<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: plingbang</title><link>https://news.ycombinator.com/user?id=plingbang</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 15 Apr 2026 00:51:46 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=plingbang" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by plingbang in "Discord will require a face scan or ID for full access next month"]]></title><description><![CDATA[
<p>> Teen-by-default settings to roll out globally for all Discord users<p>Does it mean that even people who reside outside jurisdictions touched by the age verification craze will have to deal with all this?<p>> use facial age estimation<p>Surely a kid won't be able to ask someone else to pass the check for them. But let's talk about false positives. If the estimator falsely declares someone an adult, is Discord legally liable?<p>> submit a form of identification<p>If you have a picture of an ID document, can you verify that it's real? You'd have to ask the government for that. And at least in one country there is no process for that.<p>> On-device processing<p>Oh, a client-side check. Must be secure.</p>
]]></description><pubDate>Mon, 09 Feb 2026 16:23:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=46947030</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=46947030</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46947030</guid></item><item><title><![CDATA[New comment by plingbang in "Benchmarking leading AI agents against Google reCAPTCHA v2"]]></title><description><![CDATA[
<p>I have a recording of me trying to pass the captcha for straight 5 minutes and giving up. To be fair, this has only happened once.<p>What is the purpose of such loop? Bots can simply switch to another residential proxy when the captcha success rate gets low. For normal humans, it is literally "computer says no".</p>
]]></description><pubDate>Tue, 11 Nov 2025 14:40:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=45887756</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=45887756</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45887756</guid></item><item><title><![CDATA[New comment by plingbang in "Amazon’s Ring to partner with Flock"]]></title><description><![CDATA[
<p>citation needed</p>
]]></description><pubDate>Fri, 17 Oct 2025 11:38:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=45615523</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=45615523</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45615523</guid></item><item><title><![CDATA[New comment by plingbang in "Asterinas: A new Linux-compatible kernel project"]]></title><description><![CDATA[
<p>A very close idea was jokingly suggested in The Birth & Death of JavaScript[1] at 18:07 (rewind to 14:14 for more context)<p>[1]: <a href="https://www.destroyallsoftware.com/talks/the-birth-and-death-of-javascript" rel="nofollow">https://www.destroyallsoftware.com/talks/the-birth-and-death...</a></p>
]]></description><pubDate>Fri, 20 Jun 2025 15:29:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=44328668</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=44328668</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44328668</guid></item><item><title><![CDATA[New comment by plingbang in "By default, Signal doesn't recall"]]></title><description><![CDATA[
<p>Fighting with the OS is futile. The OS is always in control and apps can only ask it nicely to do things.<p>Microsoft can simply change Recall to capture DRM-marked content too. And to avoid copyright issues, it will store some kind of visual summary (or whaterer the neural network can use) instead of plain screenshots like it is doing now.</p>
]]></description><pubDate>Wed, 21 May 2025 19:11:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=44055085</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=44055085</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44055085</guid></item><item><title><![CDATA[New comment by plingbang in "Xiaomi global bootloader unlock policy has changed"]]></title><description><![CDATA[
<p>I found a wall of shame that includes manufacturers that make it hard or impossible to unlock the bootloader[1]. It was mentioned in a forum post[2].<p>[1]: <a href="https://github.com/melontini/bootloader-unlock-wall-of-shame">https://github.com/melontini/bootloader-unlock-wall-of-shame</a><p>[2]: <a href="https://xdaforums.com/t/future-of-unlocking-bootloaders-in-android-smartphones.4705741/" rel="nofollow">https://xdaforums.com/t/future-of-unlocking-bootloaders-in-a...</a></p>
]]></description><pubDate>Thu, 02 Jan 2025 12:40:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=42573927</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=42573927</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42573927</guid></item><item><title><![CDATA[New comment by plingbang in "I was banned from the hCaptcha accessibility account for not being blind (2023)"]]></title><description><![CDATA[
<p>> It's tricky, though. What else can you do?<p>I had an idea about amost-privacy-preserving system by involving government ID and blind signatures:<p>1. The service passes a random string to the user.
2. The user authenticates to their government and asks the government to sign it.
3. The government applies a blind signature which basically says "this user/citizen hasn't registered an account in the last 60 minutes".
4. The government records the timestamp.
5. The user passes the signature back to the service.<p>Upsides:<p>* Bypassing this would be orders of magnitude more expensive than phone numbers.
* Almost private<p>Downsides:<p>* Won't happen. Remote HW attestation is likely to win :(
* The service knows your citizenship * The gov knows when and how often you register.
* Any gov can always bypass the limits for themselves.<p>I think it may be also possible to extend it so that the government attests that you have only one account on the service but without being able to find which account is yours.</p>
]]></description><pubDate>Mon, 18 Nov 2024 15:55:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=42173571</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=42173571</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42173571</guid></item><item><title><![CDATA[New comment by plingbang in "IMG_0416"]]></title><description><![CDATA[
<p>Some time ago there was a website that showed you a random YouTube video. Like truly random. The biggest discovery to me was that a typical video has 0-1 views, nearly always <10. I bet most people don't realize this is how YouTube actually looks like. And I guess it's also a good small reminder to all people trying to become famous on social media.<p>I believe the website tried to find videos with least bias possible by doing some clever searches using YouTube API (so not just videos titled IMGXXXX). Maybe it was trying to do partial matches on video ID.</p>
]]></description><pubDate>Mon, 11 Nov 2024 13:04:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=42106826</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=42106826</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42106826</guid></item><item><title><![CDATA[New comment by plingbang in "Morsle – A daily Morse code challenge"]]></title><description><![CDATA[
<p>Looks usable and useful unlike my joke version:<p><a href="https://plingbang.github.io/morsel/" rel="nofollow">https://plingbang.github.io/morsel/</a></p>
]]></description><pubDate>Mon, 21 Oct 2024 17:07:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=41906127</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=41906127</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41906127</guid></item><item><title><![CDATA[New comment by plingbang in "Ask HN: Tips for hacking a TV?"]]></title><description><![CDATA[
<p>That's probably rare but I had a no name TV which just let me just enable adb over network with full root access. IIRC I had to install an app that can launch arbitrary activities so I could access the buildin Android settings menu instead of the crippled TV settings UI.</p>
]]></description><pubDate>Sun, 20 Oct 2024 11:03:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=41894541</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=41894541</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41894541</guid></item><item><title><![CDATA[New comment by plingbang in "Send: Open-source fork of Firefox Send"]]></title><description><![CDATA[
<p>For a case when file sharing is intended  between individuals or small groups there's an easy solution:<p><i>Anyone who got the link should be able to delete the file.</i><p>This should deter one from using the file sharing tool as free hosting for possibly bad content. One can also build a bot that deletes every file found on public internet.</p>
]]></description><pubDate>Sat, 19 Oct 2024 20:07:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=41890376</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=41890376</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41890376</guid></item><item><title><![CDATA[New comment by plingbang in "Ask HN: Why does Microsoft prohibit employee personal open source projects?"]]></title><description><![CDATA[
<p>Can you provide some context? Do you mean MS employees are prohibited from doing open source even outside work hours?</p>
]]></description><pubDate>Mon, 02 Sep 2024 15:06:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=41426014</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=41426014</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41426014</guid></item><item><title><![CDATA[New comment by plingbang in "A Collection of Free Public APIs That Is Tested Daily"]]></title><description><![CDATA[
<p>Awesome but seem to fail on some numbers e.g.<p><a href="https://api.isfizzbuzz.xyz/api/150000000000000000000000000000000000000000000000000000000000" rel="nofollow">https://api.isfizzbuzz.xyz/api/15000000000000000000000000000...</a><p>BTW, there are neat divisibility rules which can give you the answer in practically linear time when the number is in decimal: <a href="https://en.wikipedia.org/wiki/Divisibility_rule" rel="nofollow">https://en.wikipedia.org/wiki/Divisibility_rule</a></p>
]]></description><pubDate>Wed, 28 Aug 2024 10:41:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=41378076</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=41378076</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41378076</guid></item><item><title><![CDATA[New comment by plingbang in "Show HN: I built a simple, open-source tool to manage servers and SSH keys"]]></title><description><![CDATA[
<p>That's a good point. Moreover, someone built[1] an SSH server that prints your name when you connect (because GitHub publishes SSH public keys of every user):<p><pre><code>    ssh whoami.filippo.io
</code></pre>
[1]: <a href="https://words.filippo.io/ssh-whoami-filippo-io/" rel="nofollow">https://words.filippo.io/ssh-whoami-filippo-io/</a></p>
]]></description><pubDate>Tue, 06 Aug 2024 16:22:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=41172343</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=41172343</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41172343</guid></item><item><title><![CDATA[New comment by plingbang in "How to build highly-debuggable C++ binaries"]]></title><description><![CDATA[
<p>> so users can see in real-time what code was run and when<p>I'm really curious how this was presented to the user. A table with timestamp, filename, line number, and line contents? Or something more advanced?</p>
]]></description><pubDate>Tue, 30 Jul 2024 16:12:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=41110720</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=41110720</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41110720</guid></item><item><title><![CDATA[New comment by plingbang in "Apple Maps on the web launches in beta"]]></title><description><![CDATA[
<p>I understand they "cannot test every possible browser" and that "users may get subpar experience".<p>I don't understand why there isn't "continue at your own risk" button. Maybe with a scary warning. It's kind of stupid that I have to spoof UA for a website to let me in. And in most cases, everything just works fine.<p>Maybe one day I'll create a website to inform about the issue.</p>
]]></description><pubDate>Thu, 25 Jul 2024 08:37:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=41066286</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=41066286</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41066286</guid></item><item><title><![CDATA[New comment by plingbang in "It's never been easier for the cops to break into your phone"]]></title><description><![CDATA[
<p>Can you name a single Android phone or tablet model that is <10 y.o. for which you can access personal data with this method?</p>
]]></description><pubDate>Tue, 16 Jul 2024 17:34:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=40978543</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=40978543</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40978543</guid></item><item><title><![CDATA[New comment by plingbang in "Integrated assembler improvements in LLVM 19"]]></title><description><![CDATA[
<p>Why not just an LLM-based interpreter that direclty executes a PDF spec plus edits received by email? No need to recomplile and restart the app. A DB is also not required - the LLM will naturally remember all user requests and figure out the current state. (We'll solve the limitations of context later)</p>
]]></description><pubDate>Mon, 01 Jul 2024 10:10:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=40844283</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=40844283</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40844283</guid></item><item><title><![CDATA[New comment by plingbang in "Discussions: Flat or Threaded? (2006)"]]></title><description><![CDATA[
<p>And what makes it worse in phpBB and other forum engines is the waste of vertical space. 4 messages on your screen seems to be the maximum despite using smaller fonts than web average nowadays.</p>
]]></description><pubDate>Mon, 10 Jun 2024 13:26:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=40633431</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=40633431</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40633431</guid></item><item><title><![CDATA[New comment by plingbang in "Encryption at Rest: Whose Threat Model Is It Anyway?"]]></title><description><![CDATA[
<p>> Or you can end up like the people who lost their data [1]<p>I don't see how encryption at rest could've changed the outcome.<p>In the article, the cloud provider, which has full control over the VMs, was compromised. The VMs were hosting various Bitcoin services, which needed continuous wallet access for operation. So, I'd say there was no data at rest to be secured. The attackers could theoretically patch the application to make malicious transactions or just extract the wallet from RAM.<p>Also, the article suggests that the attackers were getting inside the running VMs rather than accessing VM storage directly.</p>
]]></description><pubDate>Tue, 04 Jun 2024 14:09:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=40574821</link><dc:creator>plingbang</dc:creator><comments>https://news.ycombinator.com/item?id=40574821</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40574821</guid></item></channel></rss>