<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: montyanne</title><link>https://news.ycombinator.com/user?id=montyanne</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 26 Apr 2026 11:32:16 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=montyanne" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by montyanne in "MeshCore development team splits over trademark dispute and AI-generated code"]]></title><description><![CDATA[
<p>I spent an entire month trying to build something with Reticulum, but there just isn’t great tooling for dealing with the protocol. Makes for a pretty infuriating devex if you’re just trying to build your app.<p>Neat concept but so many footguns that (imo) it’s not really sustainable to try bootstrapping.<p>Specifically, I had tried to port the stack to Rust no-std to use on nrf52 LoRA devices to use/abuse the existing MeshCore network to deliver reticulum packets. Turned out to be a nightmare just trying to figure out if my packets were even correctly formed.</p>
]]></description><pubDate>Thu, 23 Apr 2026 21:39:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47882444</link><dc:creator>montyanne</dc:creator><comments>https://news.ycombinator.com/item?id=47882444</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47882444</guid></item><item><title><![CDATA[New comment by montyanne in "The electromechanical angle computer inside the B-52 bomber's star tracker"]]></title><description><![CDATA[
<p>I would absolutely love to read something about that - thanks for putting in the work and sharing it.<p>I have a buddy working on restoring a set of binoculars that were attached to the Target Bearing Transmitter system for a US sub from the 50s. Last I heard he was able to find someone that actually had parts of the original schematics for it so that he’s able to machine some new pieces.<p>These things are definitely a labor of love.</p>
]]></description><pubDate>Sat, 18 Apr 2026 19:11:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47818623</link><dc:creator>montyanne</dc:creator><comments>https://news.ycombinator.com/item?id=47818623</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47818623</guid></item><item><title><![CDATA[New comment by montyanne in "DOOM Over DNS"]]></title><description><![CDATA[
<p>I’ve heard rumors that DNS records are also sometimes used in some steganography-type communications. Great way of passing small messages in a ubiquitous and innocuous system, unlikely to be blocked or raise eyebrows by accessing.</p>
]]></description><pubDate>Thu, 26 Mar 2026 22:39:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47536735</link><dc:creator>montyanne</dc:creator><comments>https://news.ycombinator.com/item?id=47536735</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47536735</guid></item><item><title><![CDATA[New comment by montyanne in "Cloudflare's Gen 13 servers: trading cache for cores for 2x performance"]]></title><description><![CDATA[
<p>Cloudflare has excellent (human) technical writers.  I don’t see any indication this is “slop”, it’s the standard in-the-weeds but understandable blog post they’ve been doing for years.<p>AI text is everywhere, but this isn’t it.</p>
]]></description><pubDate>Thu, 26 Mar 2026 22:36:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47536705</link><dc:creator>montyanne</dc:creator><comments>https://news.ycombinator.com/item?id=47536705</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47536705</guid></item><item><title><![CDATA[New comment by montyanne in "Mesh over Bluetooth LE, TCP, or Reticulum"]]></title><description><![CDATA[
<p>I was using this as a demo project for playing around with code generation tools, so it’s really not in a great state and entirely AI written, but I can share a link here when I get a chance.<p>My initial stab was a rust port targeting esp32 Heltec V4 (since it has some niceties like tokio) with Reticulum communication over serial, BLE, WiFi and LoRA.  The serial interface was sort of working, but frankly debugging using rnsd/nomadnet was infuriating (there’s no tools just to easily see messages over the wire!).<p>I’ve moved onto a build system that can also target the SEEED Wio Tracker using no_std, but it’s been… messier. AI tooling doesn’t quite have the context length for big migrations like that yet.</p>
]]></description><pubDate>Wed, 11 Mar 2026 04:25:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47331734</link><dc:creator>montyanne</dc:creator><comments>https://news.ycombinator.com/item?id=47331734</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47331734</guid></item><item><title><![CDATA[New comment by montyanne in "Mesh over Bluetooth LE, TCP, or Reticulum"]]></title><description><![CDATA[
<p>Reticulum is a full replacement networking stack for several layers of the OSI stack, so not directly comparable. The LXMF messaging protocol (built on top of reticulum) is nice as it’s encrypted-by-requirement, but doesn’t really have a ton of non-text messaging implementations.<p>Reticulum is not worth getting into, the utilities and general infrastructure just isn’t there yet.<p>The project was basically a one-man-show for a long time, and has a lot of odd, esoteric decisions that will drive you mad if you’re actually trying to build something with it (eg, configuration files with sparse documentation that are yaml-but-not-really).  I don’t mean to belittle the loads of time the original maintainer put into this project, it’s just not really designed to be usable in the general case by other developers.<p>I spent some time porting the reference Python implementation to no_std rust, but basically had to roll all the basic debugging utilities myself.</p>
]]></description><pubDate>Wed, 11 Mar 2026 02:18:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47331121</link><dc:creator>montyanne</dc:creator><comments>https://news.ycombinator.com/item?id=47331121</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47331121</guid></item><item><title><![CDATA[New comment by montyanne in "Cell Service for the Fairly Paranoid"]]></title><description><![CDATA[
<p>Appreciate you sticking in here and answering the hard questions.<p>How does the company handle the split between your defense and consumer products? Do you see there being conflicting interests here?</p>
]]></description><pubDate>Wed, 25 Feb 2026 02:17:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=47146462</link><dc:creator>montyanne</dc:creator><comments>https://news.ycombinator.com/item?id=47146462</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47146462</guid></item><item><title><![CDATA[New comment by montyanne in "Cell Service for the Fairly Paranoid"]]></title><description><![CDATA[
<p>> We add noise to their data<p>It’s interesting that Apple is going down a similar path with hardware filtering location retrieval commands and neighborhood-level blurring on their C1 modems. Really awesome work from that team by making sure they’ve considered privacy as a first party feature for that chip.<p>How do you guys view the relative value of privacy/security at the network provider layer of the cell stack for the average user/citzen?<p>Even if Cape doesn’t retain metadata yourselves (eg LTE positioning info), is that data not still retained and repackaged by the tower owners themselves? Eg babel street, venntel, etc. A rotating IMEI every 24 hours might make it marginally more difficult for logical tracking, but there’s still only physically one location the phone can be in without fuzzing at the hardware level.<p>I should also say - I’ve been following y’all’s work for a while (and considered some of those early forward deployed engineer positions), but I’m struggling to see how this all works as a consumer product. Would be awesome to see an eventual partnership with Apple/Qualcomm to bring this to the hardware level since privacy is a tough nut to crack even at full MVNO.</p>
]]></description><pubDate>Wed, 25 Feb 2026 02:04:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47146382</link><dc:creator>montyanne</dc:creator><comments>https://news.ycombinator.com/item?id=47146382</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47146382</guid></item><item><title><![CDATA[New comment by montyanne in "Cosmologically Unique IDs"]]></title><description><![CDATA[
<p>The ATProto underlying BlueSky social network is similar.  It uses a content-addressed DAG.<p>Each “post” has a CID, which is a cryptographic hash of the data. To “prove” ownership of the post, there’s a witness hash that is sent that can be proved all the way up the tree to the repo root hash, which is signed with the root key.<p>Neat way of having data say “here’s the data, and if you care to verify it, here’s an MST”.</p>
]]></description><pubDate>Wed, 18 Feb 2026 20:13:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47065743</link><dc:creator>montyanne</dc:creator><comments>https://news.ycombinator.com/item?id=47065743</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47065743</guid></item><item><title><![CDATA[New comment by montyanne in "America has a tungsten problem"]]></title><description><![CDATA[
<p>Commonwealth fusion is theoretically pretty close with their high temp superconductors.<p>Far from a slam dunk, but I don’t think we’re as far from net gain as we were 10 years ago.</p>
]]></description><pubDate>Mon, 09 Feb 2026 22:28:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=46952447</link><dc:creator>montyanne</dc:creator><comments>https://news.ycombinator.com/item?id=46952447</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46952447</guid></item><item><title><![CDATA[New comment by montyanne in "Moltbook is the most interesting place on the internet right now"]]></title><description><![CDATA[
<p>The replies also make it clear the sycophancy of LLM chatbots is still alive and well.<p>All of the replies I saw were falling over themselves to praise OP. Not a single one gave an at all human chronically-online comment like “I can’t believe I spent 5 minutes of my life reading this disgusting slop”.<p>It’s like an echo chamber of the same mannerisms, which must be right in the center of the probability distribution for responses.<p>Would be interesting to see the first “non-standard” response to see how far out the tails go on the sycophancy-argumentative spectrum. Seems like a pretty narrow distribution rn</p>
]]></description><pubDate>Fri, 30 Jan 2026 18:28:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=46827997</link><dc:creator>montyanne</dc:creator><comments>https://news.ycombinator.com/item?id=46827997</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46827997</guid></item><item><title><![CDATA[New comment by montyanne in "Apple OSes Are Insecure by Design to Aid Surveillance (2024)"]]></title><description><![CDATA[
<p>The plaintext TSS/ECID and the plaintext OCSP issues have been fixed, which IMO were the only meaningful security gripes of the article.<p>The iMessage/ADP/Metadata stuff I think is more of an implementation decision than a meaningful attempt at data collection. Using clear text file names and hashes for dealing with collisions and deduplicating is a reasonable first pass at something like this. Sure, they could probably roll some end-to-end obfuscation for this, but with how big their stack and cloud integrations are, I’m sure that’s non-trivial.</p>
]]></description><pubDate>Mon, 26 Jan 2026 19:58:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=46770698</link><dc:creator>montyanne</dc:creator><comments>https://news.ycombinator.com/item?id=46770698</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46770698</guid></item><item><title><![CDATA[New comment by montyanne in "Show HN: SMTP Tunnel – A SOCKS5 proxy disguised as email traffic to bypass DPI"]]></title><description><![CDATA[
<p>Just curious - how much of this was AI generated?  The readme has crazy emojis & the code was all checked in at once, which is usually my telltale for these kinds of things. Didn't see anything crazy in the source files.<p>I think its polite to indicate AI agent usage in security related projects like this since they can have huge holes if they're just being vibe coded.<p>-- Edit: Intended to post this on the board root, sorry.</p>
]]></description><pubDate>Wed, 07 Jan 2026 04:50:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=46522706</link><dc:creator>montyanne</dc:creator><comments>https://news.ycombinator.com/item?id=46522706</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46522706</guid></item></channel></rss>