<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: m132</title><link>https://news.ycombinator.com/user?id=m132</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 17 Apr 2026 04:56:01 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=m132" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by m132 in "Users lose $9.5M to fake Ledger wallet app on the Apple App Store"]]></title><description><![CDATA[
<p>Censor, not moderate. Let's be honest.</p>
]]></description><pubDate>Wed, 15 Apr 2026 21:36:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=47785594</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47785594</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47785594</guid></item><item><title><![CDATA[New comment by m132 in "An Interview with Pat Gelsinger"]]></title><description><![CDATA[
<p>Was it Pat or Brian? If I recall correctly, it was under Brian when Intel had one of its worst periods of stagnation, when the 10 nm process all the bets were on turned out to be a non-starter, and when Meltdown and Spectre erupted. It's easy to overlook this because Intel had fairly no competition around then, but that doesn't mean the company was in a good shape.<p>I've always felt like Pat was a scapegoat who was chosen to clean up the mess when the whole place was already up in smoke and the smell was only starting to leak out. I liked his strategy, was disappointed to see him booted out.</p>
]]></description><pubDate>Sun, 12 Apr 2026 11:18:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47738382</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47738382</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47738382</guid></item><item><title><![CDATA[New comment by m132 in "Installing every* Firefox extension"]]></title><description><![CDATA[
<p>Brings back the memories of using Internet Explorer when every other installer was fighting for toolbar space!<p>Every Internet café had at least 2, with Ask.com, Google, Yahoo and later on, Bing being the main contenders.</p>
]]></description><pubDate>Sat, 11 Apr 2026 10:13:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47729229</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47729229</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47729229</guid></item><item><title><![CDATA[New comment by m132 in "Installing every* Firefox extension"]]></title><description><![CDATA[
<p>Loved the brutal realization that came when the seemingly broken Extensions button the author was mashing for solid 30 seconds turned out to be a fake, extension-supplied one. One... of three.</p>
]]></description><pubDate>Sat, 11 Apr 2026 10:07:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47729203</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47729203</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47729203</guid></item><item><title><![CDATA[New comment by m132 in "LittleSnitch for Linux"]]></title><description><![CDATA[
<p>I think you meant to reply to this: <a href="https://news.ycombinator.com/item?id=47702680">https://news.ycombinator.com/item?id=47702680</a><p>But if not, I'm not criticizing GNOME in isolation here. It's just what I use and what I'm most familiar with. KDE has the same issues and it does have an extension system too. It's called KNewStuff.</p>
]]></description><pubDate>Thu, 09 Apr 2026 13:35:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47703564</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47703564</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47703564</guid></item><item><title><![CDATA[New comment by m132 in "LittleSnitch for Linux"]]></title><description><![CDATA[
<p>I run all my systems with all outgoing connections blocked by default, and yes, it is annoying.<p>But it wasn't always this way, and so, I don't think it has to be. People just need to start paying attention to this.<p>The impact of a lot of those vulnerabilities would be mitigated if the affected programs didn't connect to the network in the first place.<p>As for updates in general, I really like the model adopted by Linux update managers and BSD port systems. The entire repository metadata is downloaded from a mirror and cached locally, so the search terms never leave your machine. Downloads happen from the nearest mirrors, there's no "standard" mirror software (unless rsync and Apache count?) so they don't report what was downloaded by whom back to any central system and you can always host your own. Everything is verified via GPG. And most importantly, nothing happens on its own; you're expected to run `apt/dnf update` yourself. It won't randomly eat your bandwidth on a metered connection or reveal your OS details to a public hotspot.<p>Simple, non-invasive, transparent, (almost) all-encompassing, and centrally configurable.</p>
]]></description><pubDate>Thu, 09 Apr 2026 13:31:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47703513</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47703513</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47703513</guid></item><item><title><![CDATA[New comment by m132 in "LittleSnitch for Linux"]]></title><description><![CDATA[
<p>Per se? No, maybe with the exception of GNOME Shell which literally runs code from the Internet unsandboxed. Can the traffic they silently generate be used for malicious purposes? Absolutely.</p>
]]></description><pubDate>Thu, 09 Apr 2026 10:04:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=47701517</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47701517</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47701517</guid></item><item><title><![CDATA[New comment by m132 in "LittleSnitch for Linux"]]></title><description><![CDATA[
<p>It's far from easy in the case of Firefox [0], and the last time I tried, some .mozilla.com domains would still get pinged. Chromium doesn't even have an official guide. The only options I found to be reliable are source-level patches, i.e. ungoogled-chromium and LibreWolf.<p>Note that LibreWolf still leaves some of the stuff on for you to manually disable (dom.push.connection.enabled, extension updates).<p>[0] <a href="https://support.mozilla.org/en-US/kb/how-stop-firefox-making-automatic-connections" rel="nofollow">https://support.mozilla.org/en-US/kb/how-stop-firefox-making...</a></p>
]]></description><pubDate>Thu, 09 Apr 2026 09:48:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47701400</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47701400</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47701400</guid></item><item><title><![CDATA[New comment by m132 in "LittleSnitch for Linux"]]></title><description><![CDATA[
<p>Run OpenSnitch for a while and you'll quickly realize how much of your system does phone home. Off the top of my head:<p>- GNOME Shell (extension updates without a way to disable this, weather),<p>- GNOME Calculator (currency exchange rates),<p>- NetworkManager (periodic hotspot portal checks in most configurations),<p>- GDB (debuginfod enabled by default),<p>- Firefox (extension updates, push notifications, feature flags, telemetry, ..., some parts cannot be disabled),<p>- VSCodium (Open VSX callbacks even when installing extensions from disk with updates disabled, JSON schema auto-downloads, extensions making their own unsolicited requests, ...),<p>- Electron (dictionary updates from Google servers, no way of disabling; includes any application running on top of upstream Electron, such as Signal, Discord, etc.),<p>- GoldenDict (audio samples fetched from the Internet on word look-up, no way to disable)<p>Of course, this is nothing compared to Windows [0] and macOS [1], but the malpractice of making Internet connections without asking, by default, has unfortunately been finding its way everywhere since modems stopped making audible sounds.<p>Having read about PRISM and seen the leaked dashboards of Paragon Graphite (said to be used by ICE), and with LLMs bridging the gap between mass and targeted surveillance, I don't want any of this.<p>[0] <a href="https://github.com/microsoft/calculator/blob/ffd0519676019a0475cd16db4423af0a9829a4ba/src/CalcViewModel/Common/TraceLogger.cpp" rel="nofollow">https://github.com/microsoft/calculator/blob/ffd0519676019a0...</a><p>[1] <a href="https://sneak.berlin/20201112/your-computer-isnt-yours/" rel="nofollow">https://sneak.berlin/20201112/your-computer-isnt-yours/</a></p>
]]></description><pubDate>Thu, 09 Apr 2026 09:22:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47701195</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47701195</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47701195</guid></item><item><title><![CDATA[New comment by m132 in "Project Glasswing: Securing critical software for the AI era"]]></title><description><![CDATA[
<p>I must say the combo of an em-dash stuck right in the middle of "it was never X, it was Y" made me chuckle</p>
]]></description><pubDate>Wed, 08 Apr 2026 08:10:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47686955</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47686955</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47686955</guid></item><item><title><![CDATA[New comment by m132 in "Run Linux containers on Android, no root required"]]></title><description><![CDATA[
<p>My bad, I must have confused it with something else. Yes, it uses ptrace; there definitely is some overhead around system calls, but that still should be better than running atop a full-scale CPU emulator. That being said, I haven't benchmarked it myself, just remember it being pretty snappy.<p>Thanks for your correction!</p>
]]></description><pubDate>Sun, 05 Apr 2026 00:39:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47645021</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47645021</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47645021</guid></item><item><title><![CDATA[New comment by m132 in "Show HN: TinyOS – A minimalist RTOS for Cortex-M written in C"]]></title><description><![CDATA[
<p>Honestly, maybe this is the problem.<p>A web-of-trust-like implementation of votes and flags, as suggested below, might be a solution, but I feel like it's an overkill. I've recently flagged a different clickbait submission, about Android Developer Verification, whose title suggested a significant update but that merely linked to the same old generic page about the anti-feature that was posted here months prior. Around 100 points too, before a mod stepped in, changed the title, and took it down.<p>Maybe the upvote button is just too easy to reach? I have a feeling that hiding it behind CSS :visited could make a massive difference.</p>
]]></description><pubDate>Sat, 04 Apr 2026 12:17:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47638381</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47638381</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47638381</guid></item><item><title><![CDATA[New comment by m132 in "Run Linux containers on Android, no root required"]]></title><description><![CDATA[
<p>This. Also, for phones that don't support Android virtualization, there's a user-space hack, part of Termux upstream, that allows for root-less chroots via LD_PRELOAD: <a href="https://wiki.termux.com/wiki/PRoot" rel="nofollow">https://wiki.termux.com/wiki/PRoot</a>.<p>systemd won't boot with this (needs to be PID 1), but a lot of software will work just fine and there's nearly zero emulation overhead.</p>
]]></description><pubDate>Sat, 04 Apr 2026 10:26:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47637758</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47637758</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47637758</guid></item><item><title><![CDATA[New comment by m132 in "Run Linux containers on Android, no root required"]]></title><description><![CDATA[
<p>But does it synergize paradigms?</p>
]]></description><pubDate>Sat, 04 Apr 2026 10:22:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47637743</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47637743</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47637743</guid></item><item><title><![CDATA[New comment by m132 in "Show HN: TinyOS – A minimalist RTOS for Cortex-M written in C"]]></title><description><![CDATA[
<p>Oh wow, was 60 just a while ago. Guess the dead Internet theory is no longer just a theory.</p>
]]></description><pubDate>Sat, 04 Apr 2026 03:32:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=47635415</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47635415</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47635415</guid></item><item><title><![CDATA[New comment by m132 in "Show HN: TinyOS – A minimalist RTOS for Cortex-M written in C"]]></title><description><![CDATA[
<p>> Runs on (your target hardware or environment)<p>Nice try, OpenClaw</p>
]]></description><pubDate>Sat, 04 Apr 2026 02:44:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47635144</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47635144</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47635144</guid></item><item><title><![CDATA[New comment by m132 in "Show HN: TinyOS – A minimalist RTOS for Cortex-M written in C"]]></title><description><![CDATA[
<p>The README mentions ARMv7-M, RISC-V, and AVR, but no actual SoCs or boards, and the source code contains unconditional inline assembly for Arm. Similarly, there are measurements of context switch time on RISC-V, while the scheduler is one big stub that doesn't even enter a task, only returns from itself using Arm-specific assembly [0]. The examples rely on this scheduler never returning, so there's no way any of them can run [1]. The bootloader is also a stub [2]. Not a single exception vector table, but plenty of LLM-style comments explaining every single line.<p>Others (well, two people really) have also noted the lack of a linker script, start-up code, and that the project doesn't even build.<p>82 points at the time of writing, which is 4 hours from the post's submission. Already on the main page. The only previous activity of the author? Two other vibe-coded projects of similar quality and a few comments with broken list formatting, suggesting that they were never even reviewed by a human prior to posting.<p>Does anybody read past the headline these days? Had my hopes higher for this site.<p>[0] <a href="https://github.com/cmc-labo/tinyos-rtos/blob/2a47496047fdb45f6f33246a33ef4fc9a5d7e4de/src/kernel.c#L164-L172" rel="nofollow">https://github.com/cmc-labo/tinyos-rtos/blob/2a47496047fdb45...</a><p>[1] <a href="https://github.com/cmc-labo/tinyos-rtos/blob/2a47496047fdb45f6f33246a33ef4fc9a5d7e4de/examples/blink_led.c#L84-L88" rel="nofollow">https://github.com/cmc-labo/tinyos-rtos/blob/2a47496047fdb45...</a><p>[2] <a href="https://github.com/cmc-labo/tinyos-rtos/blob/2a47496047fdb45f6f33246a33ef4fc9a5d7e4de/src/bootloader.c#L130-L152" rel="nofollow">https://github.com/cmc-labo/tinyos-rtos/blob/2a47496047fdb45...</a></p>
]]></description><pubDate>Sat, 04 Apr 2026 02:38:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47635094</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47635094</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47635094</guid></item><item><title><![CDATA[New comment by m132 in "Subscription bombing and how to mitigate it"]]></title><description><![CDATA[
<p>It's a problem, but I really dislike the solution. Putting a website with known security issues behind Cloudflare's Turnstile is comparable to enforcing code signing—works until it doesn't, and in the meantime, helps centralize power around a single legal entitiy while pissing legitimate users off.<p>The Internet was carefully designed to withstand a nuclear war and this approach, being adopted en masse, is slowly turning it into a shadow of its former self. And despite the us-east1 and multiple Cloudflare outages of last year, we continue to stay blind to this or even rationalize it as a good thing, because that way if we're down, then so are our competitors...</p>
]]></description><pubDate>Thu, 02 Apr 2026 05:09:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47610203</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47610203</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47610203</guid></item><item><title><![CDATA[New comment by m132 in "The Claude Code Leak"]]></title><description><![CDATA[
<p>Heh, the original being entirely vibed had me thinking of an interesting problem: if you used the same model to generate a specification, then reset the state and passed that specification back to it for implementation, the resulting code would by design be very close to the original. With enough luck (or engineering), you could even get the same exact files in some cases.<p>Does this still count as clean-room? Or what if the model wasn't the same exact one, but one trained the same way on the same input material, which Anthropic never owned?<p>This is going to be a decade of very interesting, and probably often hypocritical lawsuits.</p>
]]></description><pubDate>Thu, 02 Apr 2026 04:46:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47610095</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47610095</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47610095</guid></item><item><title><![CDATA[New comment by m132 in "Claude wrote a full FreeBSD remote kernel RCE with root shell"]]></title><description><![CDATA[
<p>Please at least read the context before attempting to correct me...<p>Here's what I'm referring to: <a href="https://github.com/califio/publications/blob/7ed77d11b21db800955e37dea42292a2627e0573/MADBugs/CVE-2026-4747/claude-prompts.txt" rel="nofollow">https://github.com/califio/publications/blob/7ed77d11b21db80...</a></p>
]]></description><pubDate>Wed, 01 Apr 2026 12:00:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=47599674</link><dc:creator>m132</dc:creator><comments>https://news.ycombinator.com/item?id=47599674</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47599674</guid></item></channel></rss>