<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: marshray</title><link>https://news.ycombinator.com/user?id=marshray</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 15 Apr 2026 04:48:48 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=marshray" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by marshray in "Trusted access for the next era of cyber defense"]]></title><description><![CDATA[
<p>"It's just a neutral tool" gets a lot harder to claim once a vendor starts specifically training and marketing the model for its ability to bypass security controls.<p>Yes, pentesting tools, even automated ones, are often legal. But they commonly do run up against legal restrictions and risks. They're marketed very differently from ChatGPT.</p>
]]></description><pubDate>Wed, 15 Apr 2026 00:25:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=47773196</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=47773196</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47773196</guid></item><item><title><![CDATA[New comment by marshray in "Franklin's bad ads for Apple II clones and the beloved impersonator they depict"]]></title><description><![CDATA[
<p>Selling clones of name-brand personal computers! What has this world come to?<p>I hope the courts will stamp out these Intellectual Property thieves quickly or they will become a real threat to computing.</p>
]]></description><pubDate>Tue, 14 Apr 2026 16:57:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=47768174</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=47768174</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47768174</guid></item><item><title><![CDATA[New comment by marshray in "AI will never be ethical or safe"]]></title><description><![CDATA[
<p>"AI will never be entirely ethical or safe because it's like having a knife, a gun, a hardware store, and a medical doctor, all in one convenient interface."</p>
]]></description><pubDate>Tue, 14 Apr 2026 16:40:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47767927</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=47767927</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47767927</guid></item><item><title><![CDATA[New comment by marshray in "AI will never be ethical or safe"]]></title><description><![CDATA[
<p>This argument is so bad that I have to wonder if it's an intentional a strawman. (I don't think it deserves to be flagged, however.)<p>It leads with "AI Will Never Be Ethical or Safe".<p>The first sentence is "AI will never be *entirely* ethical or safe."<p>It concludes with "AI is a tool, and it can be used in ethical and unethical, safe and unsafe ways" and compares them to "hardware store clerks".<p>Hardware stores are *specifically* places where society has had a centuries-long  conversation about risk and the products on sale represent a very intentional set of choices. In some parts of the US hardware stores used to sell dynamite, they don't anymore. That's the 'social contract' functioning in daily life.<p>"AI is like a tool one might buy from the hardware store" is, in most people's minds, the opposite of the opening premise.</p>
]]></description><pubDate>Tue, 14 Apr 2026 16:28:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47767759</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=47767759</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47767759</guid></item><item><title><![CDATA[New comment by marshray in "Open source CAD in the browser (Solvespace)"]]></title><description><![CDATA[
<p>> Could not locate file: "<a href="https://huggingface.co/campedersen/cad0-mini/resolve/main/onnx/model_quantized.onnx" rel="nofollow">https://huggingface.co/campedersen/cad0-mini/resolve/main/on...</a>"</p>
]]></description><pubDate>Tue, 31 Mar 2026 18:09:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47591290</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=47591290</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47591290</guid></item><item><title><![CDATA[New comment by marshray in "Analysis of Hedy Lamarr's Contribution to Spread-Spectrum Communication"]]></title><description><![CDATA[
<p>The thing approved by the patent office is 100% specific to a mechanism using two "moving" "elongated strips" to encode a sequence of frequency changes. It doesn't explain how they are kept synchronized, or provide a way to recover from loss of sync. Perhaps torpedoes were a case where an initial synchronization would work long enough.<p>As said before, the idea of coordinated frequency hopping was already known at the time.</p>
]]></description><pubDate>Sat, 08 Nov 2025 05:01:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=45854279</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=45854279</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45854279</guid></item><item><title><![CDATA[New comment by marshray in "Analysis of Hedy Lamarr's Contribution to Spread-Spectrum Communication"]]></title><description><![CDATA[
<p>There's only so big and often repeated that a false legal claim based on open records can get before someone who knows what they're looking at gets around to reading it.</p>
]]></description><pubDate>Sat, 08 Nov 2025 03:47:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=45853965</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=45853965</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45853965</guid></item><item><title><![CDATA[New comment by marshray in "Analysis of Hedy Lamarr's Contribution to Spread-Spectrum Communication"]]></title><description><![CDATA[
<p>Ouch.<p>From the article: "A letter on 3 October 1941 from the Lyon and Lyon attorney to Lamarr and Antheil says '...we rather doubted at the time that method claim 7 would be considered patentable, since the invention appears to reside more in a new apparatus than in a new method.' Thus, the attorney representing the applicants agreed with the patent examiner that the evidence was against Lamarr-Antheil’s definitive method claim to FHSS, which was claim 7."<p>This analysis makes it pretty clear that EFF's 1997 assertion that she and Antheil "developed and [...] patented the concept of 'frequency-hopping' that is now the basis for the spread spectrum radio systems" is flatly untrue.<p>This isn't to say that she wasn't an inventor or innovator, or didn't put together existing known techniques in a new way to address a relevant and interesting problem.</p>
]]></description><pubDate>Sat, 08 Nov 2025 03:40:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=45853929</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=45853929</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45853929</guid></item><item><title><![CDATA[New comment by marshray in "In 1979 one of the best guitar solos recorded was cut for radio time"]]></title><description><![CDATA[
<p>Wow, I'd never heard that before. That was really wonderful.<p>All those times I'd listened to it on the radio... I knew it was missing something.</p>
]]></description><pubDate>Thu, 11 Sep 2025 08:44:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=45209298</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=45209298</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45209298</guid></item><item><title><![CDATA[New comment by marshray in "BBC: UFO hit by hellfire, no impact on vehicle & flying away"]]></title><description><![CDATA[
<p>I find it very suspicious that the telemetry indicators are cropped. Typically when the military release drone footage, they are blurred.<p>After the object tumbles, an effect transition has been added. You can tell because it overlays the "Pause (Ctrl+P)" control and how blooms outside the cropped video frame. This strongly suggests that it's not actually a continuous time shot.<p>Perhaps:<p>- This video is of an ordinary cruise missile or drone.<p>- Its surface is very hot, making it appear as a blob.<p>- The so-called hellfire doesn't detonate for whatever reason<p>- The object tumbles and crashes, but the video is deceptively spliced.<p>I don't trust this Representative to not lie knowingly or evaluate such claims skeptically. Statements like "I'm not going to explain it to you, you'll see exactly what it does" and "This is when it's zoomed out, you can still see it traveling" seem to be careful wording meant to lead people to a conclusion without actually claiming it.</p>
]]></description><pubDate>Tue, 09 Sep 2025 21:34:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=45189546</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=45189546</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45189546</guid></item><item><title><![CDATA[New comment by marshray in "VLT observations of interstellar comet 3I/ATLAS II"]]></title><description><![CDATA[
<p>Let's put science teachers in charge of the youtube boost juice and see if the situation improves.</p>
]]></description><pubDate>Fri, 29 Aug 2025 06:38:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=45060927</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=45060927</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45060927</guid></item><item><title><![CDATA[New comment by marshray in "GMP damaging Zen 5 CPUs?"]]></title><description><![CDATA[
<p>The experiments comparing different paste and application methods I've seen only make 1-2 degree C difference. Which enthusiasts might care alot about, but most people wouldn't notice.</p>
]]></description><pubDate>Fri, 29 Aug 2025 01:36:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=45059045</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=45059045</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45059045</guid></item><item><title><![CDATA[New comment by marshray in "GMP damaging Zen 5 CPUs?"]]></title><description><![CDATA[
<p>A spot welder, basically.</p>
]]></description><pubDate>Thu, 28 Aug 2025 04:46:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=45048472</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=45048472</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45048472</guid></item><item><title><![CDATA[New comment by marshray in "GMP damaging Zen 5 CPUs?"]]></title><description><![CDATA[
<p>Clocking and changing register states requires charging and discharging the gate capacitance of a bunch of MOSFET transistors. The current that results from moving all that charge around encounters resistance, which converts it to heat. Silicon is only a "semi" conductor after all.<p>You are correct that there is energy bound in the information stored in the chip. But last I checked, our most efficient chips (e.g., using reversible computing to avoid wasting that energy) are still orders of magnitude less efficient than those theoretical limits.</p>
]]></description><pubDate>Thu, 28 Aug 2025 04:33:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=45048401</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=45048401</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45048401</guid></item><item><title><![CDATA[New comment by marshray in "GMP damaging Zen 5 CPUs?"]]></title><description><![CDATA[
<p>Clearly paste was squeezed out from the entire perimeter of the CPU. Offset mounting is used intentionally for this CPU.<p>Probably there's less paste remaining on the south end of the CPU because that's where the mounting force is greatest.<p>If anything, there's too much paste remaining on the center/north end of the CPU. Paste exists simply to bridge the roughness of the two metal surfaces, too much paste is a bad sign.<p>My guess is that the MB was oriented vertically and that big heavy heat sink with the large lever arm pulled it away from the center and north side of the CPU.<p>IMO, the CPU is still responsible for managing its power usage to live a long life. The only effect of an imperfect thermal solution ought to be proportionally reduced performance.</p>
]]></description><pubDate>Thu, 28 Aug 2025 04:24:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=45048371</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=45048371</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45048371</guid></item><item><title><![CDATA[New comment by marshray in "Unexpected productivity boost of Rust"]]></title><description><![CDATA[
<p>Probably the system interrupt table. Index 0 might reference the handler for the non-maskable interrupt NMI, often the same as a power-on reset.<p>I recall that on DOS, Borland Turbo C would detect writes to address 0 and print a message during normal program exit.</p>
]]></description><pubDate>Wed, 27 Aug 2025 22:23:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=45046092</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=45046092</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45046092</guid></item><item><title><![CDATA[New comment by marshray in "Malicious versions of Nx and some supporting plugins were published"]]></title><description><![CDATA[
<p>I like this aspect of cryptocurrency, in that it creates an incentive for attackers to research and burn 0-days for a lesser harm like coin mining.<p>> My gut tells me that these attacks must be happening in more subtle ways from time to time.<p>Dual_EC_DRBG plus TLS Extended Random come to mind.</p>
]]></description><pubDate>Wed, 27 Aug 2025 22:13:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=45045987</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=45045987</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45045987</guid></item><item><title><![CDATA[New comment by marshray in "Malicious versions of Nx and some supporting plugins were published"]]></title><description><![CDATA[
<p>From the perspective of the software vendor, it may be a semi-regular occurrence that they learn that users are being actively harmed by a software vulnerability exploited in-the-wild. So that's an argument that developers have a moral obligation to maintain the ability to push updates their users without delay.<p>Waiting for the user to click "Check for updates..." is effectively pushing this responsibility onto the users, the vast majority of whom lack the information and expertise needed to make an informed choice about the risk.</p>
]]></description><pubDate>Wed, 27 Aug 2025 22:04:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=45045903</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=45045903</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45045903</guid></item><item><title><![CDATA[New comment by marshray in "Malicious versions of Nx and some supporting plugins were published"]]></title><description><![CDATA[
<p>My personal belief is that users should not be required type their password into random applications, terminals, and pop-up windows. Of course, login screens can be faked too.<p>So my main user account does not have sudo permissions at all, I have a separate account for that.</p>
]]></description><pubDate>Wed, 27 Aug 2025 21:49:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=45045744</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=45045744</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45045744</guid></item><item><title><![CDATA[New comment by marshray in "Malicious versions of Nx and some supporting plugins were published"]]></title><description><![CDATA[
<p>Yes!<p>I sometimes set up a script that runs several variations on 'cargo tree', as well as collects various stats on output binary sizes, lines of code, licenses, etc.<p>The output is written to a .txt file that gets checked-in. This allows me to easily observe the 'weight' of adding any new feature or dependency, and to keep an eye on the creep over time as the project evolves.</p>
]]></description><pubDate>Wed, 27 Aug 2025 21:39:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=45045623</link><dc:creator>marshray</dc:creator><comments>https://news.ycombinator.com/item?id=45045623</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45045623</guid></item></channel></rss>