<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: jakobdabo</title><link>https://news.ycombinator.com/user?id=jakobdabo</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 06 Apr 2026 06:51:07 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=jakobdabo" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[Python 'Chardet' Package Replaced with LLM-Generated Clone, Re-Licensed]]></title><description><![CDATA[
<p>Article URL: <a href="https://developers.slashdot.org/story/26/03/06/1614252/python-chardet-package-replaced-with-llm-generated-clone-re-licensed">https://developers.slashdot.org/story/26/03/06/1614252/python-chardet-package-replaced-with-llm-generated-clone-re-licensed</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47280877">https://news.ycombinator.com/item?id=47280877</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 06 Mar 2026 20:49:28 +0000</pubDate><link>https://developers.slashdot.org/story/26/03/06/1614252/python-chardet-package-replaced-with-llm-generated-clone-re-licensed</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=47280877</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47280877</guid></item><item><title><![CDATA[New comment by jakobdabo in "FBI couldn't get into WaPo reporter's iPhone because Lockdown Mode enabled"]]></title><description><![CDATA[
<p>> I believe secrets are still encrypted at this stage similar to cold boot.<p>Does this mean that the Signal desktop application doesn't lock/unlock its (presumably encrypted) database with a secret when locking/unlocking the laptop?</p>
]]></description><pubDate>Wed, 04 Feb 2026 22:21:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=46892689</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=46892689</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46892689</guid></item><item><title><![CDATA[Image Generation (Experimental)]]></title><description><![CDATA[
<p>Article URL: <a href="https://ollama.com/blog/image-generation">https://ollama.com/blog/image-generation</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46759763">https://news.ycombinator.com/item?id=46759763</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Sun, 25 Jan 2026 23:27:43 +0000</pubDate><link>https://ollama.com/blog/image-generation</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=46759763</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46759763</guid></item><item><title><![CDATA[New comment by jakobdabo in "Qwen3-TTS family is now open sourced: Voice design, clone, and generation"]]></title><description><![CDATA[
<p>Can anyone please provide directions/links to tools that can be run locally, and that take an audio recording of a voice as an input, and produce an output with the same voice saying the same thing with the same intonations, but with a fixed/changed accent?<p>This is needed for processing an indie game's voice recordings, where the voice actors weren't native speakers and had some accent.</p>
]]></description><pubDate>Thu, 22 Jan 2026 19:30:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=46724042</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=46724042</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46724042</guid></item><item><title><![CDATA[New comment by jakobdabo in "Bluetooth Headphone Jacking: A Key to Your Phone [video]"]]></title><description><![CDATA[
<p>This is a good article: <a href="https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/" rel="nofollow">https://insinuator.net/2025/12/bluetooth-headphone-jacking-f...</a></p>
]]></description><pubDate>Thu, 01 Jan 2026 15:16:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=46454740</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=46454740</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46454740</guid></item><item><title><![CDATA[A biological 0-day? Threat-screening tools may miss AI-designed proteins]]></title><description><![CDATA[
<p>Article URL: <a href="https://arstechnica.com/science/2025/10/do-ai-designed-proteins-create-a-biosecurity-vulnerability/">https://arstechnica.com/science/2025/10/do-ai-designed-proteins-create-a-biosecurity-vulnerability/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45468575">https://news.ycombinator.com/item?id=45468575</a></p>
<p>Points: 7</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 03 Oct 2025 22:28:42 +0000</pubDate><link>https://arstechnica.com/science/2025/10/do-ai-designed-proteins-create-a-biosecurity-vulnerability/</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=45468575</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45468575</guid></item><item><title><![CDATA[Web Browser telemetry – 2025 edition]]></title><description><![CDATA[
<p>Article URL: <a href="https://sizeof.cat/post/web-browser-telemetry-2025-edition/">https://sizeof.cat/post/web-browser-telemetry-2025-edition/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43756167">https://news.ycombinator.com/item?id=43756167</a></p>
<p>Points: 5</p>
<p># Comments: 1</p>
]]></description><pubDate>Mon, 21 Apr 2025 20:34:37 +0000</pubDate><link>https://sizeof.cat/post/web-browser-telemetry-2025-edition/</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=43756167</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43756167</guid></item><item><title><![CDATA[macOS 15.4 Beta 'Hides' Amount of Storage Used by Apple Intelligence]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.macrumors.com/2025/03/11/macos-15-4-beta-hides-storage-apple-intelligence/">https://www.macrumors.com/2025/03/11/macos-15-4-beta-hides-storage-apple-intelligence/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43334518">https://news.ycombinator.com/item?id=43334518</a></p>
<p>Points: 6</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 11 Mar 2025 16:55:58 +0000</pubDate><link>https://www.macrumors.com/2025/03/11/macos-15-4-beta-hides-storage-apple-intelligence/</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=43334518</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43334518</guid></item><item><title><![CDATA[Ask HN: Privacy-Friendly Car?]]></title><description><![CDATA[
<p>Hi HN. In light of https://news.ycombinator.com/item?id=42803279 (Hacking Subaru: Tracking and Controlling Cars via the Starlink Admin Panel) and some revelations in the comments, I would like to ask if anybody here is aware of any modern electric car that can be used without ever connecting it to the network?<p>It's also important that the car shouldn't collect telemetry and location data and wait for the first opportunity (like gaining network access while being serviced) to upload that all.</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=42807512">https://news.ycombinator.com/item?id=42807512</a></p>
<p>Points: 9</p>
<p># Comments: 6</p>
]]></description><pubDate>Thu, 23 Jan 2025 20:04:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=42807512</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=42807512</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42807512</guid></item><item><title><![CDATA[New comment by jakobdabo in "Show HN: kew – A Terminal Music Player for Linux"]]></title><description><![CDATA[
<p>I see what you've done there!<p><pre><code>        int randomNumber = getRandomNumber(1, 808);
        if (randomNumber == 808)
                printGlimmeringText(text, nerdFontText, lastRowColor);
</code></pre>
Nice project!</p>
]]></description><pubDate>Fri, 04 Oct 2024 19:51:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=41744988</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=41744988</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41744988</guid></item><item><title><![CDATA[New comment by jakobdabo in "PC Floppy Copy Protection: Softguard Superlok"]]></title><description><![CDATA[
<p>I found two versions at <a href="https://archive.org" rel="nofollow">https://archive.org</a>, there's a PDF manual too.</p>
]]></description><pubDate>Sun, 08 Sep 2024 14:04:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=41480475</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=41480475</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41480475</guid></item><item><title><![CDATA[The end of Patreon? Google is implementing micro-payments into Chrome]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.ghacks.net/2024/08/07/the-end-of-patreon-google-is-implementing-micro-payments-into-chrome/">https://www.ghacks.net/2024/08/07/the-end-of-patreon-google-is-implementing-micro-payments-into-chrome/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41206308">https://news.ycombinator.com/item?id=41206308</a></p>
<p>Points: 3</p>
<p># Comments: 1</p>
]]></description><pubDate>Fri, 09 Aug 2024 23:41:14 +0000</pubDate><link>https://www.ghacks.net/2024/08/07/the-end-of-patreon-google-is-implementing-micro-payments-into-chrome/</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=41206308</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41206308</guid></item><item><title><![CDATA[New comment by jakobdabo in "Bluesky announces data federation for self hosters"]]></title><description><![CDATA[
<p>That's great, thanks!<p>> It's also not required on the Bluesky service any longer, in most cases.<p>That's also nice to hear - when last time I tried to register an account (shortly after the free registration launch) the phone number field in the registration form was marked as required, if I am not mistaken.</p>
]]></description><pubDate>Thu, 22 Feb 2024 19:15:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=39471663</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=39471663</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39471663</guid></item><item><title><![CDATA[New comment by jakobdabo in "Bluesky announces data federation for self hosters"]]></title><description><![CDATA[
<p>Congratulations on the release! If I may ask a question - is it possible to register an account without a phone number on a 3-rd party server?</p>
]]></description><pubDate>Thu, 22 Feb 2024 19:07:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=39471554</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=39471554</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39471554</guid></item><item><title><![CDATA[New WiFi Authentication Vulnerabilities Discovered]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.top10vpn.com/research/wifi-vulnerabilities/">https://www.top10vpn.com/research/wifi-vulnerabilities/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=39361819">https://news.ycombinator.com/item?id=39361819</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 13 Feb 2024 19:36:31 +0000</pubDate><link>https://www.top10vpn.com/research/wifi-vulnerabilities/</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=39361819</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39361819</guid></item><item><title><![CDATA[CVE-2023-50387 – Cross-Vendor DNSSEC Vulnerability Disclosed]]></title><description><![CDATA[
<p>Article URL: <a href="https://marc.info/?l=oss-security&s=CVE-2023-50387">https://marc.info/?l=oss-security&s=CVE-2023-50387</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=39361359">https://news.ycombinator.com/item?id=39361359</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 13 Feb 2024 19:02:00 +0000</pubDate><link>https://marc.info/?l=oss-security&amp;s=CVE-2023-50387</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=39361359</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39361359</guid></item><item><title><![CDATA[Vulnerability in the Internet Infrastructure (Fundamental Design Flaw in DNSSEC)]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.prleap.com/pr/294914/serious-vulnerability-in-the-internet-infrastructure-fundamental-design-flaw-in-dnssec-discovered">https://www.prleap.com/pr/294914/serious-vulnerability-in-the-internet-infrastructure-fundamental-design-flaw-in-dnssec-discovered</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=39361133">https://news.ycombinator.com/item?id=39361133</a></p>
<p>Points: 1</p>
<p># Comments: 1</p>
]]></description><pubDate>Tue, 13 Feb 2024 18:42:22 +0000</pubDate><link>https://www.prleap.com/pr/294914/serious-vulnerability-in-the-internet-infrastructure-fundamental-design-flaw-in-dnssec-discovered</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=39361133</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39361133</guid></item><item><title><![CDATA[New comment by jakobdabo in "Lichess: Block Ads and Trackers"]]></title><description><![CDATA[
<p>You can also use DNSCloak, which can act as a VPN, and proxy all DNS requests to a trusted DoH server, like AdGuard.</p>
]]></description><pubDate>Tue, 19 Sep 2023 18:42:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=37574306</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=37574306</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37574306</guid></item><item><title><![CDATA[Wedding Photographer Spent a Year in Jail After Pleading the Fifth]]></title><description><![CDATA[
<p>Article URL: <a href="https://petapixel.com/2023/08/18/wedding-photographer-spent-a-year-in-jail-after-pleading-the-fifth/">https://petapixel.com/2023/08/18/wedding-photographer-spent-a-year-in-jail-after-pleading-the-fifth/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=37182043">https://news.ycombinator.com/item?id=37182043</a></p>
<p>Points: 47</p>
<p># Comments: 47</p>
]]></description><pubDate>Fri, 18 Aug 2023 21:01:09 +0000</pubDate><link>https://petapixel.com/2023/08/18/wedding-photographer-spent-a-year-in-jail-after-pleading-the-fifth/</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=37182043</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37182043</guid></item><item><title><![CDATA[Mexican cartels exploit US Government's CBP One app]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.washingtonexaminer.com/policy/immigration/mexican-cartels-exploit-cbp-one-app">https://www.washingtonexaminer.com/policy/immigration/mexican-cartels-exploit-cbp-one-app</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=37002693">https://news.ycombinator.com/item?id=37002693</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 04 Aug 2023 17:01:52 +0000</pubDate><link>https://www.washingtonexaminer.com/policy/immigration/mexican-cartels-exploit-cbp-one-app</link><dc:creator>jakobdabo</dc:creator><comments>https://news.ycombinator.com/item?id=37002693</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37002693</guid></item></channel></rss>