<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: lvh</title><link>https://news.ycombinator.com/user?id=lvh</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 08 Apr 2026 03:48:44 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=lvh" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by lvh in "SQLite as an Application File Format"]]></title><description><![CDATA[
<p>"The operating system makes it easy to mess with" doesn't seem like a particularly useful property for application file formats.</p>
]]></description><pubDate>Fri, 28 Nov 2025 15:43:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=46079599</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=46079599</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46079599</guid></item><item><title><![CDATA[New comment by lvh in "Sguaba: Hard-to-misuse rigid body transforms for engineers"]]></title><description><![CDATA[
<p>That doesn't really explain <i>why</i>, you're just saying that the thin you claimed was desirable is desirable.<p>(I don't disagree! I'm just saying: you haven't advanced your argument or answered GP's question.)</p>
]]></description><pubDate>Sat, 31 May 2025 21:41:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=44147108</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=44147108</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44147108</guid></item><item><title><![CDATA[New comment by lvh in "Rippling suing Deel for espionage after Slack honeypot worked"]]></title><description><![CDATA[
<p>This is a fantastic example of applying deception strategies in practice as part of a detection & response plan. The most common use case is as a canary, but it absolutely works as evidence of compromise, too.<p>I won't comment on the specifics of the case (the complaint comes across as very convincing), but I will remind people that it's common for investigations to ostensibly show an employee doing bad things, when in reality it's e.g. that employee's credentials/devices that are compromised.</p>
]]></description><pubDate>Mon, 17 Mar 2025 16:32:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=43390247</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=43390247</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43390247</guid></item><item><title><![CDATA[New comment by lvh in "Datomic and Content Addressable Techniques"]]></title><description><![CDATA[
<p>Some of our customers, like Tailscale, are a helluva lot more picky than that.</p>
]]></description><pubDate>Mon, 16 Sep 2024 21:01:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=41560862</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=41560862</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41560862</guid></item><item><title><![CDATA[New comment by lvh in "Datomic and Content Addressable Techniques"]]></title><description><![CDATA[
<p>Re: hashing: Yes, but I'll leave that one to Paul who is a lot smarter than I am :)<p>Re: QA: can you say a bit more about the type of coverage you're worried about? Is your concern that we'd be missing APIs, or that the storage format itself breaks, resulting in fact elision? payne (the underlying project) has a borderline obnoxious amount of tests, but that doesn't mean we didn't miss anything :)</p>
]]></description><pubDate>Mon, 16 Sep 2024 19:42:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=41559826</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=41559826</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41559826</guid></item><item><title><![CDATA[New comment by lvh in "Datomic and Content Addressable Techniques"]]></title><description><![CDATA[
<p>FYI: we're planning a followup post for people who are less interested in the Datomic mechanics and more interested in the usefulness to investigations and other security functions. Informally, I think of it this way: your SIEM has the deltas, but often you want the contextual states in between the deltas (and a lot of investigation is about trying to reason about that state). We built this tool originally to support that, and it turned out that approach was also super useful for things like compliance, CSPM...<p>We already wrote a high level blog post here: <a href="https://www.latacora.com/blog/2023/11/01/our-approach-to-building-security-tooling/" rel="nofollow">https://www.latacora.com/blog/2023/11/01/our-approach-to-bui...</a> -- but the one I'm hoping to write is more of a case study.</p>
]]></description><pubDate>Mon, 16 Sep 2024 19:36:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=41559747</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=41559747</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41559747</guid></item><item><title><![CDATA[New comment by lvh in "Datomic and Content Addressable Techniques"]]></title><description><![CDATA[
<p>(I'm one of the founders of Latacora and reviewed the post.) If any of you are at Heart of Clojure, I'll be there both wearing my Latacora hat and my Clojurists Together hat :)</p>
]]></description><pubDate>Mon, 16 Sep 2024 19:34:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=41559715</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=41559715</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41559715</guid></item><item><title><![CDATA[Datomic and Content Addressable Techniques]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.latacora.com/blog/2024/09/13/datomic-and-content-addressable-techniques/">https://www.latacora.com/blog/2024/09/13/datomic-and-content-addressable-techniques/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41557345">https://news.ycombinator.com/item?id=41557345</a></p>
<p>Points: 166</p>
<p># Comments: 40</p>
]]></description><pubDate>Mon, 16 Sep 2024 15:53:33 +0000</pubDate><link>https://www.latacora.com/blog/2024/09/13/datomic-and-content-addressable-techniques/</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=41557345</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41557345</guid></item><item><title><![CDATA[New comment by lvh in "NSA releases 1982 Grace Hopper lecture"]]></title><description><![CDATA[
<p>I don't know if I count as a "feline friend", but: SIDH kept the DH shape. Being able to upgrade the protocols we had relatively closely is appealing. "Structure is useful but seems precarious" wasn't exactly secret knowledge.</p>
]]></description><pubDate>Tue, 27 Aug 2024 10:48:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=41366121</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=41366121</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41366121</guid></item><item><title><![CDATA[New comment by lvh in "NIST Announces Post-Quantum Cryptography Standards"]]></title><description><![CDATA[
<p>We did an updated version of the Cryptographic Right Answers for PQC. Given how quick the field is moving, I'm sure we're going to have to edit it a bunch :)<p><a href="https://www.latacora.com/blog/2024/07/29/crypto-right-answers-pq/" rel="nofollow">https://www.latacora.com/blog/2024/07/29/crypto-right-answer...</a></p>
]]></description><pubDate>Sat, 17 Aug 2024 10:51:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=41273463</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=41273463</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41273463</guid></item><item><title><![CDATA[New comment by lvh in "NIST Announces Post-Quantum Cryptography Standards"]]></title><description><![CDATA[
<p>These standards are developed out in the open.<p>Are you suggesting a true backdoor, or just "the NSA knows something about lattice algorithms the rest of us don't"?</p>
]]></description><pubDate>Sat, 17 Aug 2024 10:50:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=41273458</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=41273458</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41273458</guid></item><item><title><![CDATA[Cryptographic Right Answers: Post Quantum Edition]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.latacora.com/blog/2024/07/29/crypto-right-answers-pq/">https://www.latacora.com/blog/2024/07/29/crypto-right-answers-pq/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41254094">https://news.ycombinator.com/item?id=41254094</a></p>
<p>Points: 109</p>
<p># Comments: 52</p>
]]></description><pubDate>Thu, 15 Aug 2024 08:36:42 +0000</pubDate><link>https://www.latacora.com/blog/2024/07/29/crypto-right-answers-pq/</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=41254094</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41254094</guid></item><item><title><![CDATA[New comment by lvh in "Google lays off its Python team"]]></title><description><![CDATA[
<p>The additional information you need is that that's what Thomas Wouters does (and has done for as long as I've known them, which is many, many years).</p>
]]></description><pubDate>Sat, 27 Apr 2024 19:24:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=40182664</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=40182664</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40182664</guid></item><item><title><![CDATA[New comment by lvh in "ASML dethrones Applied Materials, becomes largest fab tool maker"]]></title><description><![CDATA[
<p>You should try C-f "Chinese".</p>
]]></description><pubDate>Wed, 21 Feb 2024 19:37:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=39458429</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=39458429</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39458429</guid></item><item><title><![CDATA[New comment by lvh in "Sam Altman seeking trillions for AI chip fabrication from UAE, others"]]></title><description><![CDATA[
<p>We're talking about chips: stuff optimized for inference and training. It may have a lot of memory, it may be able to perform a lot of operations, but it would be difficult for it to enforce high-level concepts like "woke ChatGPT".</p>
]]></description><pubDate>Fri, 09 Feb 2024 23:30:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=39321804</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=39321804</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39321804</guid></item><item><title><![CDATA[New comment by lvh in "Handbook of Applied Cryptography"]]></title><description><![CDATA[
<p>Thanks! I'm glad you liked it. Happy to answer any questions about that talk.</p>
]]></description><pubDate>Tue, 19 Dec 2023 23:08:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=38703222</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=38703222</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38703222</guid></item><item><title><![CDATA[New comment by lvh in "Prompt engineering"]]></title><description><![CDATA[
<p>How do you know this person (Tal Broda) made this? It doesn't seem to list an author.</p>
]]></description><pubDate>Fri, 15 Dec 2023 19:02:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=38657376</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=38657376</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38657376</guid></item><item><title><![CDATA[Our approach to building security tooling]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.latacora.com/blog/2023/11/01/our-approach-to-building-security-tooling/">https://www.latacora.com/blog/2023/11/01/our-approach-to-building-security-tooling/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=38532966">https://news.ycombinator.com/item?id=38532966</a></p>
<p>Points: 6</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 05 Dec 2023 16:25:50 +0000</pubDate><link>https://www.latacora.com/blog/2023/11/01/our-approach-to-building-security-tooling/</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=38532966</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38532966</guid></item><item><title><![CDATA[New comment by lvh in "Three chips in and Google Tensor is on life support"]]></title><description><![CDATA[
<p>They may often be used with small embedded computers, but 1 Coral TPU handily beats even a top-end CPU for the stuff Frigate needs it to do -- and it does it at minuscule power draw. Sure, it's inference-focused, and that means it has limitations: it sucks for e.g. speech models, too. But it's pretty great at what it does and gets used in real applications too. My guess is you saw the USB-C model, but they do M2, big cards with multiple M2 slots, and miniPCIe (popular in industrial applications) too.</p>
]]></description><pubDate>Mon, 27 Nov 2023 23:45:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=38440214</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=38440214</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38440214</guid></item><item><title><![CDATA[New comment by lvh in "Three chips in and Google Tensor is on life support"]]></title><description><![CDATA[
<p>They sold (and continue to sell) TPUs under the Coral brand, and they're pretty popular for edge inference (e.g. Frigate).</p>
]]></description><pubDate>Thu, 23 Nov 2023 12:12:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=38391919</link><dc:creator>lvh</dc:creator><comments>https://news.ycombinator.com/item?id=38391919</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38391919</guid></item></channel></rss>