<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: kmeisthax</title><link>https://news.ycombinator.com/user?id=kmeisthax</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 12 Apr 2026 09:45:59 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=kmeisthax" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by kmeisthax in "EFF is leaving X"]]></title><description><![CDATA[
<p>Universality of human rights is a great principle that breaks down horribly the moment it makes contact with people who do not want you to have those rights. Like, even if you're a single-issue free speech maximalist, it is entirely self-defeating to argue that censorious tyrants should be afforded the benefits of free speech. The only purpose tyrants have of free speech is to use it to amass power to destroy free speech.<p>And yes, to be clear, Elon Musk is a censorious tyrant. All the big tech leaders are, both because some of them started out as outright fascists and because the rules of the tech CEO game are, in the Nash equilibrium, unfavorable to liberal ideals.<p>Dehumanization is another common tactic of tyrants. You look at the group of dissidents you want to censor, identify those who are weak enough to silence, and use your control over society and government to make them pay for not being on their side. Rinse and repeat until you've salami-sliced away every dissident's rights. The only effective means of stopping dehumanization is to render it ineffective by making lots of friends who understand and defend against these attacks. [0] The interminably dense social justice literature uses jargon terms like "solidarity" and "intersectionality", which seem almost calculated to piss off the unenlightened into reflexively opposing social justice because we might as well be wizards chanting Latin curses at people to sound smart. But the idea is simple.<p>So yes, freedom <i>is</i> intersectional - because it it ultimately comes from the people as a whole exercising their power to check the power of tyrants.<p>[0] "Apes together strong", in case HN doesn't render emoji correctly.</p>
]]></description><pubDate>Thu, 09 Apr 2026 20:54:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47709921</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47709921</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47709921</guid></item><item><title><![CDATA[New comment by kmeisthax in "EFF is leaving X"]]></title><description><![CDATA[
<p>The only reason why I'm not running Wayland on my Framework laptop is that there's some really weird bug where it hardlocks the system, and after I force-reboot it, the audio chip doesn't come back up unless I drain or unplug the battery. X11 doesn't have this issue.<p>Of course, this was also several years ago, and it's possible the bug has been fixed. Maybe I should try Wayland again.</p>
]]></description><pubDate>Thu, 09 Apr 2026 19:35:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47708667</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47708667</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47708667</guid></item><item><title><![CDATA[New comment by kmeisthax in "We found an undocumented bug in the Apollo 11 guidance computer code"]]></title><description><![CDATA[
<p>> Rust’s ownership system makes lock leaks a compile-time error.<p>Rust specifically does not forbid deadlocks, including deadlocks caused by resource leaks. There are many ways in safe Rust to deliberately leak memory - either by creating reference count cycles, or the explicit .leak() methods on various memory-allocating structures in std. It's also not entirely useless to do this - if you want an &'static from heap memory, Box.leak() does exactly that.<p>Now, that being said, actually writing code to hold a LockGuard <i>forever</i> is difficult, but that's mainly because the Rust type system is incomplete in ways that primarily inconvenience programmers but don't compromise the safety or meaning of programs. The borrow checker runs separately from type checking, so there's no way to represent a type that both owns <i>and</i> holds a lock at the same time. Only stacks and async types, both generated by compiler magic, can own a LockGuard. You would have to spawn a thread and have it hold the lock and loop indefinitely[0].<p>[0] Panicking in the thread does not deadlock the lock. Rust's std locks are designed to mark themselves as poisoned if a LockGuard is unwound by a panic, and any attempt to lock them will yield an error instead of deadlocking. You can, of course, clear the poison condition in safe Rust if you are willing to recover from potentially inconsistent data half-written by a panicked thread. Most people just unwrap the lock error, though.</p>
]]></description><pubDate>Tue, 07 Apr 2026 15:33:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47676938</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47676938</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47676938</guid></item><item><title><![CDATA[New comment by kmeisthax in "Microsoft hasn't had a coherent GUI strategy since Petzold"]]></title><description><![CDATA[
<p>There's a competing webapp-wrapper framework that explicitly uses the platform's own browser, but developers don't like being at the mercy of whatever the OS ships...</p>
]]></description><pubDate>Mon, 06 Apr 2026 03:41:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=47656737</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47656737</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47656737</guid></item><item><title><![CDATA[New comment by kmeisthax in "Microsoft hasn't had a coherent GUI strategy since Petzold"]]></title><description><![CDATA[
<p>Ironically, Office was the original poster child for Microsoft reinventing it's own widget toolkits, even back when Microsoft had a coherent visual design and developer story.</p>
]]></description><pubDate>Mon, 06 Apr 2026 03:05:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=47656516</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47656516</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47656516</guid></item><item><title><![CDATA[New comment by kmeisthax in "Age verification on Systemd and Flatpak"]]></title><description><![CDATA[
<p>You're on the right path, but the "something" politicians want to do is specifically "regulate Facebook's patent harms to children". Facebook's counter-argument is: "we don't have a legally ironclad way to check user age, it should be Apple and Google's job". So the politicians want to write a law to make it Apple and Google's job to check age.<p>In other words, all of these age verification laws are here predominantly to indemnify Facebook from a growing wave of child endangerment lawsuits in a way that will ensure Facebook doesn't have to kick off even a single teen from their platforms. That's why the "verification" is just a date and an age range bucket.<p>My personal opinion is that these laws <i>are</i> stupid, but not harmful to Linux users, and that everyone angry at systemd for complying is shooting the wrong guy. Your real target is Facebook and you should be yelling at your local representative to make this bill not target Linux distros.</p>
]]></description><pubDate>Fri, 03 Apr 2026 20:37:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=47631935</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47631935</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47631935</guid></item><item><title><![CDATA[New comment by kmeisthax in "Firm boosts H.264 streaming license fees from $100k up to staggering $4.5M"]]></title><description><![CDATA[
<p>This seems particularly desperate, but I'm not surprised this is happening, given that patent owners in general have been very angry that H.264 didn't wind up being nearly as lucrative as MPEG-2 was. Hell, I remember the days when they couldn't even agree if H.264 should have a free streaming tier at all or not - and it seems like that went away.<p>Maybe Google should finally make good on their threat to only stream YouTube in royalty-free standards.</p>
]]></description><pubDate>Fri, 03 Apr 2026 19:04:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=47630738</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47630738</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47630738</guid></item><item><title><![CDATA[New comment by kmeisthax in "Firm boosts H.264 streaming license fees from $100k up to staggering $4.5M"]]></title><description><![CDATA[
<p>AV1, as well as the older On2 codec series it was based off of (VP9, VP8, etc).</p>
]]></description><pubDate>Fri, 03 Apr 2026 18:58:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47630653</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47630653</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47630653</guid></item><item><title><![CDATA[New comment by kmeisthax in "Marc Andreessen is wrong about introspection"]]></title><description><![CDATA[
<p>It's both. Back then[0], the ultra-wealthy had whole teams of PR managers - people devoted to doing the verbal equivalent of making sure they were lit with perfect 5500K portrait lighting at every angle. In other words, DLSS 5 but for personality. In order to sustain that kind of shitty magic trick, the PR team needs to completely control everything they say. This is a lot of effort.<p>The moment the ultra wealthy slip up - that they reveal that they're a normal shitty person with a severe case of affluenza - the illusion shatters. And social media has made it both very easy <i>and addictive</i> for rich people to indulge in their worst vices. So now instead of fundamentally soulless people engaging in virtue signalling to pretend to be human, you have fundamentally soulless people engaging in <i>vice</i> signalling, because suddenly these p-zombies been given access to a machine that finds them fellow p-zombies to validate themselves with.<p>Furthermore, once you see this happen a few times, your mental default changes. Now you assume <i>every</i> wealthy person is an asshole until proven otherwise. Even if Elon Musk <i>might</i> be saying something poignant about space travel or AI safety, you've seen enough Cybertrucks and "X Æ A-12"s and "autistic" Nazi salutes to know that he's a moron. You, personally, were ignoring the latter to focus on the former, because you were probably smarter than him. But he's shoved the latter in your face to the point where it's undeniable.<p>> Did I grow up and they changed to a younger audience and what I used to enjoy was just a different kind of stupid?<p>No, you're thinking of MAD Magazine. Notably, it's still possible for an emotionally mature adult to still enjoy that kind of humor. But emotionally mature adults tend to not enjoy manchildren.<p>[0] 10 years ago was 2016, which is probably not as far back as you were thinking.</p>
]]></description><pubDate>Fri, 03 Apr 2026 16:17:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47628565</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47628565</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47628565</guid></item><item><title><![CDATA[New comment by kmeisthax in "EmDash – A spiritual successor to WordPress that solves plugin security"]]></title><description><![CDATA[
<p>I like the idea of sandboxing plugins, but I don't like the move away from GPL, and I would rather not junk PHP just to get isolates. PHP is one of WordPress's advantages: it runs on basically any web host, you have no edit-compile-debug loop to worry about, and all state is temporary by default. Switching to JavaScript means we have a persistent process that has to be rebooted, and we're now married to single-threaded event loops and async/await syntax, which leaks[0] into everything.<p>Additionally, as others have already mentioned, the best security would be no dynamic code at all, just static pages generated by Jekyll. This should have been a Jekyll frontend, IMO.<p>>And because WordPress plugins run in the same execution context as WordPress itself and are so deeply intertwined with WordPress code, some argue they must carry forward WordPress’ GPL license.<p>That is a feature, not a bug. I already have to debug broken or poorly-documented WordPress plugins as-is, my job would be 100x harder if those plugins were proprietary and forbade inspection of the code.<p>Furthermore, while the GPL forbids locking down plugins to charge a licensing premium, it does not forbid charging money in general. While in theory you can legally pirate paid WordPress plugins (it's called "nulling"), in practice few do this because it's an obvious and blatant security risk[1]. Paid plugin authors are selling support and software assurance that has real value.<p>Also, I must take umbrage with the legal hedging. "Some argue"? Like, the GPL <i>is</i> strategically ambiguous with regards to the definition of a "Program"[2], but it'd be very hard to write a useful WordPress plugin that does not become part of the same Program.<p>[0] This is predominantly a fault of JavaScript, which has no threading story and is designed to fit in a foreign event loop. In Rust, async code can spawn and await real threads to hold blocking code, and sequential code can host its own event loop to run async in.<p>[1] Especially if you were to, say, name your nulled version "Secure Custom Fields". Nobody would EVER do that, right?<p>[2] No, proprietary Linux modules don't count. Linux has a userspace syscall exception that defangs the GPL, so it's perfectly possible to write kernel-mode code that only touches syscall equivalents.</p>
]]></description><pubDate>Thu, 02 Apr 2026 16:18:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47616472</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47616472</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47616472</guid></item><item><title><![CDATA[New comment by kmeisthax in "Teenage Engineering's PO-32 acoustic modem and synth implementation"]]></title><description><![CDATA[
<p>> The PO-32 is not receiving finished drum audio when you transfer a sound or a pattern. It receives structured data:<p>Wait, isn't this what MIDI is for?</p>
]]></description><pubDate>Tue, 31 Mar 2026 20:03:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=47592705</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47592705</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47592705</guid></item><item><title><![CDATA[New comment by kmeisthax in "Tell HN: Chrome says "suspicious download" when trying to download yt-dlp"]]></title><description><![CDATA[
<p>Weirdly enough, Google's never actually made a public statement that YouTube "has DRM". If they did, it would immediately give Kevin McLeod the biggest copyleft trolling opportunity in history, because all Creative Commons licenses specifically forbid using DRM on the resulting work.<p>The only reason why we even know YouTube "has DRM" is because third parties have been able to plausibly allege DMCA 1201 circumvention claims against yt-dlp regarding a nebulously named "rolling cipher". These are not actual court findings of fact, just that you can say this in a legal filing and not immediately get your case thrown out on summary judgment. Which is a really low bar. Whether or not the rolling cipher actually qualifies as DRM is still an open question.<p>The way DMCA 1201 is written, basically anything <i>intended</i> to function as copy protection is considered DRM under the law. Like, those really annoying no-right-click scripts people used to put on sites probably could be argued to be DRM under DMCA 1201. However, in this case, there's a disconnect between the people offering the DRM (who don't actually claim it's DRM) and the people using it as DRM.</p>
]]></description><pubDate>Tue, 31 Mar 2026 19:59:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47592647</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47592647</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47592647</guid></item><item><title><![CDATA[New comment by kmeisthax in "Tell HN: Chrome says "suspicious download" when trying to download yt-dlp"]]></title><description><![CDATA[
<p>The relevant heuristic in NPM supply-chain compromises would be the age of the specific binary. i.e. a freshly released package is riskier than one that's been around for a few days. So perhaps the policy should be that NPM doesn't install new package versions unless they've been public for 24 hours, or there's a signed override from the package repository itself stating that the update fixes a security issue. Of course, that would also require the NPM team have a separate review process for signing urgent security fixes.</p>
]]></description><pubDate>Tue, 31 Mar 2026 19:30:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47592266</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47592266</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47592266</guid></item><item><title><![CDATA[New comment by kmeisthax in "Fedware: Government apps that spy harder than the apps they ban"]]></title><description><![CDATA[
<p>The recent spate of state-level age verification laws, while stupid, are primarily designed to insulate Facebook from lawsuits and not actually crack down on people. You can comply with them by just having a date field and an API to get bucketed age ranges out of them. The reason why they seem like a concerted crackdown is that Facebook can pay people to go to literally every legislature and bug them up and down[0] until they pass a law to make OS vendors provide age buckets.<p>The <i>real shit</i> is happening parallel to the actual legislation. Companies that need to comply with, say, the extremely onerous UK Online Services Act, are forcing everyone to use data-heavy verification paths like facial recognition age <i>estimation</i> or ID scanning. Newgrounds just used your account age or a credit card.<p>A core property of fascism is that, unlike other forms of tyranny, it is specifically a public-private joint venture. The government uses corporations to bypass its own constitutional restrictions, and those corporations then agree to follow rules that don't actually exist, specifically so that those corporations can shut down all their competition and form para-governments that supercede the democratically responsive bits. This has actually been going on for a while, but it's only now that the people are actually noticing it.<p>[0] Inspired by Louis Rossmann's efforts to get R2R bills passed, I've started doing amateur lobbying for the Rio Grande Plan. It's surprisingly easy, but you will almost certainly have to take off from work or sacrifice many a lunch hour to be able to actually get to talk to people.</p>
]]></description><pubDate>Mon, 30 Mar 2026 21:07:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47579711</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47579711</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47579711</guid></item><item><title><![CDATA[New comment by kmeisthax in "Fedware: Government apps that spy harder than the apps they ban"]]></title><description><![CDATA[
<p>Quoth the Doctorow: "An app is just a website wrapped up in enough IP to make it a felony to modify it."</p>
]]></description><pubDate>Mon, 30 Mar 2026 20:48:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47579527</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47579527</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47579527</guid></item><item><title><![CDATA[New comment by kmeisthax in "72% of the dollar's purchasing power was destroyed in just four episodes"]]></title><description><![CDATA[
<p>Only half of the incidents listed were actually full-scale wars (WWI and II). The other two incidents are an oil shock and a pandemic.<p>The commonality between all four of these incidents is that they correspond to severe supply shocks:<p>- During WWI and WWII, industrial supply was rerouted by force to the war effort, leaving normal consumer demand unfulfilled.<p>- During the oil crisis of the 70s, a critical energy input to the American economy massively increased in price due to sanctions placed on America.<p>- During the COVID-19 pandemic, a significant chunk of workers were paid not to work, as a form of deliberate supply destruction to avoid the spread of a novel coronavirus.<p>In a "normal" economy, supply is flexible <i>enough</i> that you can print money and nobody even notices. The supply curve is smooth and gradual, so prices only rise a little. When supply is constrained, however, prices rise to whatever value is necessary to curtail demand, because they <i>have</i> to. The supply curve is a brick wall.</p>
]]></description><pubDate>Mon, 30 Mar 2026 16:17:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=47576228</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47576228</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47576228</guid></item><item><title><![CDATA[New comment by kmeisthax in "How the AI Bubble Bursts"]]></title><description><![CDATA[
<p>I thought we were going to hit token saturation years ago, but they keep inventing new ways to use tokens. Like, instead of asking a chat model to write something and getting ~1000 tokens out of it, you now have an agent producing ~10,000 tokens - or, worse, spawning 10 subagents that collectively burn ~100,000 tokens. All for marginally better answers with significantly higher compute usage.<p>Personally, I would have used all those tokens to generate synthetic data for IDA (iterated distillation and amplification) so that the more efficient 1000 token/answer chat model can answer more questions, but apparently that doesn't justify an insane datacenter buildout.</p>
]]></description><pubDate>Mon, 30 Mar 2026 14:37:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=47574947</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47574947</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47574947</guid></item><item><title><![CDATA[New comment by kmeisthax in "Miasma: A tool to trap AI web scrapers in an endless poison pit"]]></title><description><![CDATA[
<p>If you want a good analogy, try the enclosure of the commons in the British countryside. Communally managed grasslands were destroyed by noblemen with massive herds of cattle overgrazing the land, kickstarting a land grab that effectively forced people to enclose or be left behind themselves. Property is a virus that destroys all other forms of allocation.</p>
]]></description><pubDate>Sun, 29 Mar 2026 15:44:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47564141</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47564141</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47564141</guid></item><item><title><![CDATA[New comment by kmeisthax in "Last gasps of the rent seeking class?"]]></title><description><![CDATA[
<p>The original post was talking about the scenario of third-party reservations trading marketplaces. In that scenario, reservations become financialized derivatives of the underlying supply of food at a restaurant. But this is being done in a really dumb way where fake demand is being injected to make the reservation independently valuable from the underlying.<p>To be perfectly clear, bots <i>don't eat food</i>, and we don't need a market to tell us otherwise. Even an individual having Google Duplex reserve ten tables in advance isn't going to be able to eat ten dinners. But if reservations actually cost money, then any restaurant doing the smart thing of just skipping no-shows to keep the kitchen running is now defrauding reservation holders. Capacity has to be reserved and left fallow for the sake of optionality.<p>Bringing this back to market terms: if reservations are so in demand that restaurants have to charge for them, why don't they just raise the prices on the actual food instead?</p>
]]></description><pubDate>Sun, 29 Mar 2026 15:28:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47563976</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47563976</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47563976</guid></item><item><title><![CDATA[New comment by kmeisthax in "Last gasps of the rent seeking class?"]]></title><description><![CDATA[
<p>Well, in the former case, that's usually part of some kind of entertainment. Street performers do the same thing and get about the same proportion of people tipping - i.e. not much, but enough to make a living if you're lucky and savvy enough to hustle the system.</p>
]]></description><pubDate>Sat, 28 Mar 2026 03:57:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47551487</link><dc:creator>kmeisthax</dc:creator><comments>https://news.ycombinator.com/item?id=47551487</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47551487</guid></item></channel></rss>