<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: lifis</title><link>https://news.ycombinator.com/user?id=lifis</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 13 May 2026 15:06:59 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=lifis" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by lifis in "Reimagining the mouse pointer for the AI era"]]></title><description><![CDATA[
<p>Not clear what it actually does, but seems equivalent to a global right click menu with "Chat with AI about this"</p>
]]></description><pubDate>Wed, 13 May 2026 10:16:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=48120010</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=48120010</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48120010</guid></item><item><title><![CDATA[New comment by lifis in "Show HN: Git for AI Agents"]]></title><description><![CDATA[
<p>This seems easily solved with a tool use hook that calls git add .; git commit a -m "<tool description>", specifying an alternate .git directory if desired</p>
]]></description><pubDate>Fri, 08 May 2026 18:49:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=48067158</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=48067158</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48067158</guid></item><item><title><![CDATA[New comment by lifis in "California farmers to destroy 420k peach trees following Del Monte bankruptcy"]]></title><description><![CDATA[
<p>Why? From searches and LLMs it seems it costs $50-100 to move a tonne 1000 km via truck, giving 0.05-0.10 $/kg for a supermarket 500km away. Fruit prices at at least $4.5/kg for peaches, 3.75$/kg for apples 1.45$/kg. So transport cost seems negligible and if fruit is given away for free, it seems it would be very profitable for any supermarket in region to show up with a truck. What's missing in this analysis?</p>
]]></description><pubDate>Tue, 05 May 2026 20:20:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=48027959</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=48027959</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48027959</guid></item><item><title><![CDATA[New comment by lifis in "Softmax, can you derive the Jacobian? And should you care?"]]></title><description><![CDATA[
<p>It's equivalent to multiplying all inputs by log b. And multiplying all inputs by a value changes how much the probabilities are extremized. This is easy to see because adding a value to everything doesn't change the output, so the biggest input can be assumed to be 0 and others negative. So multiplying by 0 makes all outputs equal while as the multiplier tends to infinity, all other inputs tend to -infinity and thus the biggest output tends to 1 and others to 0. Multiplying by negative numbers results in the lowest becoming the highest.</p>
]]></description><pubDate>Fri, 01 May 2026 16:25:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47976617</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47976617</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47976617</guid></item><item><title><![CDATA[New comment by lifis in "For Linux kernel vulnerabilities, there is no heads-up to distributions"]]></title><description><![CDATA[
<p>The Linux kernel is not usable as a security boundary, so anyone who wants to do "shared hosting" and not be hacked needs to use something else, like gVisor or firecracker VMs<p>The only important system that uses it as a security boundary is Android and there is mitigated by the fact that APKs need user approval, plus strict SELinux and seccomp policy plus the GrapheneOS hardening, and in this case the mitigations succeeded (<a href="https://discuss.grapheneos.org/d/35110-grapheneos-is-protected-against-copy-fail-and-similar-vulnerabilities-by-selinux" rel="nofollow">https://discuss.grapheneos.org/d/35110-grapheneos-is-protect...</a>)</p>
]]></description><pubDate>Thu, 30 Apr 2026 18:55:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47966742</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47966742</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47966742</guid></item><item><title><![CDATA[New comment by lifis in "Apple Has Given Up on the Vision Pro After M5 Refresh Flop"]]></title><description><![CDATA[
<p>Well, that was quite predictable.<p>Absurdly high price for a novel device of unclear utility (a VR headset but incompatible with all existing VR software) resulting in few users.<p>No support for PC VR nor Android/Quest VR apps resulting in little software, no massive investment in getting Vision Pro specific software written, little interest in porting due to the few users.</p>
]]></description><pubDate>Thu, 30 Apr 2026 10:11:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47960373</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47960373</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47960373</guid></item><item><title><![CDATA[New comment by lifis in "Where the goblins came from"]]></title><description><![CDATA[
<p>And what do you think society/culture is?<p>It's a set of biases installed in people, whose purpose is mostly to replicate themselves.<p>Humans are MORE susceptible that LLMs, because LLMs's biases are easily steered to something else, unlike most humans.</p>
]]></description><pubDate>Thu, 30 Apr 2026 09:47:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47960215</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47960215</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47960215</guid></item><item><title><![CDATA[New comment by lifis in "Regression: malware reminder on every read still causes subagent refusals"]]></title><description><![CDATA[
<p>I think you can fix this by either patching the binary and replacing the offending prompt with an empty string, or by pointing the harness to an API proxy that filters it out</p>
]]></description><pubDate>Wed, 29 Apr 2026 11:35:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47946906</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47946906</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47946906</guid></item><item><title><![CDATA[New comment by lifis in "An AI agent deleted our production database. The agent's confession is below"]]></title><description><![CDATA[
<p>You don't seem to realize that humans also work this way.<p>If you ask a human why they did something, the answer is a guess, just like it is for an LLM.<p>That's because obviously there is no relationship between the mechanisms that do something and the ones that produce an explanation (in both humans and LLMs).<p>An example of evidence from Wikipedia, "split brain" article:<p>The same effect occurs for visual pairs and reasoning. For example, a patient with split brain is shown a picture of a chicken foot and a snowy field in separate visual fields and asked to choose from a list of words the best association with the pictures. The patient would choose a chicken to associate with the chicken foot and a shovel to associate with the snow; however, when asked to reason why the patient chose the shovel, the response would relate to the chicken (e.g. "the shovel is for cleaning out the chicken coop").[4]</p>
]]></description><pubDate>Mon, 27 Apr 2026 01:05:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47916622</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47916622</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47916622</guid></item><item><title><![CDATA[New comment by lifis in "Claude Code to be removed from Anthropic's Pro plan?"]]></title><description><![CDATA[
<p>On LMArena, Claude Opus is ranked as the best at everything except image and video generation, which it does not support. That may be inaccurate, but it's plausible</p>
]]></description><pubDate>Wed, 22 Apr 2026 03:46:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47858693</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47858693</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47858693</guid></item><item><title><![CDATA[New comment by lifis in "Claude Token Counter, now with model comparisons"]]></title><description><![CDATA[
<p>I'm really surprised that:<p>1. Anthropic has not published anything about why they made the change and how exactly they changed it<p>2. Nobody has reverse engineered it. It seems easy to do so using the free token counting APIs (the Google Vertex AI token count endpoint seems to support 2000 req/min = ~3million req/day, seems enough to reverse engineer it)</p>
]]></description><pubDate>Mon, 20 Apr 2026 08:29:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47831636</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47831636</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47831636</guid></item><item><title><![CDATA[New comment by lifis in "Android now stops you sharing your location in photos"]]></title><description><![CDATA[
<p>Obviously an image picker shouldn't leak filenames... The filename is a property of the directory entry storing the file storing the image. The image picker only grants access to the image, not to directories, directory entries or files.<p>If you want filenames, you need to request access to a directory, not to an image</p>
]]></description><pubDate>Mon, 13 Apr 2026 12:53:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47751273</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47751273</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47751273</guid></item><item><title><![CDATA[New comment by lifis in "All elementary functions from a single binary operator"]]></title><description><![CDATA[
<p>The paper somehow seems to be missing the most interesting part, i.e. the optimal constructions of functions from eml in a readable format.<p>Here is my attempt. I think they should be optimal up to around 15 eml.nodrs, the latter might not be:<p># 0<p>1=1<p># 1<p>exp(x)=eml(x,1)<p>e-ln(x)=eml(1,x)<p>e=exp(1)<p># 2<p>e-x=e-ln(exp(x))<p># 3<p>0=e-e<p>ln(x)=e-(e-ln(x))<p>exp(x)-exp(y)=eml(x,exp(exp(y)))<p># 4<p>id(x)=e-(e-x)<p>inf=e-ln(0)<p>x-ln(y)=eml(ln(x),y)<p># 5<p>x-y=x-ln(exp(y))<p>-inf=e-ln(inf)<p># 6<p>-ln(x)=eml(-inf,x)<p>ln(ln(x))=ln(ln(x))<p># 7<p>-x=-ln(exp(x))<p>-1=-1<p>x^-1=exp(-ln(x))<p>ln(x)+ln(y)=e-((e-ln(x))-ln(y))<p>ln(x)-ln(y)=ln(x)-ln(y) # using x - ln(y)<p># 8<p>xy=exp(ln(x)+ln(y))<p>x/y=exp(ln(x)-ln(y))<p># 9<p>x + y = ln(exp(x))+ln(exp(y))<p>2 = 1+1<p># 10<p>i<i>pi = ln(-1)<p># 13<p>-i</i>pi=-ln(-1)<p>x^y = exp(ln(x)<i>y)<p># 16<p>1/2 = 2^-1<p># 17<p>x/2 = x/2<p>x</i>2 = x<i>2<p># 20<p>ln(sqrt(x)) = ln(x)/2<p># 21<p>sqrt(x) = exp(ln(sqrt(x)))<p># 25<p>sqrt(xy) = exp((ln(x)+ln(y))/2)<p># 27<p>ln(i)=ln(sqrt(-1))<p># 28<p>i = sqrt(-1)<p>-pi^2 = (i</i>pi)<i>(i</i>pi)<p># 31<p>pi^2 = (i<i>pi)</i>(-i<i>pi)<p># 37<p>exp(x</i>i)=exp(x<i>i)<p># 44<p>exp(-x</i>i)=exp(-(x<i>i))<p># 46<p>pi = (i</i>pi)/i<p># 90+x?<p>2cos(x)=exp(x<i>i)+exp(-x</i>i))<p># 107+x?<p>cos(x) = (2cos(x))/2<p># 118+x?<p>2sin(x)=(exp(x*i)-exp(-xi))/i # using exp(x)-exp(y)<p># 145+x?<p>sin(x) = (2sin(x))/2<p># 217+3x?<p>tan(x) = 2sin(x)/(2cos(x))</p>
]]></description><pubDate>Mon, 13 Apr 2026 12:02:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47750793</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47750793</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47750793</guid></item><item><title><![CDATA[New comment by lifis in "Show HN: Claudraband – Claude Code for the Power User"]]></title><description><![CDATA[
<p>They have ACP servers but they might apply different rate limits or policies if they notice ACP use, while a solution like yours would not trigger that unless it becomes popular enough to specifically detect. It also seems this provides more features them just an ACP server.</p>
]]></description><pubDate>Sun, 12 Apr 2026 20:05:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47743859</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47743859</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47743859</guid></item><item><title><![CDATA[New comment by lifis in "Show HN: Claudraband – Claude Code for the Power User"]]></title><description><![CDATA[
<p>That's cool but by only supporting Claude Code you are contributing to the Anthropic lock-in problem.<p>This needs to support at least Gemini CLI, Codex and OpenCode as well, preferably by being generic as much as possible.</p>
]]></description><pubDate>Sun, 12 Apr 2026 19:43:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47743616</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47743616</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47743616</guid></item><item><title><![CDATA[New comment by lifis in "Surelock: Deadlock-Free Mutexes for Rust"]]></title><description><![CDATA[
<p>I can't understand why address instability is a problem: if a Mutex is moved, then it can't be locked (because you need to hold a borrow while locked, which impedes moving), so using addresses is perfectly fine and there is absolutely no need to use IDs.<p>Also the fact that it doesn't detect locking the same mutex twice makes no sense: a static order obviously detects that and when locking multiple mutexes at the same level all you need to do is check for equal consecutive addresses after sorting, which is trivial.<p>Overall it seems like the authors are weirdly both quite competent and very incompetent. This is typical of LLMs, but it doesn't seem ZlLM-made.</p>
]]></description><pubDate>Sat, 11 Apr 2026 18:17:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47732770</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47732770</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47732770</guid></item><item><title><![CDATA[New comment by lifis in "Investigating Split Locks on x86-64"]]></title><description><![CDATA[
<p>But why doesn't the CPU just lock two cachelines? Seems relatively easy to do in microcode, no? Just sort by physical address with a conditional swap and then run the "lock one cacheline algorithm" twice, no?<p>Perhaps the issue it that each core has a locked cacheline entry for each other core, but even then given the size of current CPUs doubling it shouldn't be that significant. And one could also add just a single extra entry and then have a global lock but that only locks the ability to lock a second cacheline.</p>
]]></description><pubDate>Sat, 11 Apr 2026 09:23:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=47728993</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47728993</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47728993</guid></item><item><title><![CDATA[New comment by lifis in "The difficulty of making sure your website is broken"]]></title><description><![CDATA[
<p>Vanadium, Chrome and Firefox (all for Android) all accept all the revoked certificates... But revoked.badssl.com is considered revoked</p>
]]></description><pubDate>Fri, 10 Apr 2026 18:15:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47721756</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47721756</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47721756</guid></item><item><title><![CDATA[New comment by lifis in "Securing Elliptic Curve Cryptocurrencies Against Quantum Vulnerabilities [pdf]"]]></title><description><![CDATA[
<p>I don't think you can steal Bitcoin with a quantum computer because the blockchain only stores the 256-bit hash of the public key, so you need to reverse that, which costs 2^128 with grover's algorithm</p>
]]></description><pubDate>Wed, 01 Apr 2026 00:09:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47595150</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47595150</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47595150</guid></item><item><title><![CDATA[New comment by lifis in "ChatGPT won't let you type until Cloudflare reads your React state"]]></title><description><![CDATA[
<p>Are you disabling them for paying subscribers?</p>
]]></description><pubDate>Mon, 30 Mar 2026 14:17:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47574702</link><dc:creator>lifis</dc:creator><comments>https://news.ycombinator.com/item?id=47574702</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47574702</guid></item></channel></rss>