<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: nneonneo</title><link>https://news.ycombinator.com/user?id=nneonneo</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 07 Apr 2026 10:48:48 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=nneonneo" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by nneonneo in "Iran's IRGC Publishes Satellite Imagery of OpenAI's $30B Stargate Datacenter"]]></title><description><![CDATA[
<p>The underlying source here is <a href="https://www.tomshardware.com/tech-industry/iran-threatens-complete-and-utter-annihilation-of-openais-usd30b-stargate-ai-data-center-in-abu-dhabi-regime-posts-video-with-satellite-imagery-of-chatgpt-makers-premier-1gw-data-center" rel="nofollow">https://www.tomshardware.com/tech-industry/iran-threatens-co...</a>. That news story embeds the actual video as well as providing more detailed context about the threat. Can we change the link to that?</p>
]]></description><pubDate>Mon, 06 Apr 2026 05:24:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47657279</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=47657279</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47657279</guid></item><item><title><![CDATA[New comment by nneonneo in "How BYD got EV chargers to work almost as fast as gas pumps"]]></title><description><![CDATA[
<p>Based on the figures here, they’re claiming around 400 miles of range added in 300 seconds (60% of the full 677 mile range); contrast this with around 100 seconds for a typical gas pump (8 gal/min) and typical efficiency (30 mpg). It suggests that you’d need around 5MW chargers to truly get to the speed of a gas pump.<p>On the other hand, 5 minutes is already a huge improvement over 15-30 minutes, and it’s fast enough to remove much of the friction of recharging an EV.<p>Really wish this kind of tech would come to North America…</p>
]]></description><pubDate>Sat, 21 Mar 2026 13:21:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47466781</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=47466781</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47466781</guid></item><item><title><![CDATA[New comment by nneonneo in "A most elegant TCP hole punching algorithm"]]></title><description><![CDATA[
<p>Lord, we're how many years into using LLMs, and people still don't understand that their whole shtick is to produce the most plausible output - not the most correct output?<p>The most plausible output <i>might</i> be correct, or it might be utter bullshit hallucinations that only sound correct; the only way to tell is to actually try it or cross-reference primary sources. Unless you do, the AI answer is worthless.<p>The reason why they're getting so good at code now is that they can check their output by running and testing it; if you're just prompting questions into a chatbot and then copying their output verbatim to a comment, you're not adding any meaningful value.</p>
]]></description><pubDate>Sun, 15 Mar 2026 09:12:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47385603</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=47385603</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47385603</guid></item><item><title><![CDATA[New comment by nneonneo in "Making WebAssembly a first-class language on the Web"]]></title><description><![CDATA[
<p>Your comment - and your last two comments too - all sound <i>very</i> LLM-written. Using an LLM for commenting is explicitly against the site rules (<a href="https://news.ycombinator.com/newsguidelines.html#generated">https://news.ycombinator.com/newsguidelines.html#generated</a>).</p>
]]></description><pubDate>Thu, 12 Mar 2026 00:06:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47344389</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=47344389</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47344389</guid></item><item><title><![CDATA[New comment by nneonneo in "Learnings from paying artists royalties for AI-generated art"]]></title><description><![CDATA[
<p>The people in that counting to infinity subreddit would get compensated a lot if this were fully automated - their posts were so overrepresented in the training set that many of their usernames became complete tokens (e.g. SolidGoldMagikarp).</p>
]]></description><pubDate>Tue, 10 Mar 2026 06:27:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47319697</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=47319697</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47319697</guid></item><item><title><![CDATA[New comment by nneonneo in "Flash media longevity testing – 6 years later"]]></title><description><![CDATA[
<p>This is one of the reasons I like the PNG format - it has checksums. You can fix a surprising number of broken files by bruteforce testing plausible errors until the checksum passes.<p>With JPEG one of the big problems is that the data is Huffman-encoded without any inter-block markers (except maybe Restart Markers, if you're lucky). This means that a single bitflip can result in a code changing length, causing frameshifts in many subsequent blocks and rendering them all undecodable. If you  have a large block of missing data (e.g. a 4k-byte sector of zeros), then you have to guess where in the image the bitstream resumes, in addition to guessing the value of the running DC components.</p>
]]></description><pubDate>Tue, 10 Mar 2026 06:23:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47319669</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=47319669</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47319669</guid></item><item><title><![CDATA[New comment by nneonneo in "No right to relicense this project"]]></title><description><![CDATA[
<p>Somewhat annoyingly, there's been research that suggests that models can pass information to each other via (effectively) steganographic techniques - specific but apparently harmless choices of tokens, wordings, and so on; see <a href="https://arxiv.org/abs/1712.02950" rel="nofollow">https://arxiv.org/abs/1712.02950</a> and <a href="https://alignment.anthropic.com/2025/subliminal-learning/" rel="nofollow">https://alignment.anthropic.com/2025/subliminal-learning/</a> for some simple examples.<p>While it feels unlikely that a simple "write this spec from this code" + "write this code from this spec" loop would actually trigger this kind of hiding behaviour, an LLM trained to accurately reproduce code from such a loop definitely would be capable of hiding code details within the spec - and you can't reasonably prove that the frontier LLMs have <i>not</i> been trained to do so.</p>
]]></description><pubDate>Thu, 05 Mar 2026 10:12:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47259890</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=47259890</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47259890</guid></item><item><title><![CDATA[New comment by nneonneo in "British Columbia is permanently adopting daylight time"]]></title><description><![CDATA[
<p>Eh, they're still keeping the impending switch <i>to</i> PDT, just ditching the future switch back to PST (and all future changes). That should give around 7-8 months for a new timezone file update to percolate.</p>
]]></description><pubDate>Tue, 03 Mar 2026 03:48:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47227773</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=47227773</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47227773</guid></item><item><title><![CDATA[New comment by nneonneo in "New accounts on HN more likely to use em-dashes"]]></title><description><![CDATA[
<p>On the other hand, Korean ditched the ideographic Hanja (Chinese Character) writing system because it was too difficult to learn, in favour of a much simpler phonetic one. In Japan, the classical Kanji Chinese writing system was considered a prestige language and was customarily not taught to ordinary folks; the modern Hiragana script evolved as an easy-to-learn alternative, (initially) used heavily by women who were often not taught Kanji.<p>Of course, Chinese characters are not pictographic and haven't been for a few thousand years, but they are still largely ideographic.</p>
]]></description><pubDate>Thu, 26 Feb 2026 12:31:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47165160</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=47165160</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47165160</guid></item><item><title><![CDATA[New comment by nneonneo in "Sovereignty in a System Prompt"]]></title><description><![CDATA[
<p>The full system prompt: <a href="https://pop.rdi.sh/indus-system-prompt-2026-02-24.txt" rel="nofollow">https://pop.rdi.sh/indus-system-prompt-2026-02-24.txt</a><p>Unfortunately, it gets cut off here:<p>```
## CRITICAL RULES
1. *No tool leakage* — never output
```<p>I would be very interested to know what string is being blocked here, and what the rest of its critical rules are. Maybe some hex-encoding or other obfuscation could be used to coax the rest of the system prompt out of the model? I wonder if the next tokens here are consumed by the middleware (to execute tools?).</p>
]]></description><pubDate>Wed, 25 Feb 2026 09:07:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47149168</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=47149168</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47149168</guid></item><item><title><![CDATA[New comment by nneonneo in "Inputlag.science – Repository of knowledge about input lag in gaming"]]></title><description><![CDATA[
<p>The website notes that you can measure lag with an “expensive” high-speed camera setup.<p>My favorite trick, which I’ve used frequently (including in scientific publications on lag!) is to use the slo-mo cam on a smartphone. Phones will usually do anywhere from 120-240Hz. Set up the camera so it can see both your input (e.g. a side view of you pushing a button) and the display, record a video, and then pull it into a media player that supports frame-by-frame playback. You can then measure the number of frames elapsed from you pushing the button (pressing it down far enough to electrically activate it) and the corresponding reaction on screen. This gives you a cheap and easy setup capable of measuring latency down to ~4ms granularity, and doing a few repeated measurements can give you a very accurate picture of latency. Keep in mind that latency is a range (statistical distribution), not a single number, so you need repeated measurements to understand  the shape of the distribution.<p>If you’re developing a game, you can add a prominent frame counter on screen to be captured on the video, and add the frame counter to your log output. Then you can match up the video with your game’s events, after accounting for display latency.</p>
]]></description><pubDate>Sun, 22 Feb 2026 09:27:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47109630</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=47109630</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47109630</guid></item><item><title><![CDATA[New comment by nneonneo in "A Botnet Accidentally Destroyed I2P"]]></title><description><![CDATA[
<p>Those are some weird-ass visualizations. I can only assume they were AI-generated.</p>
]]></description><pubDate>Sun, 22 Feb 2026 06:42:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47108817</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=47108817</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47108817</guid></item><item><title><![CDATA[New comment by nneonneo in "Dark web agent spotted bedroom wall clue to rescue girl from abuse"]]></title><description><![CDATA[
<p>> an abused girl his team had named Lucy<p>> It was impossible to work out who, or where, Lucy was.<p>Lucy is a pseudonym. They were trying to get Facebook to tell them who the girl was through facial recognition. There’s no reason to expect a priori that the offender would be in any registry.</p>
]]></description><pubDate>Tue, 17 Feb 2026 05:18:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47043967</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=47043967</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47043967</guid></item><item><title><![CDATA[New comment by nneonneo in "An AI agent published a hit piece on me – more things have happened"]]></title><description><![CDATA[
<p>A new-ish feature of modern browsers is the ability to link directly to a chunk of text within a document; that text can even be optionally highlighted on page load to make it obvious. You could configure the LLM to output those text anchor links directly, making it possible to verify the quotes (and their context!) just by clicking on the links provided.</p>
]]></description><pubDate>Sat, 14 Feb 2026 02:06:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47010774</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=47010774</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47010774</guid></item><item><title><![CDATA[New comment by nneonneo in "OpenClaw is changing my life"]]></title><description><![CDATA[
<p>Somewhere on an HN thread I saw someone claiming that they "solved" security problems in their vibe-coded app by adding a "security expert" agent to their workflow.<p>All I could think was, "good luck" and I certainly hope their app never processes anything important...</p>
]]></description><pubDate>Sun, 08 Feb 2026 14:09:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=46934319</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=46934319</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46934319</guid></item><item><title><![CDATA[New comment by nneonneo in "Welcome to the Room – A lesson in leadership by Satya Nadella"]]></title><description><![CDATA[
<p>What’s with that awful AI-generated infographic at the end? The piece would be better without it…</p>
]]></description><pubDate>Sat, 07 Feb 2026 10:12:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=46922685</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=46922685</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46922685</guid></item><item><title><![CDATA[New comment by nneonneo in "My AI Adoption Journey"]]></title><description><![CDATA[
<p>I had a fun bug while building a smartwatch app that was caused by the sample rate of the accelerometer increasing when the device heated up. I had code that was performing machine learning on the accelerometer data, which would mysteriously get less accurate during prolonged operation. It turned out that we  gathered most of our training data during shorter runs when the device was cool, and when the device heated up during extended use, it changed the frequencies of the recorded signals enough to throw off our model.<p>I've also used a logic analyzer to debug communications protocols quite a few times in my career, and I've grown to rather like that sort of work, tedious as it may be.<p>Just this week I built a VFS using FUSE and managed to kernel panic my Mac a half-dozen times. Very fun debugging times.</p>
]]></description><pubDate>Fri, 06 Feb 2026 10:22:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=46911143</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=46911143</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46911143</guid></item><item><title><![CDATA[New comment by nneonneo in "The Rise and Impending Fall of the Dental Cavity"]]></title><description><![CDATA[
<p>Ok interesting, but I wonder: if you load up a bacteria that kills other bacteria in your mouth, and it ends up in your gut, will it mess up the microbiome there? The weight gain studies suggest not (and I’m not even sure if S mutans is a major component of the gut microbiome), but it seems like the kind of thing that’d be worth checking for. (If there are already studies on this - happy to see them).<p>Also - if these things produce ethanol, even small amounts, are they going to be safe for children? The assumption here is that this strain would be passed mother-to-child, so this isn’t an unreasonable concern.</p>
]]></description><pubDate>Fri, 30 Jan 2026 02:23:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=46819852</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=46819852</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46819852</guid></item><item><title><![CDATA[New comment by nneonneo in "Minnesota activist releases arrest video after manipulated White House version"]]></title><description><![CDATA[
<p>Don’t worry! According to the White House, it’s just a meme! Making up fake news is totally fine as long as you can say you’re memeing!<p>The WH using social media (X, Pravda Social) for official communication is highly deliberate - they get to declare post-hoc what is actually real communication and what is “just memes”. Of course it won’t make any difference to people amplifying the content. If the WH had to stick to traditional outlets for news they wouldn’t have this fig leaf to hide behind.</p>
]]></description><pubDate>Sat, 24 Jan 2026 01:15:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=46740123</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=46740123</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46740123</guid></item><item><title><![CDATA[New comment by nneonneo in "Bugs Apple loves"]]></title><description><![CDATA[
<p>I have a fun one: my iPhone (12 Pro) refuses to acknowledge that it has eSIM functionality, even though the hardware exists.<p>I'm fairly sure I know what the problem is! It was restored from a backup taken on an iPhone X that had two physical SIM slots (Chinese version). The new phone now seems to think it has two physical SIM slots: it shows an IMEI2 in About, but any attempt to use the eSIM functionality just fails (scanning a code does "nothing"; no "add" button is visible, etc.).<p>If this was an Android phone, I'd root it and just fix the offending network configuration file. I <i>believe</i> it's possible to tamper with a backup of the phone to fix the issue, but this would mean a full backup+restore cycle and some specialized tooling to go mucking with the backup.<p>I filed a Radar on it ages ago, but I'm assuming nobody ever picked it up.</p>
]]></description><pubDate>Fri, 23 Jan 2026 06:45:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=46729275</link><dc:creator>nneonneo</dc:creator><comments>https://news.ycombinator.com/item?id=46729275</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46729275</guid></item></channel></rss>