<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: mtlynch</title><link>https://news.ycombinator.com/user?id=mtlynch</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 15 May 2026 18:25:56 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=mtlynch" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by mtlynch in "Welcome to the Strip Mining Era of OSS Security"]]></title><description><![CDATA[
<p>> <i>Most are not serious, and we’ve quietly fixed them, thanked the researcher, and went our merry way... These come from a wide variety of locations and people, and sometimes, but not always, are looking for bug bounties.</i><p>I take it that Metabase is both not paying bug bounties and not using these tools internally?<p>If that's the case, Metabase is not going to get meaningful investment from researchers who want to fix issues, but they'll get increased attention from malicious attackers who have no qualms exploiting the vulnerabilities for profit.<p>LLMs have made it a <i>lot</i> easier for people to find vulnerabilities in software. Open-source makes it easier, but we already have non-AI tooling (IDA Pro, Ghidra) that's good at binary reverse engineering, and LLMs can use that output to find vulnerabilities as well.<p>This year, as I select products to use for sensitive data, I've been paying a lot more attention to whether they offer bug bounties and for how much. For example, I like Kagi for search and thought about trying Orion, their web browser.  Then, I saw that Kagi's been paying $100 for UXSS vulnerabilities.[0] For comparison, Firefox pays $8-10k,[1] and Chrome pays up to $10k for the same class of bug.[2]<p>[0] <a href="https://help.kagi.com/kagi/privacy/bug-bounty-program.html" rel="nofollow">https://help.kagi.com/kagi/privacy/bug-bounty-program.html</a><p>[1] <a href="https://www.mozilla.org/en-US/security/client-bug-bounty/" rel="nofollow">https://www.mozilla.org/en-US/security/client-bug-bounty/</a><p>[2] <a href="https://bughunters.google.com/about/rules/chrome-friends/chrome-vulnerability-reward-program-rules" rel="nofollow">https://bughunters.google.com/about/rules/chrome-friends/chr...</a></p>
]]></description><pubDate>Fri, 15 May 2026 13:52:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=48148606</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=48148606</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48148606</guid></item><item><title><![CDATA[New comment by mtlynch in "An Introduction to Meshtastic"]]></title><description><![CDATA[
<p>Parent wrote a great blog post about this for anyone interested in the details:<p><a href="https://blog.noforeignland.com/off-grid-boat-communications-with-meshtastic/" rel="nofollow">https://blog.noforeignland.com/off-grid-boat-communications-...</a></p>
]]></description><pubDate>Sat, 09 May 2026 15:37:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=48075818</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=48075818</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48075818</guid></item><item><title><![CDATA[New comment by mtlynch in "Securing a DoD Contractor: Finding a Multi-Tenant Authorization Vulnerability"]]></title><description><![CDATA[
<p>That would be even worse than our already bad system.<p>The system is already pretty bad because vendors underinvest in security, and then to fix it, researchers have to volunteer their time to investigate with no guarantee of payment. If the vendor could force researchers to hand over findings for free, nobody would want to do security research except hobbyists having fun. They're basically signing up for hours of tedious forced labor to explain vulnerabilities to the vendor.<p>I wish there was legislation that allowed the government to fine vendors for security vulnerabilities like this where the amount scales based on how much user data they leaked. And it could function like other whistleblower systems where a researcher who spots a leak can report it to the government and collect 50%. That way, if the vendor says, "We're not paying you," the researcher can turn around and collect the money from fines.</p>
]]></description><pubDate>Mon, 04 May 2026 19:50:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=48014025</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=48014025</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48014025</guid></item><item><title><![CDATA[New comment by mtlynch in "Talking to strangers at the gym"]]></title><description><![CDATA[
<p>Oh, I'm glad!<p>Yeah, I don't think you'll find it a red-pill kind of book at all. I know what you mean about books like <i>The 48 Laws of Power</i> feeling like the world is 100% zero sum, so everything is about dominating or outplaying people.<p><i>How to Win Friends and Influence People</i> is very much focused on win-win. There is an agenda to make friends and influence people, as you'd guess from the title, but the strategies are about taking a genuine interest in people and making them feel good.<p>It's almost 100 years old, so the style is kind of hokey, and only about half the advice resonated with me, but there are 3-4 lessons that had a major impact on me.</p>
]]></description><pubDate>Mon, 04 May 2026 14:37:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=48009347</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=48009347</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48009347</guid></item><item><title><![CDATA[New comment by mtlynch in "Talking to strangers at the gym"]]></title><description><![CDATA[
<p>One of the things I like about this is that OP is giving people genuine compliments without any particular agenda.<p>It reminds me of one of my favorite parts of <i>How to Win Friends and Influence People</i> by Dale Carnegie, where he tells a story about complimenting someone, and a student asks what he was hoping to gain from offering the compliment. Carnegie is incensed:<p>> <i>I was waiting in line to register a letter in the Post Office at Thirty-Third Street and Eighth Avenue in New York. I noticed that the registry clerk was bored with his job[...] So while he was weighing my envelope, I remarked with enthusiasm: “I certainly wish I had your head of hair.”</i><p>> <i>He looked up, half-startled, his face beaming with smiles. “Well, it isn’t as good as it used to be,” he said modestly. I assured him that although it might have lost some of its pristine glory, nevertheless it was still magnificent. He was immensely pleased. We carried on a pleasant little conversation, and the last thing he said to me was: “Many people have admired my hair.”</i><p>> <i>I told this story once in public; and a man asked me afterwards: “What did you want to get out of him?”</i><p>> <i>What was I trying to get out of him!!! What was I trying to get out of him!!!</i><p>> <i>If we are so contemptibly selfish that we can’t radiate a little happiness and pass on a bit of honest appreciation without trying to screw something out of the other person in return—if our souls are no bigger than sour crab apples, we shall meet with the failure we so richly deserve.</i><p>> <i>Oh yes, I did want something out of that chap. I wanted something priceless. And I got it. I got the feeling that I had done something for him without his being able to do anything whatever in return for me. That is a feeling that glows and sings in your memory long after the incident is passed.</i></p>
]]></description><pubDate>Mon, 04 May 2026 13:43:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=48008672</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=48008672</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48008672</guid></item><item><title><![CDATA[New comment by mtlynch in "This Month in Ladybird – April 2026"]]></title><description><![CDATA[
<p>Worth noting that at this point, it's still somewhat trivial to find exploitable remote code execution bugs in Ladybird using AI tools.[0]<p>The userbase of Ladybug users is so small that it's probably not worth the attackers' time, but keep in mind that it's an enormous step down in security from the mainstream browsers who are actively searching for bugs using the latest tools and paying bug bounties on external reports.<p>[0] <a href="https://blog.calif.io/p/mad-bugs-rce-in-ladybird" rel="nofollow">https://blog.calif.io/p/mad-bugs-rce-in-ladybird</a></p>
]]></description><pubDate>Sun, 03 May 2026 15:06:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47997681</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=47997681</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47997681</guid></item><item><title><![CDATA[New comment by mtlynch in "Unverified Evaluations in Dusk's PLONK"]]></title><description><![CDATA[
<p>I notice no mention of a bug bounty. Did they not get paid for this?<p>All I could find of a Dusk bug bounty was this blog post from 2023[0]:<p>> <i>Although we do not currently have a bug bounty program, we will certainly create an extensive one in the near future, when we are ready to transition toward the auditing, testing, and security assessment phases of our roadmap.</i><p>And the roadmap links to a URL that now 404s.<p>I would be extremely reticent to use a blockchain with no bug bounty, as it means that it's easy for a malicious actor to monetize a vulnerability, but there's no incentive for an honest researcher to report it or even look for one.<p>[0] <a href="https://dusk.network/news/infrastructure-vulnerability-fixed" rel="nofollow">https://dusk.network/news/infrastructure-vulnerability-fixed</a></p>
]]></description><pubDate>Sun, 03 May 2026 10:09:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47995386</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=47995386</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47995386</guid></item><item><title><![CDATA[New comment by mtlynch in "Opus 4.7 knows the real Kelsey"]]></title><description><![CDATA[
<p>I wouldn't use AI to write even if it could match my tone, but it currently doesn't do a good job of writing like me.<p>I tried with Opus 4.5 a few months ago to have it read my monthly retrospectives and then write a new one based on my weekly updates for that month. It was similar to the example I showed for James Mickens[0] where I see the similarities to my writing, but it feels more like someone parodying me than actually writing like me.<p>[0] <a href="https://news.ycombinator.com/item?id=47970127">https://news.ycombinator.com/item?id=47970127</a></p>
]]></description><pubDate>Fri, 01 May 2026 12:32:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47974043</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=47974043</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47974043</guid></item><item><title><![CDATA[New comment by mtlynch in "Opus 4.7 knows the real Kelsey"]]></title><description><![CDATA[
<p>He hasn't published anything recently, so I can't test with Mickens, but I tested with my own writing[0], and Opus got it right.<p>[0] <a href="https://news.ycombinator.com/item?id=47970008">https://news.ycombinator.com/item?id=47970008</a></p>
]]></description><pubDate>Fri, 01 May 2026 12:30:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47974024</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=47974024</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47974024</guid></item><item><title><![CDATA[New comment by mtlynch in "Opus 4.7 knows the real Kelsey"]]></title><description><![CDATA[
<p>This is blowing my mind.<p>I asked Kimi K2.6 to write a blog post in the style of James Mickens.[0] Then I fed the output to Opus 4.7 and asked it who the likely author was, and it correctly identified it as <i>an imitation</i> of James Mickens[1]:<p>> <i>Based on the stylistic fingerprints in this text, the most likely author is a pastiche/imitation of the style of several writers fused together, but if forced to identify a single likely author, the strongest candidate is someone writing in the voice of James Mickens</i><p>> <i>[...]</i><p>> <i>The piece could also be a deliberate imitation/homage to Mickens written by someone else, or AI-generated text trained on his style, since the voice is so distinctive it's frequently parodied.</i><p>[0] <a href="https://kagi.com/assistant/5bfc5da9-cbfc-4051-8627-d0e9c0615d84" rel="nofollow">https://kagi.com/assistant/5bfc5da9-cbfc-4051-8627-d0e9c0615...</a><p>[1] <a href="https://kagi.com/assistant/fd3eca94-45de-4a53-8604-fcc568dc5a7d" rel="nofollow">https://kagi.com/assistant/fd3eca94-45de-4a53-8604-fcc568dc5...</a></p>
]]></description><pubDate>Fri, 01 May 2026 00:37:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47970127</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=47970127</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47970127</guid></item><item><title><![CDATA[New comment by mtlynch in "Opus 4.7 knows the real Kelsey"]]></title><description><![CDATA[
<p>Wow! It got me too.<p>I'm way less famous than Kelsey Piper, but I showed it a snippet of a book I'm working on (not yet published), and it immediately guessed me:<p>> <i>Based on the writing style and content, this text is likely by Michael Lynch, who writes on his blog refactoringenglish.com (and previously mtlynch.io).</i><p>> <i>Several stylistic clues point to him:</i><p>> <i>- The "clean room" analogy applied to writing is consistent with his engineering-influenced approach to writing advice (he's a former software engineer who writes about writing).</i><p>> <i>- The structural technique of presenting a flawed excuse, then drawing a parallel to an absurd scenario (the time bomb) to expose the logical flaw, is characteristic of his didactic style.</i><p>> <i>- The topic itself—practical advice about using AI tools without letting AI-generated tone contaminate your prose—aligns closely with recent essays he's published on his "Refactoring English" project, which is a book/blog about writing for software developers.</i><p>> <i>- The conversational-but-precise tone, use of quotes around terms like "clean room," and the focus on workflow/process advice are all hallmarks of his writing.</i><p>> <i>If you can share the source URL or more context, I could confirm with higher confidence, but the combination of subject matter, analogical reasoning style, and formatting conventions makes Michael Lynch the most probable author.</i><p><a href="https://kagi.com/assistant/bbc9da96-b4cf-456b-8398-6cf5404eaf60" rel="nofollow">https://kagi.com/assistant/bbc9da96-b4cf-456b-8398-6cf5404ea...</a></p>
]]></description><pubDate>Fri, 01 May 2026 00:18:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=47970008</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=47970008</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47970008</guid></item><item><title><![CDATA[Job Search – Unreasonable Expectations]]></title><description><![CDATA[
<p>Article URL: <a href="https://eric.mann.blog/job-search-unreasonable-expectations/">https://eric.mann.blog/job-search-unreasonable-expectations/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47964224">https://news.ycombinator.com/item?id=47964224</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 30 Apr 2026 15:45:02 +0000</pubDate><link>https://eric.mann.blog/job-search-unreasonable-expectations/</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=47964224</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47964224</guid></item><item><title><![CDATA[New comment by mtlynch in "Before GitHub"]]></title><description><![CDATA[
<p>><i>For a while, leaving GitHub felt like a symbolic move mostly made by smaller projects or by people with strong views about software freedom. I definitely cringed when Zig moved to Codeberg! But I now see people with real weight and signal talking about leaving GitHub. The most obvious one is Mitchell Hashimoto, who announced that Ghostty will move.</i><p>I didn't understand this. I perceive the Zig project and Mitchell Hashimoto / Ghostty to be at similar levels of "weight and signal." Especially because Ghostty is written in Zig.<p>It feels kind of like saying, "Oh, I didn't take this seriously when it was just Fabrice Bellard, but now that an actual influential person like Guido van Rossum is doing it, it's real."</p>
]]></description><pubDate>Wed, 29 Apr 2026 12:27:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47947388</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=47947388</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47947388</guid></item><item><title><![CDATA[New comment by mtlynch in "MeshCore development team splits over trademark dispute and AI-generated code"]]></title><description><![CDATA[
<p>Okay, fair point, but I still feel like it's nitpicking minor wording. My point is that MeshCore should validate untrusted data.</p>
]]></description><pubDate>Thu, 23 Apr 2026 23:17:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47883490</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=47883490</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47883490</guid></item><item><title><![CDATA[New comment by mtlynch in "MeshCore development team splits over trademark dispute and AI-generated code"]]></title><description><![CDATA[
<p>What do you mean? Is the non-existent millionth floor of the Empire State Building still part of the Empire State Building?<p>Also, I'm assuming we're in agreement that software should not accept invalid GPS coordinates from untrusted peers regardless of semantics about whether or not they're within Earth's bounds.</p>
]]></description><pubDate>Thu, 23 Apr 2026 19:36:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47880596</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=47880596</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47880596</guid></item><item><title><![CDATA[New comment by mtlynch in "MeshCore development team splits over trademark dispute and AI-generated code"]]></title><description><![CDATA[
<p>A longitude that's outside the range of [-180, +180] or a latitude that's outside the range of [-90, +90].</p>
]]></description><pubDate>Thu, 23 Apr 2026 19:01:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=47880069</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=47880069</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47880069</guid></item><item><title><![CDATA[New comment by mtlynch in "MeshCore development team splits over trademark dispute and AI-generated code"]]></title><description><![CDATA[
<p>><i>there are Blackberry-style client devices which don't require an app at all, and all the actual firmware is open source (MIT).</i><p>Worth noting that the Blackberry-style devices are also closed source and the hardware and software is way worse than Blackberry was 22 years ago.[0]<p>[0] <a href="https://mtlynch.io/first-impressions-of-meshcore/#this-is-not-a-blackberry" rel="nofollow">https://mtlynch.io/first-impressions-of-meshcore/#this-is-no...</a></p>
]]></description><pubDate>Thu, 23 Apr 2026 18:51:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47879934</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=47879934</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47879934</guid></item><item><title><![CDATA[New comment by mtlynch in "MeshCore development team splits over trademark dispute and AI-generated code"]]></title><description><![CDATA[
<p>><i>Would you trust AI generated mesh firmware</i>?<p>It's ridiculous to me that they're concerned about the trustworthiness of AI-generated code when their code quality is so low. They don't even have automated tests and ignore attempts to add them.[0, 1, 2, 3]<p>Last I checked, there's little validity checking in the code, so it's possible to broadcast nonsense values (like GPS coordinates outside of Earth's bounds) and the code happily accepts it.<p>And that's fine if they're just like a scrappy upstart doing their best, but it annoys me to be so high and mighty about their code quality when they don't invest in it.<p>I really want to like MeshCore but I feel like its stewardship makes it hard. The main two people I know running it are Scott Powell and Liam Cottle, both of whom are trying to build businesses on closed-source layers on top of the firmware. I don't think there's anything wrong with an open-core business model (I ran such a business myself), but it creates perverse incentives where the core maintainers try to suppress information about the open-source alternatives and push their own closed-source paid products.<p>Also, MeshCore's recommended broadcast settings for the US are illegal.[4] I emailed the Liam and Scott about this months ago, and they ignored me.<p>[0] <a href="https://github.com/meshcore-dev/MeshCore/pull/925" rel="nofollow">https://github.com/meshcore-dev/MeshCore/pull/925</a><p>[1] <a href="https://github.com/meshcore-dev/MeshCore/issues/1059" rel="nofollow">https://github.com/meshcore-dev/MeshCore/issues/1059</a><p>[2] <a href="https://github.com/meshcore-dev/MeshCore/pull/1065" rel="nofollow">https://github.com/meshcore-dev/MeshCore/pull/1065</a><p>[3] <a href="https://github.com/meshcore-dev/meshcore.js/pull/11" rel="nofollow">https://github.com/meshcore-dev/meshcore.js/pull/11</a><p>[4] <a href="https://github.com/meshcore-dev/MeshCore/issues/945" rel="nofollow">https://github.com/meshcore-dev/MeshCore/issues/945</a></p>
]]></description><pubDate>Thu, 23 Apr 2026 18:50:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47879910</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=47879910</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47879910</guid></item><item><title><![CDATA[North Korea uses AI to industrialize attacks on developers]]></title><description><![CDATA[
<p>Article URL: <a href="https://expel.com/blog/inside-lazarus-how-north-korea-uses-ai-to-industrialize-attacks-on-developers/">https://expel.com/blog/inside-lazarus-how-north-korea-uses-ai-to-industrialize-attacks-on-developers/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47871714">https://news.ycombinator.com/item?id=47871714</a></p>
<p>Points: 6</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 23 Apr 2026 02:34:47 +0000</pubDate><link>https://expel.com/blog/inside-lazarus-how-north-korea-uses-ai-to-industrialize-attacks-on-developers/</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=47871714</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47871714</guid></item><item><title><![CDATA[New comment by mtlynch in "We found a stable Firefox identifier linking all your private Tor identities"]]></title><description><![CDATA[
<p>I don't understand what you mean. What separates this from other fingerprinting techniques your company monetizes?<p>No software <i>wants</i> to be fingerprinted. If it did, it would offer an API with a stable identifier. All fingerprinting is exploiting unintended behavior of the target software or hardware.</p>
]]></description><pubDate>Wed, 22 Apr 2026 19:37:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47868256</link><dc:creator>mtlynch</dc:creator><comments>https://news.ycombinator.com/item?id=47868256</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47868256</guid></item></channel></rss>