<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: jfyi</title><link>https://news.ycombinator.com/user?id=jfyi</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 16 May 2026 11:07:42 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=jfyi" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by jfyi in "Waymo updates 3,800 robotaxis after they 'drive into standing water'"]]></title><description><![CDATA[
<p>Like this?<p><a href="https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simulation/" rel="nofollow">https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-f...</a><p>Or did you mean strictly in operation?</p>
]]></description><pubDate>Fri, 15 May 2026 19:55:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=48153057</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=48153057</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48153057</guid></item><item><title><![CDATA[New comment by jfyi in "“Microslop” filtered in the official Microsoft Copilot Discord server"]]></title><description><![CDATA[
<p>Great person theory is hardly new either. I'm not sure the point. Really it's just  "critical theory" for rich white men. I'm not convinced everyone or even a majority thinks this way innately. It's taught by people that want others to see them that way. Nothing here precludes that.</p>
]]></description><pubDate>Wed, 04 Mar 2026 21:56:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47254528</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=47254528</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47254528</guid></item><item><title><![CDATA[New comment by jfyi in "“Microslop” filtered in the official Microsoft Copilot Discord server"]]></title><description><![CDATA[
<p>Is it though? Or are we simply in an environment that is heavily skewed toward "Great Person" theory narratives?</p>
]]></description><pubDate>Mon, 02 Mar 2026 14:14:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=47218211</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=47218211</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47218211</guid></item><item><title><![CDATA[New comment by jfyi in "America, and probably the world, stands on a precipice"]]></title><description><![CDATA[
<p>Well, the corporatists are generally quiet about things until they have control.</p>
]]></description><pubDate>Thu, 26 Feb 2026 23:02:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47173392</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=47173392</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47173392</guid></item><item><title><![CDATA[New comment by jfyi in "Fentanyl makeover: Core structural redesign could lead to safer pain medications"]]></title><description><![CDATA[
<p>Is fentanyl even that big of an issue in a clinical setting? It's not like it's the go to opiate of choice for general pain anyway.<p>The problem with fentanyl is that it is easy to make and smuggle and we managed to leave a giant black market hole to be filled when we went ape shit about oxy, which was an objectively better situation than we are currently in with street opiates.</p>
]]></description><pubDate>Thu, 26 Feb 2026 15:18:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=47167230</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=47167230</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47167230</guid></item><item><title><![CDATA[New comment by jfyi in "Hacker News.love – 22 projects Hacker News didn't love"]]></title><description><![CDATA[
<p>I think it's more that total reduplication sounds off to most western ears. Spotify has the same number of syllables.</p>
]]></description><pubDate>Mon, 23 Feb 2026 15:33:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47123626</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=47123626</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47123626</guid></item><item><title><![CDATA[New comment by jfyi in "Comprehensive searchable database of Epstein documents"]]></title><description><![CDATA[
<p><a href="https://board.epsteinexposed.com/c/site-feedback/2" rel="nofollow">https://board.epsteinexposed.com/c/site-feedback/2</a></p>
]]></description><pubDate>Fri, 13 Feb 2026 14:21:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47003068</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=47003068</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47003068</guid></item><item><title><![CDATA[New comment by jfyi in "Comprehensive searchable database of Epstein documents"]]></title><description><![CDATA[
<p>I'm not associated with the project. I just think they are doing amazing work as of the recent document drops.</p>
]]></description><pubDate>Fri, 13 Feb 2026 13:37:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=47002554</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=47002554</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47002554</guid></item><item><title><![CDATA[Comprehensive searchable database of Epstein documents]]></title><description><![CDATA[
<p>Article URL: <a href="https://epsteinexposed.com">https://epsteinexposed.com</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47002553">https://news.ycombinator.com/item?id=47002553</a></p>
<p>Points: 7</p>
<p># Comments: 4</p>
]]></description><pubDate>Fri, 13 Feb 2026 13:37:30 +0000</pubDate><link>https://epsteinexposed.com</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=47002553</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47002553</guid></item><item><title><![CDATA[New comment by jfyi in "Opus 4.6 uncovers 500 zero-day flaws in open-source code"]]></title><description><![CDATA[
<p>I think it's a fairly common trope in communication to explain in simple terms any language that the wider part of an audience doesn't understand.</p>
]]></description><pubDate>Thu, 05 Feb 2026 21:59:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=46905984</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=46905984</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46905984</guid></item><item><title><![CDATA[New comment by jfyi in "CIA to Sunset the World Factbook"]]></title><description><![CDATA[
<p>It's not that complex, good faith builds good will.<p>It's a shame we can't have nice things.</p>
]]></description><pubDate>Thu, 05 Feb 2026 21:16:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=46905456</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=46905456</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46905456</guid></item><item><title><![CDATA[New comment by jfyi in "CIA to Sunset the World Factbook"]]></title><description><![CDATA[
<p>Credibility is the core currency of soft power, whether one views its ultimate goal as manufacturing consent or fostering genuine cultural attraction. Without that perceived reliability, the indicator "soft" loses it's meaning.</p>
]]></description><pubDate>Thu, 05 Feb 2026 15:34:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=46900793</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=46900793</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46900793</guid></item><item><title><![CDATA[New comment by jfyi in "CIA to Sunset the World Factbook"]]></title><description><![CDATA[
<p>I agree, well mostly.<p>The administration is dispensing with the institutions of soft power. I don't think it's the main goal so much as a consequence of their worldview. Soft power is essentially worthless to people who have no interest in maintaining a facade of international cooperation.</p>
]]></description><pubDate>Thu, 05 Feb 2026 15:20:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=46900633</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=46900633</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46900633</guid></item><item><title><![CDATA[New comment by jfyi in "Hacking Moltbook"]]></title><description><![CDATA[
<p>I think the distinction between programmatic error (solvable) and operational characteristic (mitigatable) is valid in theory, but I disagree that it matters in practice.<p>Proactive prevention (like bounds checking) only "solves" the class of problem if you assume 100% developer compliance. History shows we don't get that. So while the root cause differs (math vs. probabilistic model), the failure mode is identical: we are deploying systems where the default state is unsafe.<p>In that sense, it is an apples-to-apples comparison of risk. Relying on perfect discipline to secure C memory is functionally as dangerous as relying on prompt engineering to secure an LLM.</p>
]]></description><pubDate>Tue, 03 Feb 2026 15:52:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=46872554</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=46872554</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46872554</guid></item><item><title><![CDATA[New comment by jfyi in "Hacking Moltbook"]]></title><description><![CDATA[
<p>You are arguing semantics that don't address the underlying issue of data vs. command.<p>While I agree that SQL injection might be the technically better analogy, not looking at LLMs as a coding platform is a mistake. That is exactly how many people use them. Literally every product with "agentic" in the title is using the LLM as a coding platform where the command layer is ambiguous.<p>Focusing on the precise definition of a buffer overflow feels like picking nits when the reality is that we are mixing instruction and data in the same context window.<p>To make the analogy concrete: We are currently running LLMs in a way that mimics a machine where code and data share the same memory (context).<p>What we need is the equivalent of an nx bit for the context window. We need a structural way to mark a section of tokens as "read only". Until we have that architectural separation, treating this as a simple bug to be patched is underestimating the problem.</p>
]]></description><pubDate>Tue, 03 Feb 2026 14:17:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=46871274</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=46871274</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46871274</guid></item><item><title><![CDATA[New comment by jfyi in "Rentahuman – The Meatspace Layer for AI"]]></title><description><![CDATA[
<p>The AI can hire verifiers too. It of course turns into a recursive problem at some point, but that point is defined by how many people predictably do the assigned task.</p>
]]></description><pubDate>Tue, 03 Feb 2026 14:03:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=46871110</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=46871110</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46871110</guid></item><item><title><![CDATA[New comment by jfyi in "Rentahuman – The Meatspace Layer for AI"]]></title><description><![CDATA[
<p>I'd say abstracting it away from ai, Stephen King explored this type of scenario in 'Needful Things'. I bet there is a rich history in literature of exactly this type of thing as it basically boils down to exploration of will vs determinism.</p>
]]></description><pubDate>Tue, 03 Feb 2026 13:40:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=46870843</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=46870843</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46870843</guid></item><item><title><![CDATA[New comment by jfyi in "Hacking Moltbook"]]></title><description><![CDATA[
<p>There is definitely a large section of the security community that this is very true. Automated offensive suites and scanning tools have made entry a pretty low bar in the last decade or so. Very many people that learn to use these tools have no idea of how they work. Even when they know how the exploit works on a base level, many have no idea how the code works behind it. There is an abstraction layer very similar to LLMs and coding.<p>I went to a secure coding conference a few years back and saw a presentation by someone who had written an "insecure implementation" playground of a popular framework.<p>I asked, "what do you do to give tips to the users of your project to come up with a secure implementation?" and got in return "We aren't here to teach people to code."<p>Well yeah, that's exactly what that particular conference was there for. More so I took it as "I am not confident enough to try a secure implementation of these problems".</p>
]]></description><pubDate>Tue, 03 Feb 2026 13:19:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=46870619</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=46870619</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46870619</guid></item><item><title><![CDATA[New comment by jfyi in "Coding assistants are solving the wrong problem"]]></title><description><![CDATA[
<p>You know, anecdotally...<p>When I first picked up an agentic coding assistant I was very interested in the process and paid way more attention to it than necessary.<p>Quickly, I caught myself treating it like a long compilation and getting up to get a coffee and had to self correct this behavior.<p>I wonder how much novelty of the tech and workflow plays into this number.</p>
]]></description><pubDate>Tue, 03 Feb 2026 11:31:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=46869624</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=46869624</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46869624</guid></item><item><title><![CDATA[New comment by jfyi in "Hacking Moltbook"]]></title><description><![CDATA[
<p>>The exposed data told a different story than the platform's public image - while Moltbook boasted 1.5 million registered agents, the database revealed only 17,000 human owners behind them - an 88:1 ratio.<p>They acquired the ratio by directly querying tables through the exposed API key...<p>I feel publishing this moves beyond standard disclosure. It turns a bug report into a business critique. Using exfiltrated data in this way damages the cooperation between researchers and companies.</p>
]]></description><pubDate>Tue, 03 Feb 2026 11:12:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=46869457</link><dc:creator>jfyi</dc:creator><comments>https://news.ycombinator.com/item?id=46869457</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46869457</guid></item></channel></rss>