<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: josnyder</title><link>https://news.ycombinator.com/user?id=josnyder</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 03 May 2026 17:40:47 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=josnyder" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by josnyder in "San Francisco streets with confusingly similar names"]]></title><description><![CDATA[
<p>Sylvan Dr and Forest View Dr are two blocks from each other.</p>
]]></description><pubDate>Sun, 03 May 2026 06:33:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47994013</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=47994013</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47994013</guid></item><item><title><![CDATA[New comment by josnyder in "Amazon S3 Adds Put-If-Match (Compare-and-Swap)"]]></title><description><![CDATA[
<p>While it can't be done server-side, this can be done straightforwardly in a signer service, and the signer doesn't need to interact with the payloads being uploaded. In other words, a tiny signer can act as a control plane for massive quantities of uploaded data.<p>The client sends the request headers (including the x-amz-content-sha256 header) to the signer, and the signer responds with a valid S3 PUT request (minus body). The client takes the signer's response, appends its chosen request payload, and uploads it to S3. With such a system, you can implement a signer in a lambda function, and the lambda function enforces the content-addressed invariant.<p>Unfortunately it doesn't work natively with multipart: while SigV4+S3 enables you to enforce the SHA256 of each individual part, you can't enforce the SHA256 of the entire object. If you really want, you can invent your own tree hashing format atop SHA256, and enforce content-addressability on that.<p>I have a blog post [1] that goes into more depth on signers in general.<p>[1] <a href="https://josnyder.com/blog/2024/patterns_in_s3_data_access.html" rel="nofollow">https://josnyder.com/blog/2024/patterns_in_s3_data_access.ht...</a></p>
]]></description><pubDate>Tue, 26 Nov 2024 07:11:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=42243234</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=42243234</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42243234</guid></item><item><title><![CDATA[New comment by josnyder in "Waymo got pulled over. What happens next in Phoenix?"]]></title><description><![CDATA[
<p>Most jurisdictions make a distinction between moving violations, which are issued to the driver, and parking violations, which are issued to the car (and its owner, by extension). This is why, in most places, you cannot get points on your license from parking illegally.<p>This situation would have been a moving violation. It sounds like the law has not caught up with the concept that a company might hold a driver's license and be issued moving violations.</p>
]]></description><pubDate>Tue, 02 Jul 2024 21:39:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=40860681</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=40860681</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40860681</guid></item><item><title><![CDATA[New comment by josnyder in "Detroit wants to be the first big American city to tax land value"]]></title><description><![CDATA[
<p>Yes, by design. One major goal is to prevent a landowner from squatting on an empty lot while their neighbors build prosperity around it. The "squatter" then cashes in, having done nothing themselves. "Everyone works but the empty lot" is the commonly used phrase.<p>The goal of an LVT is to insulate a landowner's tax bill from being affected by their own improvements. Its anti-goal is to insulate a landowner from changes in land use around them.</p>
]]></description><pubDate>Tue, 17 Oct 2023 00:33:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=37908648</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=37908648</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37908648</guid></item><item><title><![CDATA[New comment by josnyder in "Detroit wants to be the first big American city to tax land value"]]></title><description><![CDATA[
<p>(I'm a big proponent of LVT)<p>The two downsides I'm aware of are difficulty in transitioning to an LVT and difficulty in valuing the land.<p>Transitioning to an LVT means that landowners no longer capture land rents for themselves, which is a massive overnight loss in the value they hold. The solutions there typically tax only the difference in land value versus a baseline assessment. So if a lot is worth $100 before LVT and $105 after, the tax is calculated only on the $5 difference.<p>Valuing the land is tricky because the whole point of LVT is to tax only the location itself. So the value of any structures should be excluded from taxation, and even improvements in soil quality (e.g. on a farm) should be excluded. This is problematic because the market for bare land is significant less liquid than improved land, especially in suburbs and cities. So there isn't always good data on comparable land, and there isn't a way to hold a straightforward auction to value a given lot. Of course, most present systems of property taxation are subject to the exact same issue.</p>
]]></description><pubDate>Tue, 17 Oct 2023 00:27:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=37908587</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=37908587</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37908587</guid></item><item><title><![CDATA[New comment by josnyder in "pigz: A parallel implementation of gzip for multi-core machines"]]></title><description><![CDATA[
<p>This was great in 2012. In 2022, most use-cases should be using parallelized zstd.</p>
]]></description><pubDate>Mon, 17 Oct 2022 21:05:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=33239504</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=33239504</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33239504</guid></item><item><title><![CDATA[New comment by josnyder in "$9.99/month"]]></title><description><![CDATA[
<p>I'm a big fan of privacy.com: they provide me with a spend-limited debit card number that varies by vendor. I use them especially for newspaper subscriptions that make it difficult to cancel and have balloon renewal payments.</p>
]]></description><pubDate>Sun, 17 Jul 2022 19:10:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=32130071</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=32130071</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32130071</guid></item><item><title><![CDATA[New comment by josnyder in "The SHA-256 Project: learn how hash functions work by implementing one yourself"]]></title><description><![CDATA[
<p>OP appears to be Jack O'Connor, one of the designers of BLAKE3, which is the fastest full-strength cryptographic hash function currently available. It's always nice to see practicing cryptographers also producing digestible cryptography content.</p>
]]></description><pubDate>Sun, 27 Mar 2022 06:53:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=30818300</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=30818300</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=30818300</guid></item><item><title><![CDATA[New comment by josnyder in "Proof of stake is incapable of producing a consensus"]]></title><description><![CDATA[
<p>PoW systems rely on the "phone a friend method" as well. When you download a Bitcoin client from a "friend", you are trusting them to honestly introduce you to the network. If you fall asleep for a period of years, you have to trust your friends to honestly inform you of all of the PoW forks and policy changes that have occurred over that interval. The only difference is that PoS blockchain clients must be bundled with a modestly-recent block hash along with the thousands of lines of code that you have no practical way to audit.<p>The problem eventually reduces to Ken Thompson's "Trusting Trust" [1] problem. There's no way to externally validate the honesty of any system (cryptocurrency, or otherwise).<p>[1] <a href="https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf" rel="nofollow">https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_Ref...</a></p>
]]></description><pubDate>Sun, 28 Nov 2021 06:02:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=29366580</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=29366580</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29366580</guid></item><item><title><![CDATA[New comment by josnyder in "Selecting and Hardening Remote Access VPN Solutions [pdf]"]]></title><description><![CDATA[
<p>I'm saddened that the answer isn't "Just use BeyondCorp".<p>Layer 7 solutions provide so much more capacity for granular AuthZ, and thereby eliminate the "soft underbelly" of corporate networks.</p>
]]></description><pubDate>Wed, 29 Sep 2021 03:36:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=28690045</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=28690045</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28690045</guid></item><item><title><![CDATA[New comment by josnyder in "EC2 Boot Time Benchmarking"]]></title><description><![CDATA[
<p>I clocked a custom Ubuntu-based AMI at 2.85 seconds for the median of 10 runs.<p><a href="https://gist.github.com/hashbrowncipher/17a92c6afb9642503876534c89005dd8" rel="nofollow">https://gist.github.com/hashbrowncipher/17a92c6afb9642503876...</a></p>
]]></description><pubDate>Tue, 17 Aug 2021 16:35:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=28211794</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=28211794</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28211794</guid></item><item><title><![CDATA[New comment by josnyder in "Ask HN: Who wants to be hired? (August 2021)"]]></title><description><![CDATA[
<p>Location: Bay Area<p>Remote: No preference<p>Willing to relocate: No<p>Gist: SRE with a focus in databases; additional specializations in security, automation, and performance<p>Technologies: online databases (Cassandra, MySQL, Postgres), Python, Terraform, Puppet<p>Résumé: <a href="https://drive.google.com/file/d/1nVQj1w1KK6rLBp_k8dGuSUFO706CJMto/view" rel="nofollow">https://drive.google.com/file/d/1nVQj1w1KK6rLBp_k8dGuSUFO706...</a><p>Email: josh@code406.com</p>
]]></description><pubDate>Tue, 03 Aug 2021 00:38:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=28044481</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=28044481</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28044481</guid></item><item><title><![CDATA[New comment by josnyder in "Software engineering is a learning process, working code is a side effect"]]></title><description><![CDATA[
<p>> Even worse, the idea that SE is a learning process is not communicated in any of the SE textbooks I know.<p>I think that Naur's "Programming as Theory Building" (1985) communicates this idea succinctly and forcefully. It's not a textbook, though.</p>
]]></description><pubDate>Mon, 18 Jan 2021 23:49:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=25828181</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=25828181</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25828181</guid></item><item><title><![CDATA[Rebooting datastores into the future]]></title><description><![CDATA[
<p>Article URL: <a href="https://medium.com/@NetflixTechBlog/datastore-flash-upgrades-187f1e4ef859">https://medium.com/@NetflixTechBlog/datastore-flash-upgrades-187f1e4ef859</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=21777716">https://news.ycombinator.com/item?id=21777716</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 12 Dec 2019 23:33:49 +0000</pubDate><link>https://medium.com/@NetflixTechBlog/datastore-flash-upgrades-187f1e4ef859</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=21777716</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21777716</guid></item><item><title><![CDATA[New comment by josnyder in "A PostgreSQL response to Uber [pdf]"]]></title><description><![CDATA[
<p>I saw it presented at Percona Live three days ago. As far as I am aware, there was no video.</p>
]]></description><pubDate>Sat, 29 Apr 2017 06:07:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=14225282</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=14225282</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14225282</guid></item><item><title><![CDATA[New comment by josnyder in "How to leak to the press"]]></title><description><![CDATA[
<p>I think it would be interesting for a member of Congress (or their staff) to operate a SecureDrop instance. Such a system might be a useful supplement to other forms of communication between federal officers and Congress (e.g. fax, interoffice, in person). Combined with 5 USC 7211, it might also have strong legal protection (IANAL).</p>
]]></description><pubDate>Fri, 27 Jan 2017 20:14:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=13502257</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=13502257</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13502257</guid></item><item><title><![CDATA[New comment by josnyder in "SipHash and HalfSipHash Added to Linux Kernel"]]></title><description><![CDATA[
<p>rurban has been proselytizing against use of psuedorandom functions (such as SipHash) for hash tables for a while now. He appears to truly believe that using PRFs for this purpose is inappropriate.<p>Every argument I've seen from rurban is predicated upon the assumption that the seed will be leaked by the application, either by directly leaking the key's contents or by an algorithmic attack on the output of the algorithm. As you mention, the former would constitute a grave vulnerability in the application (the kernel, in this case). The latter would constitute a grave vulnerability in the algorithm.<p>As for assessing whether there are vulnerabilities in the algorithm, we have an academic field (cryptanalysis) that exists to inform us when such vulnerabilities exist. Cryptanalysts' efforts have given us substantial assurance that the algorithms we use everyday (e.g. AES, HMAC, ChaCha, GMAC) are both pseudo-random and adequately prevent disclosure of their keys. SipHash was explicitly designed to be resistant to cryptanalytic attack, by two well-regarded cryptographers (Bernstein and Aumasson). They designed it targeting a specific cryptographic strength/performance trade-off, and to my knowledge it is the best contender for building a flood resistant hash table.<p>zx2c4, I look forward to using your code. Thank you for making the Linux kernel more secure.</p>
]]></description><pubDate>Tue, 10 Jan 2017 20:22:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=13368603</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=13368603</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13368603</guid></item><item><title><![CDATA[New comment by josnyder in "Cron in production is a double-edged sword"]]></title><description><![CDATA[
<p>I work for Yelp, and we use cron for purposes similar to those mentioned in this article, mostly synchronizing small bits of configuration or data that we want local to the machine.  We're heavy Puppet users, and we made a module to assist us in the management of our crons [1].  If you're a Puppet shop, I highly recommend checking it out. It provides answers to each of the problems mentioned in the article, often using the same mechanisms.  I especially like its integration with Sensu, which we use for monitoring the jobs.<p>We've found that deploying cronjobs onto individual hosts is quite powerful, and helps us fill a niche between configuration management tools (like Puppet) and specialized coprocesses (like Smartstack). We have cronjobs for downloading code deploys, showing Sensu state within the motd, reconfiguring daemons (especially the Smartstack ones), and (of course) cleaning up unused data.<p>Of course, there's also the separate problem of scheduling and coordinating tasks across an entire cluster. In most cases we don't use our cron daemons for this, although we do have some jobs that run on multiple hosts and enforce mutual exclusion by grabbing a lock in Zookeeper.<p>[1] <a href="https://github.com/Yelp/puppet-cron#puppet-cron" rel="nofollow">https://github.com/Yelp/puppet-cron#puppet-cron</a></p>
]]></description><pubDate>Sat, 17 Oct 2015 02:31:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=10403176</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=10403176</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=10403176</guid></item><item><title><![CDATA[New comment by josnyder in "True Zero-Downtime HAProxy Reloads"]]></title><description><![CDATA[
<p>Yep, I found a number of them, but I promptly forgot them in excitement when I found the one I actually wanted.  If you want to check them out yourself, they appear to congregate in the kernel tree at net/sched/sch_* [1].<p>The only other qdisc I have much experience with is sch_netem, which emulates behaviors of a WAN (delay, loss, etc).  I used it in this post [2] to conduct adversarial testing of MySQL replication (search 'tc qdisc').<p>[1] <a href="http://lxr.free-electrons.com/source/net/sched/" rel="nofollow">http://lxr.free-electrons.com/source/net/sched/</a><p>[2] <a href="http://engineeringblog.yelp.com/2014/03/mysql-replication-network-issues-and-why-you-might-want-to-upgrade.html" rel="nofollow">http://engineeringblog.yelp.com/2014/03/mysql-replication-ne...</a></p>
]]></description><pubDate>Tue, 14 Apr 2015 05:30:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=9372278</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=9372278</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=9372278</guid></item><item><title><![CDATA[New comment by josnyder in "April Fool: DefCad (3D printed gun site) seized by feds"]]></title><description><![CDATA[
<p>Defcad's DNS point-of-contact is dns@jomax.net.  Meanwhile, megaupload's is ipr@ic.fbi.gov.  It seems very likely that this is a wonderfully crafted hoax.</p>
]]></description><pubDate>Mon, 01 Apr 2013 20:33:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=5475727</link><dc:creator>josnyder</dc:creator><comments>https://news.ycombinator.com/item?id=5475727</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=5475727</guid></item></channel></rss>