<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: loodish</title><link>https://news.ycombinator.com/user?id=loodish</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 23 Apr 2026 03:20:35 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=loodish" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by loodish in "How the heck does GPS work?"]]></title><description><![CDATA[
<p>The receiver frequency is generally assumed to be accurate. In practice the time quantization is the far bigger error and masks any frequency fault. That time quantization is why most receivers report an accuracy of 3m or 10ns.<p>The time correction is better thought of as the fixed offset between the receiver clock and the GPS clock.</p>
]]></description><pubDate>Wed, 22 Apr 2026 13:50:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47863628</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=47863628</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47863628</guid></item><item><title><![CDATA[New comment by loodish in "Ask HN: Is Linux Safe to Daily drive in 2026?"]]></title><description><![CDATA[
<p>Yes. Significantly safer than a Windows system in the default config.<p>If you expose a Windows server default install to the internet it will be compromised in days. (I don't know how. I do know AWS was very unimpressed with me.)<p>In contrast Linux systems are often set up that way without issue.</p>
]]></description><pubDate>Wed, 21 Jan 2026 00:25:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=46699630</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=46699630</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46699630</guid></item><item><title><![CDATA[New comment by loodish in "Photos capture the breathtaking scale of China's wind and solar buildout"]]></title><description><![CDATA[
<p>The finiteness of fossil fuels isn't real in a practical sense.<p>The globe burnt about 8.8 billion tons of coal in 2024.  Which is a huge amount. This is the peak, most estimates are that we will reduce from there.<p>Australia alone estimates that it has 147 billion tons of economically recoverable coal.  That is Australia alone could supply the entire globe at peak usage for over 16 years. And Australia only has about 14% of the globes coal reserves, we can keep burning coal at this pace for at least the next hundred years. And it a hundred years the scope of what we consider to be economically recoverable will have expanded greatly, further increasing our supply.<p>We will cook ourselves before we run out of fuel.</p>
]]></description><pubDate>Fri, 16 Jan 2026 01:41:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=46641993</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=46641993</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46641993</guid></item><item><title><![CDATA[New comment by loodish in "There were BGP anomalies during the Venezuela blackout"]]></title><description><![CDATA[
<p>There are much faster responses available.<p>For example France could gift or sell Denmark some nukes, possibly with a Rafale as a launch platform. Denmark would be an instant nuclear nation-state.<p>I'm not sure there is the political will though.</p>
]]></description><pubDate>Wed, 07 Jan 2026 00:38:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=46520992</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=46520992</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46520992</guid></item><item><title><![CDATA[New comment by loodish in "FFmpeg to Google: Fund us or stop sending bugs"]]></title><description><![CDATA[
<p>If you breach the LGPLv2/GPLv2 licence then you lose all rights to use the software.<p>There's no penalty clause, there's no recovery clause.  If you don't comply with the licence conditions then you don't have a licence. If you don't have a licence then you can't use the program, any version of the program. And if your products depend on that program then you lose your products.<p>The theoretical email would be a notification that they had breached the licence and could no longer use the software.  The obvious implication being that AWS was wanting to do something that went contrary to the restrictions in the GPL, and he was trying to convince them not to.</p>
]]></description><pubDate>Wed, 12 Nov 2025 12:14:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=45899217</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=45899217</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45899217</guid></item><item><title><![CDATA[New comment by loodish in "Avoid 2:00 and 3:00 am cron jobs (2013)"]]></title><description><![CDATA[
<p>I like cron jobs that run during the work day. If something goes wrong I would prefer to handle it at 10am rather than 10pm. Why make life unpleasant?<p>If it really needs to run during a low load period I line it up for 6am work time. Again so that if something goes wrong it leads into the work day rather than disrupts the on-call too badly. 6am also provides a daylight savings buffer either way so you don't have to care. Recent work has all been on 24/7 operations though.</p>
]]></description><pubDate>Mon, 27 Oct 2025 23:43:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=45727686</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=45727686</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45727686</guid></item><item><title><![CDATA[New comment by loodish in "10M people watched a YouTuber shim a lock; the lock company sued him – bad idea"]]></title><description><![CDATA[
<p>Folks that really care about security go for tamper evidence.<p>For example you can get a filing cabinet which has a lock and a counter that ticks every time it is opened. You pair it with a clipboard where you note the counter count, why you opened it and sign.<p>It can be picked, that can't be avoided. But the act of opening it creates a trail which can be detected. Adding a false clipboard entry is detected by subsequent users, there typically aren't many people with access.<p>Determining that you have a breach allows it to be investigated, mitigated. The lock is an important part of that, but it isn't perfectly secure so you manage that flaw.<p>Of course filing cabinets are getting rare and replaced by digital document stores, with their own auditing and issues.</p>
]]></description><pubDate>Mon, 27 Oct 2025 22:58:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=45727325</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=45727325</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45727325</guid></item><item><title><![CDATA[New comment by loodish in "Show HN: OpenSnowcat – A fork of Snowplow to keep open analytics alive"]]></title><description><![CDATA[
<p>I understand that being a fork of Snowplow is how you define yourself, but there's actually nothing on the webpage that provides any detail of what the product does, other than "event pipeline" right up the top.<p>I suggest putting at least some content on the website about what you do so that people can find you when looking for solutions in the industry, rather than having them adopt Snowplow and then splinter off later. I understand that your main focus is snowcatcloud.com which does have info putting some on opensnowcat.io will greatly enhance its discoverability.<p>Especially as the splinter strategy is going to become increasingly harder as people who care about open source won't adopt Snowplow to begin with, and people who don't care won't leave it.</p>
]]></description><pubDate>Thu, 23 Oct 2025 22:51:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=45688434</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=45688434</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45688434</guid></item><item><title><![CDATA[New comment by loodish in "TODOs aren't for doing"]]></title><description><![CDATA[
<p>Absolutely. The ability to search for these flags before a commit, during a review or release is so valuable.</p>
]]></description><pubDate>Wed, 23 Jul 2025 01:46:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=44654975</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=44654975</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44654975</guid></item><item><title><![CDATA[New comment by loodish in "Man pages are great, man readers are the problem"]]></title><description><![CDATA[
<p>The vanilla vim version is<p><pre><code>    MANPAGER="vim +MANPAGER --not-a-term -"
</code></pre>
Documentation can be found via :help manpager.vim</p>
]]></description><pubDate>Thu, 10 Apr 2025 00:38:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=43639493</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=43639493</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43639493</guid></item><item><title><![CDATA[New comment by loodish in "The order of files in /etc/ssh/sshd_config.d/ matters"]]></title><description><![CDATA[
<p>The .d directories make management via tools such as ansible much much easier.<p>You don't have weird file patching going on with the potential to mess things up in super creative ways if someone has applied a hand edit.<p>With .d directories you have a file, you drop in that file, you manage that file, if that file changes then you change it back.</p>
]]></description><pubDate>Sun, 06 Apr 2025 07:36:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=43599636</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=43599636</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43599636</guid></item><item><title><![CDATA[New comment by loodish in "Why Ruby on Rails still matters"]]></title><description><![CDATA[
<p>Graphql is nice but there are all sorts of weird attacks and edge cases because you don't actually control the queries that a client can send. This allows a malicious client to craft really time expensive queries.<p>So you end up having to put depth and quantity limits, or calculating the cost of every incoming query before allowing it. Another approach I'm aware of is whitelisting but that seems to defeat the entire point.<p>I use rest for new projects, I wouldn't say never to graphql, but it brings a lot of initial complexity.</p>
]]></description><pubDate>Sat, 22 Feb 2025 12:29:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=43138410</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=43138410</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43138410</guid></item><item><title><![CDATA[New comment by loodish in "The European Vat Is Not a Discriminatory Tax Against US Exports"]]></title><description><![CDATA[
<p>By this logic an American state should remit the sales tax they collect on imported cars back to Germany. The Germans would probably love this, twice as many German products are sold in the US as US products sold in Germany.<p>Sales Tax, Value Added Tax, Goods and Services Tax, are all taxes on consumption. They are paid by the consumer at the location of the consumption. They aren't a tax on production or producers.</p>
]]></description><pubDate>Sat, 15 Feb 2025 22:31:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=43063098</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=43063098</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43063098</guid></item><item><title><![CDATA[New comment by loodish in "The impact of competition and DeepSeek on Nvidia"]]></title><description><![CDATA[
<p>AMR (adaptive multi-rate audio codec) can get down to 4.75 kbit/s when there's low bandwidth available, which is typically what people complain about as being terrible quality.<p>The speech codecs are complex and fascinating, very different from just doing a frequency filter and compressing.<p>The base is linear predictive coding, which encodes the voice based on a simple model of the human mouth and throat. Huge compression but it sounds terrible. Then you take the error between the original signal and the LPC encoded signal, this waveform is compressed heavily but more conventionally and transmitted along with the LPC signal.<p>Phones also layer on voice activity detection, when you aren't talking the system just transmits noise parameters and the other end hears some tailored white noise.  As phone calls typically have one person speaking at a time and there are frequent pauses in speech this is a huge win. But it also makes mistakes, especially in noisy environments (like call centers, voice calls are the business, why are they so bad?). When this happens the system becomes unintelligible because it isn't even trying to encode the voice.</p>
]]></description><pubDate>Tue, 28 Jan 2025 00:28:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=42847521</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=42847521</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42847521</guid></item><item><title><![CDATA[New comment by loodish in "Hezbollah pager explosions kill several people in Lebanon"]]></title><description><![CDATA[
<p>The implications of weaponising a lithium battery, which seems like what was done, are potentially really significant.<p>Lithium batteries are everywhere, most of them significantly larger than the one in a small pager. This includes secure environments like military/intelligence facilities and aircraft.<p>Proof that a lithium battery pack can be weaponised as a bomb, in a way that avoids easy detection, should be a significant concern to anyone who tries to maintain the security of those spaces.</p>
]]></description><pubDate>Tue, 17 Sep 2024 23:20:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=41573923</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=41573923</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41573923</guid></item><item><title><![CDATA[New comment by loodish in "Hezbollah pager explosions kill several people in Lebanon"]]></title><description><![CDATA[
<p>> I would imagine the rewards of silent surveillance (tracking, audio) would be of much higher value than this kind of attack where 3 out of 1000s targets were killed.<p>The reason they were using pagers, as opposed to phones, was to avoid exactly this kind of potential attack.<p>Pagers are (typically) a broadcast technology, the pager has no transmission capability.  A page is broadcast from every tower, it has no idea where the receiver is. A targeted page is done by the receiver filtering out and ignoring pages that it isn't the recipient for (eavesdropping all pages is trivial).<p>The pager device is simple, it doesn't contain a GPS or have any concept of it's own location. No microphone or audio capability, very little processing capability.  And adding such capability with something like a bug would be reasonably apparent to anyone opening one up and inspecting it.</p>
]]></description><pubDate>Tue, 17 Sep 2024 23:07:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=41573849</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=41573849</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41573849</guid></item><item><title><![CDATA[New comment by loodish in "Hezbollah pager explosions kill several people in Lebanon"]]></title><description><![CDATA[
<p>Shorting the battery would probably cause an explosion in around one minute. That's close enough to simultaneous.<p>From <a href="https://www.mdpi.com/2313-0105/8/11/201" rel="nofollow">https://www.mdpi.com/2313-0105/8/11/201</a><p>A puncture causes runaway/explosion in seconds. Overcharging takes 13 minutes. There's not good data on a dead short (because it's unlikely during normal operation), but it's going to be between those on the faster end. From personal experience a shorts cause things to get noticeably hot after about 10 seconds, the graphs show that once you hit 60C things rapidly get worse.<p>A relay may have been required to hold the short as the battery stops supplying voltage.</p>
]]></description><pubDate>Tue, 17 Sep 2024 22:57:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=41573772</link><dc:creator>loodish</dc:creator><comments>https://news.ycombinator.com/item?id=41573772</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41573772</guid></item></channel></rss>