<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: mimd</title><link>https://news.ycombinator.com/user?id=mimd</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 09 Apr 2026 12:16:30 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=mimd" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by mimd in "I quit. The clankers won"]]></title><description><![CDATA[
<p>Considering that the rant is using photos from Star Trek and Oliver Twist to make their points, copyrighted material with no indication of permission, they're less "creative" than a stochastic parrot.</p>
]]></description><pubDate>Thu, 02 Apr 2026 16:35:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47616722</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=47616722</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47616722</guid></item><item><title><![CDATA[New comment by mimd in "We tasked Opus 4.6 using agent teams to build a C Compiler"]]></title><description><![CDATA[
<p>I'm annoyed at the cost statement, as that's the sleight of hand. "$20000" at current pricing. Add some orders of magnitude to the costs and you'll get your true price you'll have to pay when the VC money starts to wear off. 2nd, this is ignoring the dev time that he/others put in over multiple iterations of this project (opus 4, opus 4.5) and all the other work to create the scaffolding for it, and all the millions/tens of millions of dollars of hand written test suits (linux kernel, gcc, doom, sqlite, etc) he got to use to guide the process. So add some more cost on top of that orders of magnitude increase and the dev time is <i>probably</i> a couple months/years more than "2 weeks".<p>And this is just working off the puff pieces statements, and not even diving into the code to see it's limits/origins, etc. I also don't see the scaffold in the repo, as that's where the effort is.<p>But still it's not surprising, from my own experience, given a rigorously definable problem, enough effort, grunt work, and massaging, you can get stuff out of the current models.</p>
]]></description><pubDate>Fri, 06 Feb 2026 16:53:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=46915187</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=46915187</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46915187</guid></item><item><title><![CDATA[New comment by mimd in "European Commission issues call for evidence on open source"]]></title><description><![CDATA[
<p>Opensource is a bit more complex than being a "public good". They're focusing on the low cost as a jump starting point, which make me doubt their sincerity/understanding about managing that relationship healthily.</p>
]]></description><pubDate>Fri, 09 Jan 2026 14:27:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=46554184</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=46554184</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46554184</guid></item><item><title><![CDATA[New comment by mimd in "US will ban Wall Street investors from buying single-family homes"]]></title><description><![CDATA[
<p>It's not going to solve the housing issue and is mostly for press (and it's not even getting into ulterior motives), but it might help with preventing a longer term issue of large investors becoming a major issue. Additionally, I wonder about the choice in properties as properties aren't fungible.</p>
]]></description><pubDate>Thu, 08 Jan 2026 16:23:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=46542861</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=46542861</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46542861</guid></item><item><title><![CDATA[New comment by mimd in "Linux Kernel Rust Code Sees Its First CVE Vulnerability"]]></title><description><![CDATA[
<p>Huzzah! You made it to the big leagues Rust! Come join C over here with the "CookiesVE".</p>
]]></description><pubDate>Wed, 17 Dec 2025 21:49:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=46306018</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=46306018</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46306018</guid></item><item><title><![CDATA[New comment by mimd in "Git: Introduce Rust and announce it will become mandatory in the build system"]]></title><description><![CDATA[
<p>I suggest waiting till the gcc side matures, with the minimum of a working gcc frontend for a non optional dependency. Optional dependencies with gcc_codegen might be okay. Git is pretty core to a lot of projects, and this change is risky, it's on a fairly short time frame to make it a core dep (6 months?).</p>
]]></description><pubDate>Sat, 20 Sep 2025 20:19:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=45317025</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=45317025</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45317025</guid></item><item><title><![CDATA[New comment by mimd in "Why Archers Didn't Volley Fire"]]></title><description><![CDATA[
<p>Rudimentary analysis of five battles spread out over a 1500 year period; supposedly supporting sources that upon examination state their unsureness; stating propaganda casualty numbers without a hint of irony to justify; allows you to unequivocally state that no one did volly fire? Ugh.</p>
]]></description><pubDate>Mon, 05 May 2025 16:56:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=43897097</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=43897097</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43897097</guid></item><item><title><![CDATA[New comment by mimd in "Greg K-H: "Writing new code in Rust is a win for all of us""]]></title><description><![CDATA[
<p>No, it can track pointer bounds and validity across functions. It also targets identifying cases of UB via eva. Both rust and frama-C rely on assertions to low level memory functions. Rust has the same gaping UB hole in unsafe that can cross into safe.<p>If we are talking about more than memory, such as what greg is talking about in encoding operational properties then no, rust is far behind both frama-C, Spark, and tons of others. They can prove functional correctness. Or do you think miri, kani, cruesot, and the rest of the FM tools for Rust are superfluous?<p>My mocking was that that the kernel devs have had options for years and have ignored them out of dislike (ada and spark) or lack of effort (frama-C). That other options provide better solutions to some of their intrests. And that this is more a project exercise in getting new kernel blood than technical merits.</p>
]]></description><pubDate>Fri, 21 Feb 2025 10:29:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=43125994</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=43125994</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43125994</guid></item><item><title><![CDATA[New comment by mimd in "Greg K-H: "Writing new code in Rust is a win for all of us""]]></title><description><![CDATA[
<p>Yes, I know the policy that has been stated and the recent docs on it (<a href="https://rust-for-linux.com/rust-kernel-policy" rel="nofollow">https://rust-for-linux.com/rust-kernel-policy</a>). A good portion of the R4L group were trying to avoid this scenario due the toxicity of such a change (especially at this early contentious point, and despite what their online advocates want). I don't think the policy will immediatly change because of his statements, but I find it pretty clear that this is where he wants the project to go.</p>
]]></description><pubDate>Fri, 21 Feb 2025 02:19:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=43123295</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=43123295</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43123295</guid></item><item><title><![CDATA[New comment by mimd in "Greg K-H: "Writing new code in Rust is a win for all of us""]]></title><description><![CDATA[
<p>"But for new code / drivers..." encompasses more than just "drivers" and refers to all new code. I doubt it's a mistake either due to the way the rest of the email is written. And Greg said "no one sane ever thought that (force anyone to learn rust)" just 5 months ago (<a href="https://lkml.org/lkml/2024/8/29/312" rel="nofollow">https://lkml.org/lkml/2024/8/29/312</a>). But he is now telling his C devs they will need to learn and code rust to make new code in the kernel.</p>
]]></description><pubDate>Thu, 20 Feb 2025 14:59:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=43115472</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=43115472</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43115472</guid></item><item><title><![CDATA[New comment by mimd in "Greg K-H: "Writing new code in Rust is a win for all of us""]]></title><description><![CDATA[
<p><a href="https://llvm.org/devmtg/2023-05/slides/TechnicalTalks-May11/01-Na-fbounds-safety.pdf" rel="nofollow">https://llvm.org/devmtg/2023-05/slides/TechnicalTalks-May11/...</a><p>Supposedly ~5% (1-29%), but I'm testing my own projects to verify (my guess is higher at 10-20%, but will depend on the code). Supposedly it's to land in gcc at some point but I dunno the time table.</p>
]]></description><pubDate>Wed, 19 Feb 2025 23:45:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=43109309</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=43109309</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43109309</guid></item><item><title><![CDATA[New comment by mimd in "Greg K-H: "Writing new code in Rust is a win for all of us""]]></title><description><![CDATA[
<p>Yes, panicking in kernels is bad. I've followed the whole R4L fight about working around it.<p><a href="https://github.com/apple-oss-distributions/xnu/blob/main/doc/building/bound_checks.md">https://github.com/apple-oss-distributions/xnu/blob/main/doc...</a><p><a href="https://github.com/apple-oss-distributions/xnu/blob/main/doc/building/bound_checks.md#where-bound-checks-soft-comes-in">https://github.com/apple-oss-distributions/xnu/blob/main/doc...</a><p>Upstream fbounds in xnu has options for controlling if it panics or is just a telemetry event. They are in a kernel situation and have the exact same considerations on trying to keep the kernel alive.</p>
]]></description><pubDate>Wed, 19 Feb 2025 22:30:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=43108594</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=43108594</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43108594</guid></item><item><title><![CDATA[New comment by mimd in "Greg K-H: "Writing new code in Rust is a win for all of us""]]></title><description><![CDATA[
<p>Isn't this a bait and switch, that all the c kernel devs were complaining about? That it wouldn't be just drivers but also all new kernel code? The lack of candor over the goal of R4L and downplaying of other potential solutions should give any maintainer (including potential rust ones) pause.<p>Anyway, why just stop at rust? If we really care about safety, lets drop the act and go make everyone do formal methods. Frama-C is at least C, has a richer contract language, has heavy static analysis tools before having to go to proofs, is much more proven, and the list goes on. Or, why not add Spark to the codebase if we are okay with mixing langs in the codebase? Its very safe.</p>
]]></description><pubDate>Wed, 19 Feb 2025 22:15:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=43108450</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=43108450</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43108450</guid></item><item><title><![CDATA[New comment by mimd in "Greg K-H: "Writing new code in Rust is a win for all of us""]]></title><description><![CDATA[
<p>If you look at the CVE lists, about 70-80% of all c memory bugs are related to OOB Read and Write. Additionally, like rust, fbounds-safety can remove redundant checks if it can determine the bounds. My question is how likely can it be adopted in the kernel (likely high).<p>I will need to read their conversations more to see if it's the underlying fear, but formalization makes refactoring hard and code brittle (ie. having to start from scratch on a formal proof after substantially changing a subsystem). One of the key benefits of C/Kernel have been their malleability to new hardware and requirements.</p>
]]></description><pubDate>Wed, 19 Feb 2025 21:29:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=43107970</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=43107970</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43107970</guid></item><item><title><![CDATA[New comment by mimd in "USDA fired officials working on bird flu, now trying to rehire them"]]></title><description><![CDATA[
<p>Well, it will be really funny when the executive branch starts firing all the judiciaries security (USMS JSD, under DoJ) to save costs. But secondary outcomes have either not dawned or dissuaded the recent courts on their path to increasing executive power.</p>
]]></description><pubDate>Wed, 19 Feb 2025 07:08:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=43099432</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=43099432</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43099432</guid></item><item><title><![CDATA[New comment by mimd in "US government struggles to rehire nuclear safety staff it laid off days ago"]]></title><description><![CDATA[
<p>Of course they are. Any rational person not blinded by partisanship would be infuriated by this development and immediately demand that DOGE be restrained. Even most partisans would blanch and demand accountability. DOGE advocates know this. Their only recourse is to try to hide it or distract everyone with tangential arguments like they are doing in this thread.</p>
]]></description><pubDate>Sun, 16 Feb 2025 16:22:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=43069199</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=43069199</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43069199</guid></item><item><title><![CDATA[New comment by mimd in "US government struggles to rehire nuclear safety staff it laid off days ago"]]></title><description><![CDATA[
<p><a href="https://www.npr.org/2025/02/14/nx-s1-5298190/nuclear-agency-trump-firings-nnsa" rel="nofollow">https://www.npr.org/2025/02/14/nx-s1-5298190/nuclear-agency-...</a><p>If even half of NPR's report is true, the way in which it was conducted was grossly cruel and with complete ignorance.<p>DOGE and it's supporters are quiet literally playing like a child with the levers that decide if <i>you</i> wake up tomorrow.</p>
]]></description><pubDate>Sun, 16 Feb 2025 16:14:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=43069138</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=43069138</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43069138</guid></item><item><title><![CDATA[New comment by mimd in "Feds want devs to stop coding 'unforgivable' buffer overflow vulnerabilities"]]></title><description><![CDATA[
<p>Since the rest of the advisory is demanding full scale rewrites into a new language based on llvm that has officially nuetered it's gcc port, I don't think they really care about those sorts of concerns. Hence my annoyance at their proposal. The fbounds devs do, as the design allows for modified source to be still compilable in alternative toolchains that do not support fbounds (you can remove them via macros) and they are working to add it to gcc. And I don't think its going to matter much soon if it's limited to gcc/llvm, as all the proprietary vendors left and right are dropping their 30+ year compilers to piggyback off llvm (I don't exactly agree with this btw, but it is what it is).</p>
]]></description><pubDate>Sat, 15 Feb 2025 00:19:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=43054540</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=43054540</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43054540</guid></item><item><title><![CDATA[New comment by mimd in "Type safe variadic printf"]]></title><description><![CDATA[
<p>Not to fully encapture C's variadic printf, but on the macro front, I've been having fun creating type checking for macros by a constexpr allocation from a _generic switch type check of the args and then checking the result with static_asserts. I think there was a hack before as you mentioned but would have to dig through my tests to find it, but the C23 version is quite clean. Might want see if I can get it to be clean for a variadic printf version.</p>
]]></description><pubDate>Sat, 15 Feb 2025 00:16:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=43054517</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=43054517</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43054517</guid></item><item><title><![CDATA[New comment by mimd in "Feds want devs to stop coding 'unforgivable' buffer overflow vulnerabilities"]]></title><description><![CDATA[
<p>I wish they would have gone more indepth about the current compiler work, such as stack defenses or fbounds-safety. It should cover OOB read and write safety, which is 70-80% of C's memory vulnerabilities, for a marginal performance overhead and with abi compatibility.<p><a href="https://clang.llvm.org/docs/BoundsSafety.html" rel="nofollow">https://clang.llvm.org/docs/BoundsSafety.html</a></p>
]]></description><pubDate>Thu, 13 Feb 2025 18:25:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=43039364</link><dc:creator>mimd</dc:creator><comments>https://news.ycombinator.com/item?id=43039364</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43039364</guid></item></channel></rss>