<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: michaelmior</title><link>https://news.ycombinator.com/user?id=michaelmior</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 16 May 2026 10:40:15 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=michaelmior" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by michaelmior in "Postmortem: TanStack NPM supply-chain compromise"]]></title><description><![CDATA[
<p>That depends on what the software is. If you want to run a service that bonds to a privileged port for example, you need sudo.</p>
]]></description><pubDate>Tue, 12 May 2026 08:57:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=48105853</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=48105853</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48105853</guid></item><item><title><![CDATA[New comment by michaelmior in "HERMES.md in commit messages causes requests to route to extra usage billing"]]></title><description><![CDATA[
<p>I don't think it's that simple, but I do think a lot of the problems mentioned are not inherent to the use of AI.</p>
]]></description><pubDate>Sat, 02 May 2026 01:22:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47982363</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47982363</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47982363</guid></item><item><title><![CDATA[New comment by michaelmior in "HERMES.md in commit messages causes requests to route to extra usage billing"]]></title><description><![CDATA[
<p>We have some very heavy users of Codex in my org and we're very happy with the quality (politics aside).</p>
]]></description><pubDate>Thu, 30 Apr 2026 22:44:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47969245</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47969245</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47969245</guid></item><item><title><![CDATA[New comment by michaelmior in "HERMES.md in commit messages causes requests to route to extra usage billing"]]></title><description><![CDATA[
<p>The problem in most of those cases is not specifically AI. Many of the issues you cited are related to Anthropic specifically and many could have been avoided with better testing.</p>
]]></description><pubDate>Thu, 30 Apr 2026 12:10:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47961273</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47961273</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47961273</guid></item><item><title><![CDATA[New comment by michaelmior in "Is my blue your blue? (2024)"]]></title><description><![CDATA[
<p>I'm not saying our experience is unimportant. I'm talking about how we communicate what colors are. I'm not an expert by any means, but it seems like the way we communicate a shared understanding of what colors are is based on observing things that are the same color. I just don't think we have a way of communicating our subjective view of what a color looks like without reference to some other color.</p>
]]></description><pubDate>Wed, 29 Apr 2026 17:05:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47951256</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47951256</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47951256</guid></item><item><title><![CDATA[New comment by michaelmior in "Is my blue your blue? (2024)"]]></title><description><![CDATA[
<p>The scenario you're describing seems like more of a language thing than a perception thing. We generally learn names of colors by references to common objects. I would argue that if people agree something is "Red, like a strawberry, tomato, or apple" then it doesn't really matter what you're seeing, that color is red.</p>
]]></description><pubDate>Mon, 27 Apr 2026 23:11:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47928533</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47928533</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47928533</guid></item><item><title><![CDATA[New comment by michaelmior in "Ollama is now powered by MLX on Apple Silicon in preview"]]></title><description><![CDATA[
<p>> no reason why future devices couldn't bundle 256GB of mem by default<p>Cost is a pretty big reason.</p>
]]></description><pubDate>Tue, 31 Mar 2026 18:21:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47591442</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47591442</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47591442</guid></item><item><title><![CDATA[New comment by michaelmior in "Ghostmoon.app – A Swiss Army Knife for your macOS menu bar"]]></title><description><![CDATA[
<p>This article[0] provides some details. Basically if you go through the lookup process on Apple's website and you don't have an existing D-U-N-S number, you can request one from D&B for free via Apple.<p>[0] <a href="https://support.pushpay.com/s/article/Acquire-your-D-U-N-S-number" rel="nofollow">https://support.pushpay.com/s/article/Acquire-your-D-U-N-S-n...</a></p>
]]></description><pubDate>Mon, 30 Mar 2026 13:12:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=47573865</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47573865</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47573865</guid></item><item><title><![CDATA[New comment by michaelmior in "Ask HN: Where have you found the coding limits of current models?"]]></title><description><![CDATA[
<p>At least part of that in my experience seems to be a desire to cover a number of edge cases that may not be practically relevant.</p>
]]></description><pubDate>Mon, 30 Mar 2026 13:07:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47573813</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47573813</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47573813</guid></item><item><title><![CDATA[New comment by michaelmior in "Ask HN: Where have you found the coding limits of current models?"]]></title><description><![CDATA[
<p>On this note, one thing I've found Codex to do is worry more than necessary about breaking changes for internal APIs. Maybe a bit more prompting would fix this, but I found even when iteratively implementing larger new features, it worries about breaking APIs that aren't used by anything but the new code yet.</p>
]]></description><pubDate>Mon, 30 Mar 2026 13:00:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47573725</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47573725</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47573725</guid></item><item><title><![CDATA[New comment by michaelmior in "Ask HN: Where have you found the coding limits of current models?"]]></title><description><![CDATA[
<p>One thing I've found that I've found super helpful for this is converting profiling results to Markdown and feeding it back into the agent in a loop. I've done it with a bit of manual orchestration, but it could probably be automated pretty well. Specifically, pprof-rs[0] and pprof-to-md[1] have worked pretty well for me, YMMV.<p>[0] <a href="https://github.com/tikv/pprof-rs" rel="nofollow">https://github.com/tikv/pprof-rs</a><p>[1] <a href="https://github.com/platformatic/pprof-to-md" rel="nofollow">https://github.com/platformatic/pprof-to-md</a></p>
]]></description><pubDate>Mon, 30 Mar 2026 12:58:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47573700</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47573700</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47573700</guid></item><item><title><![CDATA[New comment by michaelmior in "Schedule tasks on the web"]]></title><description><![CDATA[
<p>I worry about the costs from an energy and environmental impact perspective. I love that AI tools make me more productive, but I don't like the side effects.</p>
]]></description><pubDate>Fri, 27 Mar 2026 11:08:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47541222</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47541222</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47541222</guid></item><item><title><![CDATA[New comment by michaelmior in "I beg you to follow Crocker's Rules, even if you will be rude to me"]]></title><description><![CDATA[
<p>> This is the literal opposite of professionalism<p>I'm curious what definition the author is using of professionalism.</p>
]]></description><pubDate>Sat, 14 Mar 2026 11:53:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47375731</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47375731</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47375731</guid></item><item><title><![CDATA[New comment by michaelmior in "Cloudflare crawl endpoint"]]></title><description><![CDATA[
<p>> I'm surprised that Cloudflare hasn't started hosting a pre-scraped version of websites that use Cloudflare's proxy<p>It's entirely possible that they're doing this under the hood for cases where they can clearly identify the content they have cached is public.</p>
]]></description><pubDate>Tue, 10 Mar 2026 23:50:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47330251</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47330251</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47330251</guid></item><item><title><![CDATA[New comment by michaelmior in "TikTok will not introduce end-to-end encryption, saying it makes users less safe"]]></title><description><![CDATA[
<p>> The problem with that idea, that you are implying E2EE should require age verification.<p>I can understand why might draw that conclusion, but I would not personally support this.</p>
]]></description><pubDate>Fri, 06 Mar 2026 17:30:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47278169</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47278169</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47278169</guid></item><item><title><![CDATA[New comment by michaelmior in "TikTok will not introduce end-to-end encryption, saying it makes users less safe"]]></title><description><![CDATA[
<p>> Surrendering that autonomy is not.<p>Then you can avoid using platforms that do not offer E2EE.</p>
]]></description><pubDate>Fri, 06 Mar 2026 17:28:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47278149</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47278149</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47278149</guid></item><item><title><![CDATA[New comment by michaelmior in "TikTok will not introduce end-to-end encryption, saying it makes users less safe"]]></title><description><![CDATA[
<p>> Would it be a fair argument to say the police have a better opportunity to prevent crimes if they can enter your house without a warrant?<p>This is a false equivalency. I don't have to use TikTok DMs if I want E2EE. I don't have a choice about laws that allow the police to violate my rights. I'm not claiming that all E2EE apps should be banned.<p>> Right, but this is worlds apart from "sharing the encryption key with a private company", is it not?<p>Exactly why I suggested that as a possible alternative.</p>
]]></description><pubDate>Thu, 05 Mar 2026 00:54:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47256106</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47256106</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47256106</guid></item><item><title><![CDATA[New comment by michaelmior in "TikTok will not introduce end-to-end encryption, saying it makes users less safe"]]></title><description><![CDATA[
<p>> Are you suggesting all messaged photos should be scanned, and potentially viewed by humans, in case it depicts a nude minor?<p>No, I was not suggesting that.</p>
]]></description><pubDate>Thu, 05 Mar 2026 00:51:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47256086</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47256086</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47256086</guid></item><item><title><![CDATA[New comment by michaelmior in "TikTok will not introduce end-to-end encryption, saying it makes users less safe"]]></title><description><![CDATA[
<p>Yes, but this leaves the only way to identify this behavior as by reporting from a minor. I'm not saying I trust TikTok to only do good things with access to DMs, but I think it's a fair argument in this scenario to say that a platform has a better opportunity to protect minors if messages aren't encrypted.<p>I'm not saying no E2E messaging apps should exist, but maybe it doesn't need to for minors in social media apps. However, an alternative could be allowing the sharing of the encryption key with a parent so that there is the ability for <i>someone</i> to monitor messages.</p>
]]></description><pubDate>Wed, 04 Mar 2026 10:41:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47245662</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=47245662</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47245662</guid></item><item><title><![CDATA[New comment by michaelmior in "Ask HN: What are you working on? (February 2026)"]]></title><description><![CDATA[
<p>I have a side project of a new type of JSON database. Schema discovery is performed on the fly and that schema is then used to compress the stored data. This eliminates the need to use short key names to save space in addition to reducing overall storage requirements.</p>
]]></description><pubDate>Wed, 11 Feb 2026 08:40:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=46972432</link><dc:creator>michaelmior</dc:creator><comments>https://news.ycombinator.com/item?id=46972432</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46972432</guid></item></channel></rss>