<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: npfries</title><link>https://news.ycombinator.com/user?id=npfries</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 21 May 2026 02:41:58 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=npfries" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by npfries in "An OpenAI model has disproved a central conjecture in discrete geometry"]]></title><description><![CDATA[
<p>Bob Ross would like a word. He frequently talked about objects or features already existing, and using the tools at his disposal to “find” them.</p>
]]></description><pubDate>Wed, 20 May 2026 22:05:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=48214862</link><dc:creator>npfries</dc:creator><comments>https://news.ycombinator.com/item?id=48214862</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48214862</guid></item><item><title><![CDATA[Cybersecurity Vulnerabilities with Certain Patient Monitors]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication">https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=42924930">https://news.ycombinator.com/item?id=42924930</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 03 Feb 2025 23:33:43 +0000</pubDate><link>https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication</link><dc:creator>npfries</dc:creator><comments>https://news.ycombinator.com/item?id=42924930</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42924930</guid></item><item><title><![CDATA[New comment by npfries in "How to Hack the Breakthrough Prize (Ft. Session Confusion)"]]></title><description><![CDATA[
<p>One advantage revocation lists have over session lists is that they can be distributed via a bloom filter. Assuming multiple services need to validate against some shared auth service, this can be a significant reduction in round trips.</p>
]]></description><pubDate>Fri, 27 Sep 2024 01:56:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=41665530</link><dc:creator>npfries</dc:creator><comments>https://news.ycombinator.com/item?id=41665530</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41665530</guid></item></channel></rss>