<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: markasoftware</title><link>https://news.ycombinator.com/user?id=markasoftware</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 05 Apr 2026 16:27:22 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=markasoftware" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by markasoftware in "GPU memory snapshots: sub-second startup (2025)"]]></title><description><![CDATA[
<p>the thing is modal is running untrusted containers, so there's not really a concept of "some front facing" containers. Any container running an untrusted workload is at high risk / is "front facing".<p>If Modal's customers' workloads are mainly GPU-bound, then the performance hit of gvisor isn't as big as it might be for other workloads. GPU activity does have to go through the fairly heavyweight nvproxy to be executed on the host, but most gpu activity is longer-lived async calls like running kernels so a bit of overhead in starting / retrieving the results from those calls can be tolerated.</p>
]]></description><pubDate>Sat, 10 Jan 2026 20:54:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=46569841</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=46569841</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46569841</guid></item><item><title><![CDATA[New comment by markasoftware in "Unlocking free WiFi on British Airways"]]></title><description><![CDATA[
<p>I have a friend who did similar tunneling a while ago. It also works on cruise ships.<p>He discovered that on some airlines (I think American?), they use an advanced fortinet firewall that doesn't just look at the SNI -- it also checks that the certificate presented by the server has the correct hostname and is issued by a legit certificate authority.<p>My friend got around that restriction by making the tunnel give the aa.com SNI, and then forward a real server hello and certificate from aa.com (in fact I think he forwards the entire TLS 1.2 handshake to/from aa.com). But then as soon as the protocol typically would turn into encrypted application data, he ignores whatever he sent in the handshake and just uses it as an encrypted tunnel.<p>(The modern solution is just to use TLS 1.3, which encrypts the server certificate and hence prevents the firewall from inspecting the cert, reducing the problem back to just spoofing the SNI).</p>
]]></description><pubDate>Sat, 25 Oct 2025 04:09:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=45701304</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=45701304</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45701304</guid></item><item><title><![CDATA[New comment by markasoftware in "Ask HN: Abandoned/dead projects you think died before their time and why?"]]></title><description><![CDATA[
<p>if the world was all XHTML, then you wouldn't put an ad on your site that wasn't valid XHTML, the same way you wouldn't import a python library that's not valid python.</p>
]]></description><pubDate>Sun, 12 Oct 2025 14:17:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=45558398</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=45558398</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45558398</guid></item><item><title><![CDATA[New comment by markasoftware in "Should I choose Ada, SPARK, or Rust over C/C++? (2024)"]]></title><description><![CDATA[
<p>Their example of why Ada has better strong typing than Rust is that you can have floats for miles and floats for kilometers and not get them mixed up. News flash, Rust has newtype structs, and you can also do basically the same thing in C++.<p>I don't know much about Ada. Is its type system any better than Rust's?</p>
]]></description><pubDate>Mon, 06 Oct 2025 02:52:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=45487221</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=45487221</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45487221</guid></item><item><title><![CDATA[New comment by markasoftware in "Ultrasonic Chef's Knife"]]></title><description><![CDATA[
<p>I mostly agree that, as someone who cooks something intricate <10 times per year, a sharp knife is in fact more dangerous than a dull one.<p>Scott in the video makes the argument that sharp knives are safer, because you don't have to use as much force. But the only time I've ever cut myself with a knife in the kitchen have been with very sharp knives, eg one time handling it while washing the blade.</p>
]]></description><pubDate>Sun, 21 Sep 2025 13:48:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=45322713</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=45322713</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45322713</guid></item><item><title><![CDATA[New comment by markasoftware in "LLMs are still surprisingly bad at some simple tasks"]]></title><description><![CDATA[
<p>as soon as an LLM makes a significant mistake in a chat (in this case, when it identified the text as Romanian), throw away the chat (or delete/edit the LLMs response if your chat system allows this). The context is poisoned at this point.</p>
]]></description><pubDate>Sun, 21 Sep 2025 13:23:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=45322490</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=45322490</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45322490</guid></item><item><title><![CDATA[New comment by markasoftware in "Trump to impose $100k fee for H-1B worker visas, White House says"]]></title><description><![CDATA[
<p>per application, so per person</p>
]]></description><pubDate>Fri, 19 Sep 2025 20:29:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=45306165</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=45306165</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45306165</guid></item><item><title><![CDATA[New comment by markasoftware in "Show HN: The text disappears when you screenshot it"]]></title><description><![CDATA[
<p>same thing, but a game: <a href="https://brantagames.itch.io/motus" rel="nofollow">https://brantagames.itch.io/motus</a></p>
]]></description><pubDate>Thu, 18 Sep 2025 03:50:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=45285146</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=45285146</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45285146</guid></item><item><title><![CDATA[New comment by markasoftware in "Behind the scenes of Bun Install"]]></title><description><![CDATA[
<p>I'm pretty confused about why it's beneficial to wait to read the whole compressed file before decompressing. Surely the benefit of beginning decompression before the download is complete outweigh having to copy the memory around a few extra times as the vector is resized?</p>
]]></description><pubDate>Thu, 11 Sep 2025 21:22:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=45216243</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=45216243</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45216243</guid></item><item><title><![CDATA[New comment by markasoftware in "95% of AI Pilots Fail"]]></title><description><![CDATA[
<p>if 5% grows exponentially, it'll become 0.025%, then 0.00125%, ...</p>
]]></description><pubDate>Mon, 08 Sep 2025 16:51:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=45170617</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=45170617</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45170617</guid></item><item><title><![CDATA[New comment by markasoftware in "NPM debug and chalk packages compromised"]]></title><description><![CDATA[
<p>check marks in email clients usually mean DKIM / other domain verification passed. The attack author truly owns npmjs.help, so a checkmark is appropriate.</p>
]]></description><pubDate>Mon, 08 Sep 2025 16:46:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=45170542</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=45170542</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45170542</guid></item><item><title><![CDATA[New comment by markasoftware in "Anthropic agrees to pay $1.5B to settle lawsuit with book authors"]]></title><description><![CDATA[
<p>They also agreed to destroy the pirated books. I wonder how large of a portion of their training data comes from these shadow libraries, and if AI labs in countries that have made it clear they won't enforce anti-piracy laws against AI companies will get a substantial advantage by continuing to use shadow libraries.</p>
]]></description><pubDate>Fri, 05 Sep 2025 20:54:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=45143475</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=45143475</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45143475</guid></item><item><title><![CDATA[New comment by markasoftware in "Stripe Launches L1 Blockchain: Tempo"]]></title><description><![CDATA[
<p>exactly. This is the main value of the "web3" era of blockchains. There's absolutely no decentralization in the way they are governed. It's just enough decentralization so that it can be argued that the users are interacting with a piece of software that the developers wrote, rather than the developers themselves, so that way there's no legal relationship between the two.<p>That being said, I'm not entirely sure it's a bad thing...especially outside of the US/europe banking I get the impression that banking regulations are arbitrary and political and if all we get from crypto is escape from those regulations it may be worth the extra fraud and so on.</p>
]]></description><pubDate>Thu, 04 Sep 2025 18:34:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=45130650</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=45130650</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45130650</guid></item><item><title><![CDATA[New comment by markasoftware in "Nuclear: Desktop music player focused on streaming from free sources"]]></title><description><![CDATA[
<p>Half the time trying to play a song doesn't work. Dozens and dozens of javascript errors in the console, most of which seem to be legitimate (trying to parse xml as json, type errors, and other serious stuff). Electron. That's three strikes, I'm out.</p>
]]></description><pubDate>Wed, 03 Sep 2025 20:58:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=45120348</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=45120348</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45120348</guid></item><item><title><![CDATA[New comment by markasoftware in "Sometimes CPU cores are odd"]]></title><description><![CDATA[
<p>How come "let's use some cool cryptography to encrypt error messages" is being considered before "let's use a strongly typed language that even web developers are starting to become fond of" as a way to prevent issues in the future?</p>
]]></description><pubDate>Fri, 29 Aug 2025 03:51:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=45059955</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=45059955</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45059955</guid></item><item><title><![CDATA[New comment by markasoftware in "Google will allow only apps from verified developers to be installed on Android"]]></title><description><![CDATA[
<p>What bank is this? No bank I know /requires/ you to use a mobile app for anything; the web is enough. 2FA can usually be done via email, SMS, or a google-authenticator-compatible app.</p>
]]></description><pubDate>Tue, 26 Aug 2025 00:05:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=45020707</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=45020707</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45020707</guid></item><item><title><![CDATA[New comment by markasoftware in "I hacked Monster Energy"]]></title><description><![CDATA[
<p>This isn't security research, it's unauthorized hacking. Monster has no vulnerability disclosure program. It's completely illegal to try and gain unauthorized access without a VDP, even if you attempt to responsibly disclose your findings after the fact. And frankly, you didn't /responsibly/ disclose your findings, because you are publishing this while some of the vulnerabilities are still present. I reckon you have a 5% chance of ending up in jail because of this post.</p>
]]></description><pubDate>Sat, 23 Aug 2025 17:53:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=44997769</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=44997769</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44997769</guid></item><item><title><![CDATA[New comment by markasoftware in "Pixel 10 Phones"]]></title><description><![CDATA[
<p>I agree, but I got the Pixel 5 instead; the 5 is actually smaller while the screen size is larger due to the curved screen corners. It also has a fingerprint sensor, unlike the 4. That being said, I still miss the squeeze-activated flashlight on the 4.</p>
]]></description><pubDate>Wed, 20 Aug 2025 17:44:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=44964193</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=44964193</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44964193</guid></item><item><title><![CDATA[New comment by markasoftware in "StarDict sends X11 clipboard to remote servers"]]></title><description><![CDATA[
<p>a bloom filter look up is by hash, and given the relatively small set of words in english, it would be pretty easy for the server to reverse the hash sent to it. Thus a bloom filter wouldn't be very private.<p>Additionally, a typical spell checker feature is to provide alternative, correct, spellings, rather than just telling you whether a word is correctly spelled.<p>I bet there's some cool way to do this with zero-knowledge or homomorphic cryptography though!</p>
]]></description><pubDate>Tue, 12 Aug 2025 06:17:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=44873012</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=44873012</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44873012</guid></item><item><title><![CDATA[New comment by markasoftware in "Tor: How a military project became a lifeline for privacy"]]></title><description><![CDATA[
<p>nope they were both started within a year of each other. Lots of Tor fans will tell you that I2P is overly complicated. And indeed it seems to have had more vulnerabilities over the years.</p>
]]></description><pubDate>Sat, 09 Aug 2025 15:59:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=44847541</link><dc:creator>markasoftware</dc:creator><comments>https://news.ycombinator.com/item?id=44847541</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44847541</guid></item></channel></rss>