<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: ngneer</title><link>https://news.ycombinator.com/user?id=ngneer</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 21 May 2026 04:43:02 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=ngneer" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by ngneer in "Spaceballs 2 Will See Rick Moranis Return as Dark Helmet"]]></title><description><![CDATA[
<p>"And change the combination on my luggage!"</p>
]]></description><pubDate>Thu, 12 Jun 2025 18:28:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=44261141</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=44261141</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44261141</guid></item><item><title><![CDATA[New comment by ngneer in "EchoLeak – 0-Click AI Vulnerability Enabling Data Exfiltration from 365 Copilot"]]></title><description><![CDATA[
<p>Thanks. I just find it funny that security lessons learned in past decades have been completely defenestrated.</p>
]]></description><pubDate>Thu, 12 Jun 2025 13:35:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=44257634</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=44257634</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44257634</guid></item><item><title><![CDATA[New comment by ngneer in "EchoLeak – 0-Click AI Vulnerability Enabling Data Exfiltration from 365 Copilot"]]></title><description><![CDATA[
<p>Don't eval untrusted input?</p>
]]></description><pubDate>Wed, 11 Jun 2025 22:16:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=44252420</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=44252420</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44252420</guid></item><item><title><![CDATA[New comment by ngneer in "The Illusion of Thinking: Understanding the Limitations of Reasoning LLMs [pdf]"]]></title><description><![CDATA[
<p>Thanks for trying these out :). Highlights the often subtle difference between knowing the answer and deducing the answer. Feathers could be ground into a pulp and condensed, too. I am not trying to be clever, just seems like the response is a canned answer.</p>
]]></description><pubDate>Sat, 07 Jun 2025 20:33:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=44212451</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=44212451</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44212451</guid></item><item><title><![CDATA[New comment by ngneer in "The Illusion of Thinking: Understanding the Limitations of Reasoning LLMs [pdf]"]]></title><description><![CDATA[
<p>I do not know whether the state of the art is able to reason or not. The textbook example you gave is admittedly not very interesting. What you are hearing from people is that parroting is not reasoning, which is true.<p>I wonder if the state of the art can reason its way through the following:<p>"Adam can count to 14000. Can Adam count to 13500?"<p>The response needs to be affirmative for every X1 and X2 such that X2 <= X1. That is reasoning. Anything else is not reasoning.<p>The response when X2 > X1 is less interesting. But, as a human it might be "Maybe, if Adam has time" or "Likely, since counting up to any number uses the same algorithm" or "I don't know".<p>Seems ChatGPT can cope with this. Other examples are easy to come up with, too. There must be benchmarks for this.<p>Input to ChatGPT:<p>"Adam can lift 1000 pounds of steel. Can Adam lift 1000 pounds of feathers?"<p>Output from ChatGPT:<p>"1,000 pounds of feathers would be much easier for Adam to lift compared to 1,000 pounds of steel, because feathers are much lighter and less dense."<p>So, maybe not there yet...</p>
]]></description><pubDate>Sat, 07 Jun 2025 17:32:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=44211129</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=44211129</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44211129</guid></item><item><title><![CDATA[New comment by ngneer in "The Illusion of Thinking: Understanding the Limitations of Reasoning LLMs [pdf]"]]></title><description><![CDATA[
<p>I am not too familiar with the latest hype, but "reasoning" has a very straightforward definition in my mind. For example, can the program in question derive new facts from old ones in a logically sound manner. Things like applying modus ponens. (A and A => B) => B. Or, all men are mortal and Socrates is a man, and therefore Socrates is mortal. If the program cannot deduce new facts, then it is not reasoning, at least not by my definition.</p>
]]></description><pubDate>Sat, 07 Jun 2025 03:34:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=44207219</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=44207219</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44207219</guid></item><item><title><![CDATA[New comment by ngneer in "Top researchers leave Intel to build startup with 'the biggest, baddest CPU'"]]></title><description><![CDATA[
<p>I wonder if there is any relation to the cancelled Royal and Beast Lake projects.<p><a href="https://www.notebookcheck.net/Intel-CEO-abruptly-trashed-Royal-Core-project-in-early-2024-as-leak-details-canned-Beast-Lake-Next-architecture.882771.0.html" rel="nofollow">https://www.notebookcheck.net/Intel-CEO-abruptly-trashed-Roy...</a></p>
]]></description><pubDate>Fri, 06 Jun 2025 19:00:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=44203916</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=44203916</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44203916</guid></item><item><title><![CDATA[New comment by ngneer in "Gurus of 90s Web Design: Zeldman, Siegel, Nielsen"]]></title><description><![CDATA[
<p>I was doing web design in the early days. I recall the thrill of thinking how the possibilities were endless.<p>This article reminds me of "A List Apart". That website is still running, incidentally.</p>
]]></description><pubDate>Thu, 29 May 2025 12:04:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=44125167</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=44125167</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44125167</guid></item><item><title><![CDATA[New comment by ngneer in "I used o3 to find a remote zeroday in the Linux SMB implementation"]]></title><description><![CDATA[
<p>I think it was more a PoC. I would be more impressed if it was deployed in production. "we want to reiterate that these are highly experimental results". If the dividends are massive, would they not deploy it in production and tell the world about it?</p>
]]></description><pubDate>Sun, 25 May 2025 18:52:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=44090006</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=44090006</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44090006</guid></item><item><title><![CDATA[New comment by ngneer in "I used o3 to find a remote zeroday in the Linux SMB implementation"]]></title><description><![CDATA[
<p>It's reasonable to perceive most of the value in math and computer science being "at the scale" where there is unpredictability arising from complexity, though scale may not really be the reason for the unpredictability.<p>But a lot of the trouble in these domains that I have observed comes from unmodeled effects, that must be modeled and reasoned about. GPZ work shows the same thing shown by the researcher here, which is that it requires a lot of tinkering and a lot of context in order to produce semi-usable results. SNR appears quite low for now. In security specifically, there is much value in sanitizing input data and ensuring correct parsing. Do you think LLMs are in a position to do so?</p>
]]></description><pubDate>Sun, 25 May 2025 18:45:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=44089944</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=44089944</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44089944</guid></item><item><title><![CDATA[New comment by ngneer in "I used o3 to find a remote zeroday in the Linux SMB implementation"]]></title><description><![CDATA[
<p><a href="https://news.ycombinator.com/item?id=42017771">https://news.ycombinator.com/item?id=42017771</a><p>Meh.</p>
]]></description><pubDate>Sun, 25 May 2025 12:48:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=44087441</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=44087441</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44087441</guid></item><item><title><![CDATA[New comment by ngneer in "I used o3 to find a remote zeroday in the Linux SMB implementation"]]></title><description><![CDATA[
<p>I do the same, but entry level problems that require healthy analysis. New frontier LLMs do not manage to do so well at all.</p>
]]></description><pubDate>Sun, 25 May 2025 12:36:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=44087377</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=44087377</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44087377</guid></item><item><title><![CDATA[New comment by ngneer in "I used o3 to find a remote zeroday in the Linux SMB implementation"]]></title><description><![CDATA[
<p>Math and physics are pretty stable. So is computer science. Avoid voodoo.</p>
]]></description><pubDate>Sun, 25 May 2025 12:34:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=44087364</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=44087364</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44087364</guid></item><item><title><![CDATA[New comment by ngneer in "I used o3 to find a remote zeroday in the Linux SMB implementation"]]></title><description><![CDATA[
<p>Maybe very very soft "engineering". Do you have metrics on which prompt is best? What units are you measuring this in? Can you follow a repeatable process to obtain a repeatable result?</p>
]]></description><pubDate>Sun, 25 May 2025 12:32:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=44087358</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=44087358</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44087358</guid></item><item><title><![CDATA[New comment by ngneer in "The world could run on older hardware if software optimization was a priority"]]></title><description><![CDATA[
<p>Touché</p>
]]></description><pubDate>Thu, 15 May 2025 19:06:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=43998248</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=43998248</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43998248</guid></item><item><title><![CDATA[New comment by ngneer in "The world could run on older hardware if software optimization was a priority"]]></title><description><![CDATA[
<p>I am not suggesting we refuse to close one window because another window is open. That would be silly. Of course we should close the window. Just pointing out that the "950X" example figure cited fails to account for the full cost (or overestimates the benefit).</p>
]]></description><pubDate>Thu, 15 May 2025 01:52:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=43991085</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=43991085</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43991085</guid></item><item><title><![CDATA[New comment by ngneer in "The world could run on older hardware if software optimization was a priority"]]></title><description><![CDATA[
<p>Playing devil's advocate, compare their popularity. You may have fallen prey to the base rate fallacy.</p>
]]></description><pubDate>Thu, 15 May 2025 01:42:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=43991031</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=43991031</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43991031</guid></item><item><title><![CDATA[New comment by ngneer in "The world could run on older hardware if software optimization was a priority"]]></title><description><![CDATA[
<p>I agree with the sentiment and analysis that most humans prefer short term gains over long term ones. One correction to your example, though. Dynamic bounds checking does not solve security. And we do not know of a way to solve security. So, the gains are not as crisp as you are making them seem.</p>
]]></description><pubDate>Tue, 13 May 2025 12:38:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=43972246</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=43972246</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43972246</guid></item><item><title><![CDATA[New comment by ngneer in "Reverse engineering the obfuscated TikTok VM"]]></title><description><![CDATA[
<p>This is not a stupid question. I have seen other comments on the thread that confuse the two terms and run with it. Better to ask than assume. Especially since "VM" is the same label for two or three distinct yet related notions in security.<p>The VM you are familiar with indeed can run an OS, and is indeed not what TikTok does.<p>#1 VMM - hypervisor runs VMs<p>#2 JVM/.NET - efficient bytecode<p>#3 Obfuscation - obscure bytecode<p>The main thing is that for #2 and #3 the machine language changes.<p>With "virtualization" as used in most contexts, involving a virtual machine monitor, or hypervisor, one creates zero or more new (virtual) machines, to execute on multiple software recipes. All the recipes are written in the same (machine) language, for all the machines. This can help security by introducing isolation, for example, where one VM cannot read memory belonging to another VM unless the hypervisor allows it.<p>With the "virtual machine" used for obfuscation, the machine language changes. The system performs the same actions as it would without obfuscation, but now it is performing those actions using a different machine language. Behaviorally, the result is the same. But, the new language makes it harder to reverse engineer the behavior.<p>Stupid example:<p>Original instruction: MOV A,B<p>Under hypervisor virtualization, VM0 and VM1 will perform this same instruction.<p>Under obfuscation virtualization, software will perform instructions that amount to the same result, but are harder to figure out. So, the MOV instruction is redefined and mapped onto a new (virtual) machine. The new machine does not simply leverage the existing instruction, rather an obfuscated sequence. For example:<p>A <- B + C + D * E<p>A <- A - C<p>A <- A - D * E<p>Obviously, the above transformation is easy to understand and undo. Others are harder to understand and undo. Look up MOVfuscator to see how crazy things may get.</p>
]]></description><pubDate>Mon, 21 Apr 2025 15:58:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=43753422</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=43753422</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43753422</guid></item><item><title><![CDATA[New comment by ngneer in "CVE program faces swift end after DHS fails to renew contract"]]></title><description><![CDATA[
<p>That's very cool. You probably know more about it than I do, then, but my advice is to articulate the exact problem you try to solve.<p>I expect your field is probably teeming with AI proposals or offers on how to manage vulnerabilities, but that is doubtful the way, because again it is adding complexity, and no classifier is perfect, especially when scanners fail to understand scanned applications and their threat models or environment.<p>Stop selling external scanners, start simplifying code? This will never work, of course, because security vendors sell the promise of security to those willing to buy it, in the form of add-on products and capabilities.<p>Empower people to ignore scanner reports without so much red tape? That would never work either, because megacorp wants compliance and reduced liability.<p>Build secure systems as opposed to cataloging and scoring flaws? That would never work, because building secure systems is hard, nature tends to favor otherwise.<p>Charge people for adding complexity and credit them for removing complexity? Sadly, there is no way to do that, especially since products must ship and quality is hard to observe, since it is often invisible and only surfaces when things are broken.<p>Off the top of my head, would be nice to require proof of exploitation, by adding CTF-like capabilities to apps, such that only if the flag is captured do we consider the report real. This places more burden on scanners, in that it is no longer enough to report an outdated library. Requiring some proof of exploitability reduces noise and increases SNR, reducing false positives. Naturally, not all vulnerabilities have working exploits, and scanners can never fully simulate an adversary, so we may get more false negatives, but at least we would not have to waste so much time upgrading pointless modules and breaking applications to appease a false report. So the idea is "here is a dummy asset, show me how you leaked or compromised it". Adding the dummy asset should be cheap, but would force scanners to better simulate an attack.<p>At the very least, there ought to be a knob to decrease scanner sensitivity.</p>
]]></description><pubDate>Wed, 16 Apr 2025 14:10:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=43705810</link><dc:creator>ngneer</dc:creator><comments>https://news.ycombinator.com/item?id=43705810</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43705810</guid></item></channel></rss>