<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: madars</title><link>https://news.ycombinator.com/user?id=madars</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 23 Apr 2026 12:14:42 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=madars" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[PropAMMs and the Next Chapter of Permissionless Market Structure]]></title><description><![CDATA[
<p>Article URL: <a href="https://jumpcrypto.com/resources/propamms-and-the-next-chapter-of-permissionless-market-structure">https://jumpcrypto.com/resources/propamms-and-the-next-chapter-of-permissionless-market-structure</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47801187">https://news.ycombinator.com/item?id=47801187</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 17 Apr 2026 00:27:46 +0000</pubDate><link>https://jumpcrypto.com/resources/propamms-and-the-next-chapter-of-permissionless-market-structure</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=47801187</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47801187</guid></item><item><title><![CDATA[New comment by madars in "HBO Obtains DMCA Subpoena to Unmask 'Euphoria' Spoiler Account on X"]]></title><description><![CDATA[
<p>Phrasing idiosyncrasies are publicly observable and anyone can note - as external observers did in Kaczynski or Hanssen cases - that a particular phrasing is quaint. It is probably true that Twitter is unlikely to run a browser fingerprinting query to de-anonymize someone tweeting spoilers from a softcore porn show. But a potential leaker has to ask: "how sure am I of that?"</p>
]]></description><pubDate>Sat, 11 Apr 2026 00:53:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47725951</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=47725951</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47725951</guid></item><item><title><![CDATA[New comment by madars in "HBO Obtains DMCA Subpoena to Unmask 'Euphoria' Spoiler Account on X"]]></title><description><![CDATA[
<p>There are so many more ways one could screw up, and you only need to screw up once. For example, does X do browser fingerprinting and did you ever use similar setup to use a more identifiable Twitter account? Are you using unique phrasings or behavioral patterns? These things can be solved to a satisfactory degree, but I don't think "it's not hard" captures it - for an average user it _is_ hard.</p>
]]></description><pubDate>Fri, 10 Apr 2026 22:02:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47724175</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=47724175</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47724175</guid></item><item><title><![CDATA[New comment by madars in "Who is Satoshi Nakamoto? My quest to unmask Bitcoin's creator"]]></title><description><![CDATA[
<p>A major problem with the article is the author's inability to weigh the evidence: actual evidence, like presence/absence pattern, is buried whereas p-hacking stylometry (let me try another expert, this one didn't give me what I wanted! let me feed him the Satoshi/Adam Back tells that I'm already in love with!) is majority of the article. It also includes absolute garbage like the vistomail spoof email during the block size wars. And, oh by the way, both Satoshi and Adam Back knew C++. Theranos evidence was binary (machines either work or they don't) but it is not so here and the author is simply out of his depth here.<p>It is sad - but entirely unsurprising - that NYT decided to paint a big target on someone's back just for clicks. Judith Miller-tier all over again. Miller too had real evidence and junk evidence, couldn't distinguish between the two, and editors wanted a flashy headline. Carreyrou has exactly the same problem here: NYT editors need multimedia events (like junk stylometry filtering - watch the number shrink from 34,000 to 562 to 114 to 56 to 8 to 1!!!) because that's what its audience-product relationship demands. I think it not unfair to say that modern Times' editorial culture has no mechanism for distinguishing rigorous inference from merely compelling narrative. Open the front page on a random day: how often do you see the Times staking credibility on a causal claim "A causes B" vs simply "X happened. Then Y came." vibes/parataxis.</p>
]]></description><pubDate>Wed, 08 Apr 2026 22:39:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47697161</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=47697161</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47697161</guid></item><item><title><![CDATA[Safeguarding cryptocurrency by disclosing quantum vulnerabilities responsibly]]></title><description><![CDATA[
<p>Article URL: <a href="https://research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/">https://research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47582418">https://news.ycombinator.com/item?id=47582418</a></p>
<p>Points: 88</p>
<p># Comments: 35</p>
]]></description><pubDate>Tue, 31 Mar 2026 03:28:03 +0000</pubDate><link>https://research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=47582418</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47582418</guid></item><item><title><![CDATA[Agreement with the Department of War]]></title><description><![CDATA[
<p>Article URL: <a href="https://twitter.com/sama/status/2027578580159631610">https://twitter.com/sama/status/2027578580159631610</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47189766">https://news.ycombinator.com/item?id=47189766</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 28 Feb 2026 03:13:24 +0000</pubDate><link>https://twitter.com/sama/status/2027578580159631610</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=47189766</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47189766</guid></item><item><title><![CDATA[New comment by madars in "Micropayments as a reality check for news sites"]]></title><description><![CDATA[
<p>Indeed, for any particular outcome you could design a custom protocol. In contrast, Radius gives you a generic execution environment. Going custom you lose EVM tooling, audited standard contracts, and every bespoke protocol needs its own security analysis, its own edge case handling, and its own integration work.<p>That said, the most important loss is composability: an agent can't take your Chaumian coupon escrow and snap it together with someone else's DvP protocol and a third party's rate-limiting wallet in a single atomic transaction. The power of a shared execution environment is that these interaction patterns don't need to be anticipated and designed around in advance. Agents aren't going to negotiate which custom protocol to use for every interaction (the necessary protocol might not even exist!), they will use shared infrastructure where composability of various primitives is the effortless default.</p>
]]></description><pubDate>Fri, 20 Feb 2026 01:25:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47082476</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=47082476</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47082476</guid></item><item><title><![CDATA[New comment by madars in "Micropayments as a reality check for news sites"]]></title><description><![CDATA[
<p>eCash is an answer to "can you move value privately?" (yes, with concessions). Radius is solving "can you execute a million conditional state transitions per second at sub-penny costs?" Blind signatures are still just value transfers and offer no expressivity. If your agent wants DvP with conditional logic, or trustless escrow that releases on programmatic conditions, Chaumian eCash doesn't help. LN gets you close to some forms of atomic exchange, but close-to-atomic isn't atomic, and neither gives you composability. You can move balances, but you can't orchestrate multi-step workflows that can't unwind in the middle.</p>
]]></description><pubDate>Fri, 20 Feb 2026 00:57:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47082244</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=47082244</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47082244</guid></item><item><title><![CDATA[New comment by madars in "Namecheap sued a YC founder personally after shutting down her startup's domain"]]></title><description><![CDATA[
<p>Alternative frontends:<p><a href="https://xcancel.com/snigdhasur/status/2014747997943238791" rel="nofollow">https://xcancel.com/snigdhasur/status/2014747997943238791</a><p><a href="https://nitter.poast.org/snigdhasur/status/2014747997943238791" rel="nofollow">https://nitter.poast.org/snigdhasur/status/20147479979432387...</a></p>
]]></description><pubDate>Sat, 24 Jan 2026 18:53:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=46746362</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=46746362</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46746362</guid></item><item><title><![CDATA[Memoria: A Technical Overview of Venice's Memory System]]></title><description><![CDATA[
<p>Article URL: <a href="https://venice.ai/blog/venice-memoria-technical-overview">https://venice.ai/blog/venice-memoria-technical-overview</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46739282">https://news.ycombinator.com/item?id=46739282</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 23 Jan 2026 23:15:42 +0000</pubDate><link>https://venice.ai/blog/venice-memoria-technical-overview</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=46739282</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46739282</guid></item><item><title><![CDATA[New comment by madars in "When "likers'' go private: Engagement with reputationally risky content on X"]]></title><description><![CDATA[
<p>There is only one type of "like" on X. Since June 2024, all likes (both historical and new) are hidden from profiles, but they aren't fully anonymous: post authors can still see who liked their content (unless the "liker" has a protected account the author doesn't follow).
Bookmarks are the only truly private engagement—no one, including the author, can see who bookmarked a post, though the public count still increases.
A retweet actively redistributes content to your followers; a like signals approval (the author will normally see it) and influences the algorithm without that same direct amplification. Prior to the June 2024 update, your feed also had likes from people you follow.</p>
]]></description><pubDate>Tue, 20 Jan 2026 21:14:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=46697831</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=46697831</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46697831</guid></item><item><title><![CDATA[On Cloudflare]]></title><description><![CDATA[
<p>Article URL: <a href="https://indiscretemusings.substack.com/p/on-cloudflare">https://indiscretemusings.substack.com/p/on-cloudflare</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46546527">https://news.ycombinator.com/item?id=46546527</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 08 Jan 2026 21:10:56 +0000</pubDate><link>https://indiscretemusings.substack.com/p/on-cloudflare</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=46546527</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46546527</guid></item><item><title><![CDATA[New comment by madars in "How China built its ‘Manhattan Project’ to rival the West in AI chips"]]></title><description><![CDATA[
<p>It's quite easy to do it yourself - just open archive.is and paste the original URL in.<p><a href="https://archive.is/tKZmn" rel="nofollow">https://archive.is/tKZmn</a><p>FWIW, this seems to be a Reuters report reprinted in Japan Times. Previous HN discussions got just a couple comments:<p><a href="https://news.ycombinator.com/item?id=46301877">https://news.ycombinator.com/item?id=46301877</a>
<a href="https://news.ycombinator.com/item?id=46307819">https://news.ycombinator.com/item?id=46307819</a></p>
]]></description><pubDate>Thu, 18 Dec 2025 19:47:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=46317639</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=46317639</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46317639</guid></item><item><title><![CDATA[New comment by madars in "A compact camera built using an optical mouse"]]></title><description><![CDATA[
<p>On Reddit, author says "The preview is shown at 20fps for a 3x scale image (90x90 pixels) and 50fps for a 1x scale image. This is due to the time it takes to read the image data from the sensor (~10ms) and the max write speed of the display.", and adds that optical mice motion tracking goes to 6400 fps for this sensor but you can't actually transmit image at that rate.<p><a href="https://old.reddit.com/r/electronics/comments/1olyu7r/i_made_a_camera_from_an_optical_mouse_30x30/nmma45z/" rel="nofollow">https://old.reddit.com/r/electronics/comments/1olyu7r/i_made...</a></p>
]]></description><pubDate>Sat, 06 Dec 2025 16:01:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=46174316</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=46174316</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46174316</guid></item><item><title><![CDATA[New comment by madars in "Search tool that only returns content created before ChatGPT's public release"]]></title><description><![CDATA[
<p>Yes, it works the same way even for content Google indexed at publication time. For example, here are chatgpt.com links that Google displays as being from 2010-2020, a period when Google existed but ChatGPT did not:<p><a href="https://www.google.com/search?q=site%3Achatgpt.com&tbs=cdr%3A1%2Ccd_min%3A1%2F1%2F2010%2Ccd_max%3A1%2F1%2F2020&tbm" rel="nofollow">https://www.google.com/search?q=site%3Achatgpt.com&tbs=cdr%3...</a><p>So it looks like Google uses inferred dates over its own indexing timestamps, even for recently crawled pages from domains that didn't exist during the claimed date range.</p>
]]></description><pubDate>Mon, 01 Dec 2025 07:42:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=46104600</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=46104600</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46104600</guid></item><item><title><![CDATA[New comment by madars in "Search tool that only returns content created before ChatGPT's public release"]]></title><description><![CDATA[
<p>Date displayed in Google Search results is often the self-described date from the document itself. Take a look at this "FOIA + before Jan 1, 1990" search: <a href="https://www.google.com/search?q=foia&tbs=cdr:1,cd_max:1/1/1990&start=10" rel="nofollow">https://www.google.com/search?q=foia&tbs=cdr:1,cd_max:1/1/19...</a><p>None of these documents were actually published on the web by then, incl., a Watergate PDF bearing date of Nov 21, 1974 - almost 20 years before PDF format got released. Of course, WWW itself started in 1991.<p>Google Search's date filter is useful for finding documents <i>about</i> historical topics, but unreliable for proving when information actually became publicly available online.</p>
]]></description><pubDate>Mon, 01 Dec 2025 05:18:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=46103734</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=46103734</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46103734</guid></item><item><title><![CDATA[New comment by madars in "Zero knowlege proof of compositeness"]]></title><description><![CDATA[
<p>That's a very good question. It all depends on how you pick the witness b: there is a procedure that definitely is <i>not</i> zero-knowledge: say, if prover uses his knowledge of factorization to construct an explicit b that betrays that factorization.<p>For example, if n = p1*p2*...*pk is square-free and not a Carmichael number, then by Korselt's criterion there exists a pi such that pi-1 does not divide n-1 (this also implies that pi>2). Use the Chinese Remainder Theorem to produce b such that b=1 (mod pj) for all j!=i, and b (mod pi) is a generator of (Z/piZ)^*. Then b is a Fermat witness: gcd(b, n) = 1 (because b is non-zero modulo every prime factor) and b^(n-1) != 1 (mod n) because b^(n-1) != 1 (mod pi) (as pi-1 does not divide n-1).<p>However, b "betrays" the prime factorization of n, since gcd(b-1, n)>1 (by construction b-1 is divisible by all pj with j!=i, but not divisible by pi>2), and thus gcd(b-1, n) is a non-trivial factor of n. (I assumed square-free above but if pi^ei (ei>=2) divides n, then b=1+pi^(ei-1) (mod pi^ei), b=1 (mod pj^ej) (j!=i) also would have worked.)<p>On the other hand, it is also known that for non-Carmichael numbers at least half of the bases b with gcd(b, n) = 1 are Fermat witnesses. So if you pick b uniformly at random, the verifier does not gain any new information from seeing b: they could have sampled such a witness themselves by running the same random test. Put another way, the Fermat test itself is an OK ingredient, but a prover who chooses b in a factorization-dependent way can absolutely leak the factors - the final protocol won't be ZK.</p>
]]></description><pubDate>Sat, 29 Nov 2025 19:26:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=46090059</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=46090059</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46090059</guid></item><item><title><![CDATA[New comment by madars in "Almost all Collatz orbits attain almost bounded values"]]></title><description><![CDATA[
<p>Good background reading/watching - Terence Tao's "The Notorious Collatz
conjecture" talk. <a href="https://www.youtube.com/watch?v=X2p5eMWyaFs" rel="nofollow">https://www.youtube.com/watch?v=X2p5eMWyaFs</a>
Slides: <a href="https://terrytao.wordpress.com/wp-content/uploads/2020/02/collatz.pdf" rel="nofollow">https://terrytao.wordpress.com/wp-content/uploads/2020/02/co...</a><p>I especially like how he highlights that Collatz conjecture shows that a simple dynamical system can have amazingly complex behavior; also 3n-1 variant has two known cycles - so "any proof of the Collatz conjecture must at some point use a property of the 3n+1 map that is not shared by the 3n-1 map." And this property can't be too general either - questions about FRACTRAN programs (of which Collatz conjecture is a special case) can encode the halting problem.<p>If you haven't seen it, FRACTRAN itself is amazing - <a href="https://www.cs.unc.edu/~stotts/COMP210-s23/madMath/Conway87.pdf" rel="nofollow">https://www.cs.unc.edu/~stotts/COMP210-s23/madMath/Conway87....</a> and the paper is pure joy to read.</p>
]]></description><pubDate>Sun, 23 Nov 2025 18:32:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=46026048</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=46026048</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46026048</guid></item><item><title><![CDATA[New comment by madars in "Satellites Are Leaking the Secrets"]]></title><description><![CDATA[
<p>Project website: <a href="https://satcom.sysnet.ucsd.edu/" rel="nofollow">https://satcom.sysnet.ucsd.edu/</a><p>Paper (CCS '25): <a href="https://satcom.sysnet.ucsd.edu/docs/dontlookup_ccs25_fullpaper.pdf" rel="nofollow">https://satcom.sysnet.ucsd.edu/docs/dontlookup_ccs25_fullpap...</a></p>
]]></description><pubDate>Tue, 14 Oct 2025 01:44:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=45575365</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=45575365</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45575365</guid></item><item><title><![CDATA[Satellites Are Leaking the Secrets]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.wired.com/story/satellites-are-leaking-the-worlds-secrets-calls-texts-military-and-corporate-data/">https://www.wired.com/story/satellites-are-leaking-the-worlds-secrets-calls-texts-military-and-corporate-data/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45575358">https://news.ycombinator.com/item?id=45575358</a></p>
<p>Points: 29</p>
<p># Comments: 2</p>
]]></description><pubDate>Tue, 14 Oct 2025 01:44:03 +0000</pubDate><link>https://www.wired.com/story/satellites-are-leaking-the-worlds-secrets-calls-texts-military-and-corporate-data/</link><dc:creator>madars</dc:creator><comments>https://news.ycombinator.com/item?id=45575358</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45575358</guid></item></channel></rss>