits DoD agencies and contractors from using Anthropic services. It'd be one thing if the DoD simply didn't use Anthropic. It's another when it actively attempts to isolate Anthropic for political reasons.</p>
]]></description><pubDate>Sat, 28 Feb 2026 02:28:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47189375</link><dc:creator>inkysigma</dc:creator><comments>https://news.ycombinator.com/item?id=47189375</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47189375</guid></item></channel></rss>