<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: karulont</title><link>https://news.ycombinator.com/user?id=karulont</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 18 Apr 2026 12:19:15 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=karulont" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[Just When You Thought It Was OK to Skip Breakfast]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.wsj.com/health/wellness/breakfast-health-weight-loss-study-6704788b">https://www.wsj.com/health/wellness/breakfast-health-weight-loss-study-6704788b</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43937411">https://news.ycombinator.com/item?id=43937411</a></p>
<p>Points: 1</p>
<p># Comments: 1</p>
]]></description><pubDate>Fri, 09 May 2025 14:49:46 +0000</pubDate><link>https://www.wsj.com/health/wellness/breakfast-health-weight-loss-study-6704788b</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=43937411</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43937411</guid></item><item><title><![CDATA[New comment by karulont in "Servo vs. Ladybird"]]></title><description><![CDATA[
<p>Swift has been adding support for things like non-copyable types that should help with writing performance sensitive parts.</p>
]]></description><pubDate>Wed, 26 Mar 2025 20:05:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=43486601</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=43486601</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43486601</guid></item><item><title><![CDATA[New comment by karulont in "Half-Life 2 peaks at 50,914 concurrent players, 20 years after its release"]]></title><description><![CDATA[
<p>Can someone explain why? Past 3 years have not seen a huge peak like that.<p>Edit: it is now free</p>
]]></description><pubDate>Sat, 16 Nov 2024 21:38:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=42159578</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=42159578</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42159578</guid></item><item><title><![CDATA[New comment by karulont in "Swift Homomorphic Encryption"]]></title><description><![CDATA[
<p><a href="https://github.com/apple/swift-homomorphic-encryption/blob/356b9d19ef1842d31ffc16e29956ebfd9bb43e96/Sources/PrivateInformationRetrieval/KeywordDatabase.swift#L55">https://github.com/apple/swift-homomorphic-encryption/blob/3...</a><p>Run SHA256 on the keyword, truncate the hash and take the modulus with number of shards.</p>
]]></description><pubDate>Wed, 31 Jul 2024 15:31:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=41120087</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=41120087</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41120087</guid></item><item><title><![CDATA[New comment by karulont in "Swift Homomorphic Encryption"]]></title><description><![CDATA[
<p>Check my comment here for some intuition: <a href="https://news.ycombinator.com/item?id=41115179">https://news.ycombinator.com/item?id=41115179</a><p>Basically the server does not know, it just computes with every possible value. And the result turns out to be what the client was interested in.</p>
]]></description><pubDate>Wed, 31 Jul 2024 14:18:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=41119390</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=41119390</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41119390</guid></item><item><title><![CDATA[New comment by karulont in "Swift Homomorphic Encryption"]]></title><description><![CDATA[
<p>There was a recent paper that also uses Swift in the name:<p>“Cheddar: A Swift Fully Homomorphic Encryption Library for CUDA GPUs” - <a href="https://arxiv.org/pdf/2407.13055" rel="nofollow">https://arxiv.org/pdf/2407.13055</a><p>We were a little worried, but quickly discovered that they used Swift as an adjective not as a programming language.<p>[Disclosure: I work on the team responsible for the feature]</p>
]]></description><pubDate>Wed, 31 Jul 2024 00:16:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=41115361</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=41115361</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41115361</guid></item><item><title><![CDATA[New comment by karulont in "Swift Homomorphic Encryption"]]></title><description><![CDATA[
<p>In this PIR model the server has to read the whole database, otherwise it would be easy on the server to see, that these rows were not accessed and therefore they are not the one the client queried.<p>In this PIR model the server runtime is O(n) where n is the number of rows.<p>To keep it practical, we do support sharding the database. Client leaks a few bits of hashed query to pick the right shard, where we process the entire shard. There is a inherent privacy-performance tradeoff: less shards = less leakage vs more shards = better performance & less privacy.</p>
]]></description><pubDate>Wed, 31 Jul 2024 00:02:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=41115272</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=41115272</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41115272</guid></item><item><title><![CDATA[New comment by karulont in "Swift Homomorphic Encryption"]]></title><description><![CDATA[
<p>A very simple PIR scheme on top of homomorphic encryption that supports multiplying with a plaintext and homomorphic addition, would look like this:<p>The client one-hot-encodes the query: Enc(0), Enc(1), Enc(0).
The server has 3 values: x, y, z.
Now the server computes: Enc(0) * x + Enc(1) * y + Enc(0) * z == Enc(y).
Client can decrypt Enc(y) and get the value y. Server received three ciphertexts, but does not know which one of them was encryption of zero or one, because the multiplications and additions that the server did, never leak the underlying value.<p>This gives some intuition on how PIR works, actual schemes are more efficient.<p>[Disclosure: I work on the team responsible for the feature]</p>
]]></description><pubDate>Tue, 30 Jul 2024 23:41:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=41115179</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=41115179</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41115179</guid></item><item><title><![CDATA[New comment by karulont in "Reverse Engineering for Everyone"]]></title><description><![CDATA[
<p>> That's a strange use of 'use'? Clearly, talking to some software over the network is 'using' it?<p>The point is that the proprietary client software was not used.</p>
]]></description><pubDate>Fri, 26 Jul 2024 08:19:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=41076804</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=41076804</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41076804</guid></item><item><title><![CDATA[New comment by karulont in "Whisky: Wine supercharged with the power of Apple's game porting toolkit"]]></title><description><![CDATA[
<p>How is this different from CrossOver?</p>
]]></description><pubDate>Sun, 26 Nov 2023 15:13:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=38422185</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=38422185</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38422185</guid></item><item><title><![CDATA[New comment by karulont in "Cryptographers solve decades-old privacy problem"]]></title><description><![CDATA[
<p>> hardware-accelerated PIR which is currently at use at scale.<p>Can you tell us more about that?</p>
]]></description><pubDate>Sun, 19 Nov 2023 16:20:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=38334068</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=38334068</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38334068</guid></item><item><title><![CDATA[New comment by karulont in "iOS 17 is available today"]]></title><description><![CDATA[
<p>> The Sensitive Content Analysis framework enables third-party developers to integrate Communication Safety in their apps. The framework allows developers to detect if content that children receive or attempt to send in their apps may contain nudity, and developers can add protections in their apps when sensitive content is detected.<p><a href="https://www.apple.com/child-safety/" rel="nofollow noreferrer">https://www.apple.com/child-safety/</a></p>
]]></description><pubDate>Tue, 19 Sep 2023 06:31:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=37566310</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=37566310</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37566310</guid></item><item><title><![CDATA[Learning Iconic Scenes with Differential Privacy]]></title><description><![CDATA[
<p>Article URL: <a href="https://machinelearning.apple.com/research/scenes-differential-privacy">https://machinelearning.apple.com/research/scenes-differential-privacy</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=36953194">https://news.ycombinator.com/item?id=36953194</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 01 Aug 2023 07:01:15 +0000</pubDate><link>https://machinelearning.apple.com/research/scenes-differential-privacy</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=36953194</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36953194</guid></item><item><title><![CDATA[New comment by karulont in "Show HN: Speeding up the code-test cycle for Java developers"]]></title><description><![CDATA[
<p>The reloading part reminded me about <a href="https://www.jrebel.com/" rel="nofollow">https://www.jrebel.com/</a></p>
]]></description><pubDate>Thu, 18 May 2023 00:04:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=35982754</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=35982754</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35982754</guid></item><item><title><![CDATA[New comment by karulont in "Ask HN: Most interesting tech you built for just yourself?"]]></title><description><![CDATA[
<p>I had phone that could run J2ME but did not have Internet.<p>I reverse engineered a flash application that showed a map and provided address search. I scraped the map tiles and address to location database. Reimplemented the viewer application as a Java applet and preloaded the tiles and address database to a microSD card connected to the phone. So essentially I built my own offline maps for my not internet connected phone.<p>Address search required prefix tree because IO was too slow to use binary search on the phone.<p>Anyway this was done just before I went to a new city to attend university and it was really helpful to find out where I am and where to go. There was no navigation, but it showed the map, gps location and the location where I needed to get to.<p>So that was my personal project that really had great utility for me.</p>
]]></description><pubDate>Fri, 28 Apr 2023 06:52:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=35738288</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=35738288</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35738288</guid></item><item><title><![CDATA[New comment by karulont in "Google DeepMind"]]></title><description><![CDATA[
<p>I thought that this is a way to downsize: instead of supporting two orgs, merge them and the costs hopefully go down?</p>
]]></description><pubDate>Fri, 21 Apr 2023 20:56:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=35660002</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=35660002</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35660002</guid></item><item><title><![CDATA[New comment by karulont in "Sorting waste and recyclables with a fleet of robots"]]></title><description><![CDATA[
<p>Another existing offer:
<a href="https://www.terex.com/zenrobotics" rel="nofollow">https://www.terex.com/zenrobotics</a><p>At one point they were handing out T-shirts saying 9 out of 10 PHDs</p>
]]></description><pubDate>Thu, 13 Apr 2023 23:47:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=35563733</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=35563733</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35563733</guid></item><item><title><![CDATA[New comment by karulont in "PeopleDAO “exploited” by Google Docs edit"]]></title><description><![CDATA[
<p>So people want to be progressive and use cryptocurrency that is not tied to a government.<p>But when things go wrong they run to the FBI and FTC both run by the government.</p>
]]></description><pubDate>Sun, 12 Mar 2023 13:38:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=35119901</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=35119901</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35119901</guid></item><item><title><![CDATA[New comment by karulont in "Apple kills plans to scan for CSAM in iCloud"]]></title><description><![CDATA[
<p>Perceptual hashes are quite reversible. It is not a cryptographic hash that is hard to reverse.</p>
]]></description><pubDate>Thu, 08 Dec 2022 06:34:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=33904898</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=33904898</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33904898</guid></item><item><title><![CDATA[The smallest 256x256 single-color PNG file, and where you've seen it (2015)]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.mjt.me.uk/posts/smallest-png/">https://www.mjt.me.uk/posts/smallest-png/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=31115857">https://news.ycombinator.com/item?id=31115857</a></p>
<p>Points: 482</p>
<p># Comments: 101</p>
]]></description><pubDate>Thu, 21 Apr 2022 22:17:38 +0000</pubDate><link>https://www.mjt.me.uk/posts/smallest-png/</link><dc:creator>karulont</dc:creator><comments>https://news.ycombinator.com/item?id=31115857</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31115857</guid></item></channel></rss>