<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: kjok</title><link>https://news.ycombinator.com/user?id=kjok</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 18 Apr 2026 10:48:51 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=kjok" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by kjok in "Ask HN: Can anyone suggest me a SaaS product idea?"]]></title><description><![CDATA[
<p>Are you a bot?</p>
]]></description><pubDate>Wed, 15 Apr 2026 06:55:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47775582</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=47775582</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47775582</guid></item><item><title><![CDATA[New comment by kjok in "Ask HN: What are you building that's not AI related?"]]></title><description><![CDATA[
<p>Building automated analysis tool that help identify the use of GPL-licensed SDKs in mobile apps, promoting license compliance and supporting sustainable open-source development.</p>
]]></description><pubDate>Fri, 10 Apr 2026 03:50:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47713402</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=47713402</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47713402</guid></item><item><title><![CDATA[Ask HN: Founders/investors, what AI bet you made in 2022 and how it is going?]]></title><description><![CDATA[
<p>In 2022, many founders and investors made strong bets on AI: new companies, pivots, or funding theses. Now that we have had time to see what actually played out, what did you bet on and how is it doing today? We learn a lot from failure, so especially interested in (and would appreciate) honest stories about what did NOT work and why.</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47693990">https://news.ycombinator.com/item?id=47693990</a></p>
<p>Points: 6</p>
<p># Comments: 1</p>
]]></description><pubDate>Wed, 08 Apr 2026 18:06:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47693990</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=47693990</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47693990</guid></item><item><title><![CDATA[New comment by kjok in "LLM scraper bots are overloading acme.com's HTTPS server"]]></title><description><![CDATA[
<p>How do you know that they were LLM scrapers? The reason I ask is because user agents could easily be spoofed?</p>
]]></description><pubDate>Wed, 08 Apr 2026 06:53:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47686305</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=47686305</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47686305</guid></item><item><title><![CDATA[New comment by kjok in "LLM scraper bots are overloading acme.com's HTTPS server"]]></title><description><![CDATA[
<p>For those who have deployed Cloudflare in front, what are pros and cons? How's the user experience? Do they offer free bot protection?</p>
]]></description><pubDate>Wed, 08 Apr 2026 06:24:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47686111</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=47686111</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47686111</guid></item><item><title><![CDATA[New comment by kjok in "LLM scraper bots are overloading acme.com's HTTPS server"]]></title><description><![CDATA[
<p>How are you measuring this? Does your solution rely on user agent or device fingerprinting? Curious to know what tools are available today and how accurate they are.</p>
]]></description><pubDate>Wed, 08 Apr 2026 06:19:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=47686074</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=47686074</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47686074</guid></item><item><title><![CDATA[New comment by kjok in "Launch HN: Freestyle – Sandboxes for Coding Agents"]]></title><description><![CDATA[
<p>Thanks for sharing your approach!<p>> It is nothing special. We keep X number of machines in a warm pool.<p>I'd love to better understand the unit economics here. Specifically, whether cost is a meaningful factor.<p>The reason I ask is that many startups we've seen focus heavily on optimizing their technology to reduce cold/boot startup times. As you pointed out, perceived latency can also be improved by maintaining a warm pool of VMs.<p>Given that, I'm trying to determine whether it's more effective to invest in deeper technical optimizations, or to address the cold start problem by keeping a warm pool.</p>
]]></description><pubDate>Mon, 06 Apr 2026 21:54:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=47667757</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=47667757</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47667757</guid></item><item><title><![CDATA[New comment by kjok in "Show HN: Zerobox – Sandbox any command with file, network, credential controls"]]></title><description><![CDATA[
<p>> The problem is that those underlying frameworks can very easily be misconfigured.<p>Agreed. I'm sure a number of these sandboxing solutions are vibe-coded, which makes your concerns regarding misconfigurations even more relevant.</p>
]]></description><pubDate>Wed, 01 Apr 2026 18:59:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47605031</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=47605031</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47605031</guid></item><item><title><![CDATA[New comment by kjok in "Show HN: Zerobox – Sandbox any command with file, network, credential controls"]]></title><description><![CDATA[
<p>> There are dozens of projects like this emerging right now. They all share the same challenge: establishing credibility.<p>Care to elaborate on the kind of "credibility" to be established here? All these bazillion sandboxing tools use the same underlying frameworks for isolation (e.g., ebpf, landlock, VMs, cgroups, namespaces) that are already credible.</p>
]]></description><pubDate>Wed, 01 Apr 2026 18:22:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47604585</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=47604585</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47604585</guid></item><item><title><![CDATA[New comment by kjok in "Axios compromised on NPM – Malicious versions drop remote access trojan"]]></title><description><![CDATA[
<p>And this is exactly why we see noise on HN/Reddit when a supply-chain cyberattack breaks out, but no breach is ever reported. Enterprises are protected by internal mirroring.</p>
]]></description><pubDate>Wed, 01 Apr 2026 03:31:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47596482</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=47596482</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47596482</guid></item><item><title><![CDATA[New comment by kjok in "Axios compromised on NPM – Malicious versions drop remote access trojan"]]></title><description><![CDATA[
<p>I mean that agents can scan the code to find anything "suspicious". After all, security vendors that claim to "detect" malware in packages are relying on LLMs for detection.</p>
]]></description><pubDate>Tue, 31 Mar 2026 18:31:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=47591537</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=47591537</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47591537</guid></item><item><title><![CDATA[New comment by kjok in "Axios compromised on NPM – Malicious versions drop remote access trojan"]]></title><description><![CDATA[
<p>Curious to know why are coding agents not detecting such risks before importing dependencies?</p>
]]></description><pubDate>Tue, 31 Mar 2026 17:25:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47590679</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=47590679</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47590679</guid></item><item><title><![CDATA[New comment by kjok in "Show HN: Threadprocs – executables sharing one address space (0-copy pointers)"]]></title><description><![CDATA[
<p>> I actually just published a paper...<p>This gives me an impression that the paper has already been published and is available publicly for us to read.</p>
]]></description><pubDate>Mon, 23 Mar 2026 17:32:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47492568</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=47492568</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47492568</guid></item><item><title><![CDATA[New comment by kjok in "Ask HN: What's the Point Anymore?"]]></title><description><![CDATA[
<p>Maybe humans can focus on cybersecurity and fraud? That’s not going away with AI</p>
]]></description><pubDate>Thu, 29 Jan 2026 20:59:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=46816500</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=46816500</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46816500</guid></item><item><title><![CDATA[New comment by kjok in "Meta's crawler made 11M requests to my site in 30 days"]]></title><description><![CDATA[
<p>Block based on cookies (i.e., set a cookie on the browser and check on the server whether it exists).</p>
]]></description><pubDate>Thu, 29 Jan 2026 07:53:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=46807086</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=46807086</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46807086</guid></item><item><title><![CDATA[New comment by kjok in "Show HN: yolo-cage – AI coding agents that can't exfiltrate secrets"]]></title><description><![CDATA[
<p>I understand the need, but I don't understand why a VM or Docker is not enough. Why are people creating custom wrappers around VMs/containers?</p>
]]></description><pubDate>Wed, 21 Jan 2026 17:18:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=46708562</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=46708562</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46708562</guid></item><item><title><![CDATA[New comment by kjok in "Show HN: yolo-cage – AI coding agents that can't exfiltrate secrets"]]></title><description><![CDATA[
<p>Genuine question: why is everyone rolling out their own sandbox wrappers around VMs/Docker for agents?</p>
]]></description><pubDate>Wed, 21 Jan 2026 16:05:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=46707582</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=46707582</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46707582</guid></item><item><title><![CDATA[At a major AI conference, Perplexity got voted most likely to flop]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.businessinsider.com/at-an-ai-conference-attendees-were-asked-which-startup-they-would-short-2025-11">https://www.businessinsider.com/at-an-ai-conference-attendees-were-asked-which-startup-they-would-short-2025-11</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45939681">https://news.ycombinator.com/item?id=45939681</a></p>
<p>Points: 4</p>
<p># Comments: 1</p>
]]></description><pubDate>Sat, 15 Nov 2025 18:55:35 +0000</pubDate><link>https://www.businessinsider.com/at-an-ai-conference-attendees-were-asked-which-startup-they-would-short-2025-11</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=45939681</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45939681</guid></item><item><title><![CDATA[New comment by kjok in "Benchmarking leading AI agents against Google reCAPTCHA v2"]]></title><description><![CDATA[
<p>> when they incorrectly fake devices<p>And how often does this happen? Do you have any proof? Most YC companies building browser agents have built-in captcha solvers.</p>
]]></description><pubDate>Mon, 10 Nov 2025 19:38:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=45879941</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=45879941</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45879941</guid></item><item><title><![CDATA[New comment by kjok in "Benchmarking leading AI agents against Google reCAPTCHA v2"]]></title><description><![CDATA[
<p>If not today, models will get better at solving captchas in the near future. IMHO, the real concern, however, is cheap captcha solving services.</p>
]]></description><pubDate>Mon, 10 Nov 2025 18:30:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=45879107</link><dc:creator>kjok</dc:creator><comments>https://news.ycombinator.com/item?id=45879107</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45879107</guid></item></channel></rss>