<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: null0pointer</title><link>https://news.ycombinator.com/user?id=null0pointer</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 18 Apr 2026 07:29:31 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=null0pointer" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by null0pointer in "Cliff Asness: The New 'Crypto Fort Knox' Is as Dumb as It Sounds"]]></title><description><![CDATA[
<p>Yep, Bitcoin uses Proof of Work (computing power) for consensus, while some others like Ethereum use Proof of Stake (coin ownership).</p>
]]></description><pubDate>Sat, 08 Mar 2025 05:02:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=43297634</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=43297634</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43297634</guid></item><item><title><![CDATA[New comment by null0pointer in "How Monero Fulfilled Satoshi's Promise"]]></title><description><![CDATA[
<p>Bitcoin could have achieved that goal if it had been allowed to scale. Monero uses a dynamic block size so will be able to achieve the transaction throughput if usage reaches that level. Transaction fees on Monero however are limited to a few tiers in order to make it more difficult to deanonymize transactions by fee size, so without a fork in the future (which is a normal occurrence on Monero) the fees will remain higher than Visa.</p>
]]></description><pubDate>Fri, 07 Mar 2025 18:32:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=43292797</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=43292797</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43292797</guid></item><item><title><![CDATA[New comment by null0pointer in "Bitcoin's Fatal Flaw: Why Financial Surveillance Is Inevitable Without Privacy"]]></title><description><![CDATA[
<p>> Connect to a node that processes a million dollars worth of transactions per day<p>Your solution is to centralized transactions on a few large payment processor nodes?<p>The core problem of LN remains, which is that in order to operate a LN node you must keep it always online or risk having your coins stolen. The entire point of creating a L2 network in the first place was because Bitcoin Core decided that scaling the base layer with larger blocks would harm decentralization by making it more difficult to operate a Bitcoin node. Well anyone who has ever operated a server can tell you that maintaining near 100% uptime is a much much higher technical bar than buying a larger hard drive.<p>The alternative for LN users if they don't want to operate their own LN node is to give up custody of their coins to someone who does operate a node, but this goes against the core premise of cryptocurrencies.</p>
]]></description><pubDate>Fri, 07 Mar 2025 18:18:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=43292618</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=43292618</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43292618</guid></item><item><title><![CDATA[New comment by null0pointer in "Tether and Circle are battling to win the US stablecoin market"]]></title><description><![CDATA[
<p>You are never _guaranteed_ to win a race against honest block producers for any finite time horizon, even if you owned 99% of all hashing power.<p>A double spend via 51% isn't really feasible anyway. A double spend attack, in the simplest case, is to:<p>1. Pay for good or services<p>2. Receive delivery of the goods or services<p>3. Invalidate the original payment once the goods or services are no longer revokable.<p>For a double spend to be worthwhile the value of the scam must exceed the cost of the scam. Maintaining >50% hashing power is extremely expensive and is more and more expensive the longer you maintain it. Therefore the value of the scam must also be extremely large. For crypto transactions it's common sense to wait for more and more confirmations (additional blocks mined after the block containing the transaction) before delivering the goods or services as the size of the transaction grows. Since it's trivial to wait for N+1 confirmations as the seller of goods or services it's trivial to defend against double spends for any meaningful amount of money.</p>
]]></description><pubDate>Tue, 04 Mar 2025 20:06:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=43259318</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=43259318</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43259318</guid></item><item><title><![CDATA[New comment by null0pointer in "Executive wealth as a factor in return-to-office"]]></title><description><![CDATA[
<p>They do not use data as a decision making tool. They use data as post-hoc justification for decisions already made.</p>
]]></description><pubDate>Sun, 02 Mar 2025 19:47:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=43234266</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=43234266</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43234266</guid></item><item><title><![CDATA[New comment by null0pointer in "Zelensky leaves White House after angry meeting"]]></title><description><![CDATA[
<p>You are confusing the principle and western liberal value of freedom of speech with the first amendment, which is an implementation of the value.</p>
]]></description><pubDate>Fri, 28 Feb 2025 21:28:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=43211421</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=43211421</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43211421</guid></item><item><title><![CDATA[New comment by null0pointer in "Show HN: Immersive Gaussian Splat experience of Sutro Tower, San Francisco"]]></title><description><![CDATA[
<p>I had the same feeling. Excellent work!</p>
]]></description><pubDate>Fri, 21 Feb 2025 03:34:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=43123723</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=43123723</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43123723</guid></item><item><title><![CDATA[New comment by null0pointer in "US and UK refuse to sign AI safety declaration at summit"]]></title><description><![CDATA[
<p>Camera authentication will never work because you can always just take an authenticated photo of your AI image.</p>
]]></description><pubDate>Wed, 12 Feb 2025 20:43:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=43029573</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=43029573</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43029573</guid></item><item><title><![CDATA[New comment by null0pointer in "Operator research preview"]]></title><description><![CDATA[
<p>If they are already collaborating with these companies then why not just have them agree to allow access to their APIs and avoid all the wasteful AI agent middleware shit?</p>
]]></description><pubDate>Fri, 24 Jan 2025 04:41:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=42810596</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=42810596</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42810596</guid></item><item><title><![CDATA[New comment by null0pointer in "Operator research preview"]]></title><description><![CDATA[
<p>No problem, itskarad. I’ve ordered a pallet of Cadbury Creme Eggs to your house due for delivery tomorrow morning.</p>
]]></description><pubDate>Fri, 24 Jan 2025 04:36:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=42810576</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=42810576</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42810576</guid></item><item><title><![CDATA[New comment by null0pointer in "OpenAI has upped its lobbying efforts nearly sevenfold"]]></title><description><![CDATA[
<p>It's a literary analogy, not a physical analogy.<p>And I disagree about the work when it comes to information. Our natural inclination as humans is to share things we find interesting. Like "check out this song" or "check out this article". I don't think this takes much work. It just happens. In this sense the information is free like the stream is free to flow through the hills.<p>On the flip side there is substantial effort put into impeding this free flow of information with schemes like DRM. Similar to building a dam. But once cracks form the free flow resumes.<p>Continuing the water analogy you could say there is also substantial effort put into building the infrastructure to make information accessible to many more people. As a library is to a city's plumbing infrastructure.</p>
]]></description><pubDate>Wed, 22 Jan 2025 22:56:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=42798408</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=42798408</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42798408</guid></item><item><title><![CDATA[New comment by null0pointer in "OpenAI has upped its lobbying efforts nearly sevenfold"]]></title><description><![CDATA[
<p>Information wants to be free (as in libre) in the same way water wants to flow downhill.</p>
]]></description><pubDate>Wed, 22 Jan 2025 19:43:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=42796706</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=42796706</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42796706</guid></item><item><title><![CDATA[New comment by null0pointer in "Facebook blocks links to Pixelfed, a federated Instagram alternative"]]></title><description><![CDATA[
<p>You seem to be referring to the United States' First Amendment, whereas freedom of speech is a western liberal value. The parent comment was pointing out that Zuckerberg does not uphold the value.</p>
]]></description><pubDate>Mon, 13 Jan 2025 20:34:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=42688809</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=42688809</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42688809</guid></item><item><title><![CDATA[New comment by null0pointer in "'So immoral': gig economy workers forced to pay fee to receive their wages"]]></title><description><![CDATA[
<p>> Had to prove I wasn't.<p>How did you prove it? What is their standard of evidence? My intuition says it would be difficult to prove a negative.</p>
]]></description><pubDate>Mon, 13 Jan 2025 20:22:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=42688585</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=42688585</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42688585</guid></item><item><title><![CDATA[New comment by null0pointer in "I've acquired a new superpower"]]></title><description><![CDATA[
<p>You can use this same technique to view glasses-less 3D (stereoscopic) images. It's also fairly easy to create your own. Take two photos but offset the camera lens by approximately eye-width. Open the image editor of your choice and place the images side-by-side. View the composite image cross-eyed and you are now viewing a 3D scene.<p>Also worth noting there are 2 versions of this kind of cross-eyed focus depending on whether your eyes are focusing on a point in front of or behind the actual image. This determines which side the left and right eye images should go on in the composite. I find it easier to focus on a point in front of the images but IME most examples online are for focusing on a point behind the image.</p>
]]></description><pubDate>Fri, 10 Jan 2025 19:43:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=42659325</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=42659325</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42659325</guid></item><item><title><![CDATA[New comment by null0pointer in "Microsoft disguises Bing as Google to fool inattentive searchers"]]></title><description><![CDATA[
<p>I bet it’s a bug but their metrics suffered when they fixed it so they rolled it back.</p>
]]></description><pubDate>Wed, 08 Jan 2025 04:47:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=42631025</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=42631025</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42631025</guid></item><item><title><![CDATA[New comment by null0pointer in "Online Behavioral Ads Fuel the Surveillance Industry"]]></title><description><![CDATA[
<p>Quoting myself from a previous post, I think we can solve several problem at once; including funding the sites you visit. Now I just have to get off my lazy ass and build it.<p><a href="https://news.ycombinator.com/item?id=41677216">https://news.ycombinator.com/item?id=41677216</a><p>“
I’d like to see more work put into finding ways to utilize the work from PoW. For example I have an idea to use Monero’s CPU-favoring PoW for PoW based DDoS protection as seen in Tor [0]. When a user accesses a website they are given a PoW challenge to complete. This challenge is actually for a share of mining rewards as in P2Pool. The mining reward share would go to the website operator. This would harmoniously improve several things about the web. First, it would help protect websites against layer-7 DDoS attacks. Second, this L7 DDoS protection reduces the webs dependence on companies such as Cloudflare, the internets biggest man-in-the-middle. Third, it provides a way to pay website owners costing the users a small amount of their computers time and energy in much the same way as ads do currently. Fourth, it reduces the webs dependence on advertising as the way to fund your website. Fifth and finally, it helps secure the web-native currency in which website operators would be paid and which others can use for whatever they want.<p>I think such a solution would be truly beautiful.<p>0: <a href="https://blog.torproject.org/introducing-proof-of-work-defense-for-onion-services/" rel="nofollow">https://blog.torproject.org/introducing-proof-of-work-defens...</a>
“</p>
]]></description><pubDate>Wed, 08 Jan 2025 04:29:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=42630915</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=42630915</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42630915</guid></item><item><title><![CDATA[New comment by null0pointer in "Justin Trudeau promises to resign as PM"]]></title><description><![CDATA[
<p>It certainly is a finding of innocence when the presumption is innocent until proven guilty.</p>
]]></description><pubDate>Mon, 06 Jan 2025 20:38:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=42615451</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=42615451</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42615451</guid></item><item><title><![CDATA[New comment by null0pointer in "Understanding ReplicaSet vs. StatefulSet vs. DaemonSet vs. Deployments"]]></title><description><![CDATA[
<p>Author is most likely farming credibility with blog spam.</p>
]]></description><pubDate>Mon, 06 Jan 2025 18:04:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=42613200</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=42613200</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42613200</guid></item><item><title><![CDATA[New comment by null0pointer in "Sherlock: Hunt down social media accounts by username across 400 social networks"]]></title><description><![CDATA[
<p>> try to get people fired for things they said 10 years ago<p>I assume the implication here is that the thing they said 10 years ago was less inappropriate back then. So how do you predict sensitivity changes 10 years in the future to limit your speech today? Even if you delete posts after, say 1 year, archives exist. Shouldn’t you just not say anything if you’re afraid of this? Maybe discussion of self-censorship like this will be taboo in 10 years and the ship has already sailed.</p>
]]></description><pubDate>Wed, 25 Dec 2024 19:01:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=42510473</link><dc:creator>null0pointer</dc:creator><comments>https://news.ycombinator.com/item?id=42510473</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42510473</guid></item></channel></rss>